Seminal Article Critique PDF

Title Seminal Article Critique
Course Cyber Security In Practice
Institution Macquarie University
Pages 2
File Size 61.2 KB
File Type PDF
Total Downloads 89
Total Views 168

Summary

instructions for assignment on seminal article critique...


Description

Seminal Article Critique Information The seminal article critique is worth 10% and is due on the 12th September at 11:59pm. Word limit is 1,000 (± 10%) (includes titles and in-text references but NOT bibliography) and you must use Harvard referencing. The format should be 12 point font with 1.5 line spacing. You will not be able to resubmit after the deadline, resubmissions prior to the deadline are allowed Trust but verify - after you submit, make sure you submitted the correct file. What is considered seminal? The answer to this question is somewhat subjective making it impossible to provide a clear distinction of what is and is not seminal. A seminal paper are of central important to a research topic, this is often because they report a major breakthrough, insight or a new concept. To get a feel of what is "seminal" you will need to pick a topic a read multiple papers to get a feel for the seminal work in the area. A great explanation for this is available at https://ncu.libguides.com/researchprocess/seminalworks What topics can we choose from? You can select any topic that is covered in the course (can be one coming up). If you're unsure you can ask your tutor if your topic is close enough to be okay. Can I use headings/subheadings I would recommend against using headings, you have very small word count and for this reason, you should not waste it on headings, nor should you need them on this paper.

Question Choose a cyber security issue from the topics covered in this unit that you would like to research in-depth during the course of the unit. Research and find a good seminal article related to your selected cyber security issue and write a detailed, objective critique on the article to highlight its strengths and weaknesses. References to research design, data analysis and a discussion of the results are strongly encouraged. Remember, if you have questions - ask before it is too late!

MY SOURCE:

Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model

ADDITIONAL SOURCES:

A new approach to modelling the effects of cognitive processing and threat detection on phishing susceptibility...


Similar Free PDFs