Cybersecurity within the 3rd World
Instructor Comments: Submit an annotated bibliography. Be sure that you collect a minimum 3-4 peer reviewed sources (published within the last 10 years) from legitimate sources for the annotated bibliography.
The annotated bibliography must be relevant to your ‘working title’ of your research proposal.
Please note that each annotation should be around 250 words to briefly synthesize the article. The annotation should not be excessive; nor overly brief. In addition, these three to four sources are not the only sources you will use in your proposal.
They are a means for the professor to make sure you are on the right track, selecting the right kind of literature, and that you are able to compile an annotated bibliography.
The annotated bibliography will be included as an appendix in your final ‘research proposal’ that you submit in week 7. Submit your work in APA format
. Here are some sources I have already compiled to use or not to use.: Maalem Lahcen, R.A., Caulkins, B., Mohapatra, R. et al. Review and insight on the behavioral aspects of cybersecurity. Cybersecur 3, 10 (2020). https://cybersecurity.springeropen.com/articles/10.1186/s42400-020-00050-w Wang, Y., Wu, W., Zhang, C. et al. From proof-of-concept to exploitable. Cybersecur 2, 12 (2019). https://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0028-9 Du, Ying R. “Same Events, Different Stories: Internet Censorship in the Arab Spring seen from China.” Journalism and Mass Communication Quarterly, vol. 93, no. 1, 2016, pp. 99-117. ProQuest, https://login.ezproxy2.apus.edu/login?qurl=https://search.proquest.com%2fdocview%2f1776605356%3faccountid%3d8289%2cdoi%3ahttp%3a%2f%2fdx.doi.org.ezproxy2.apus.edu%2f10.1177%2f1077699015606670.