Question Description

Create an annotated bibliography of four sources that could be used for your research project, including at least two articles from scholarly journals.

Length: Four citations, each with an annotation of 150 +/- 25 words (125-175 words each). The entire completed assignment should be at least 600 words.

Sources: Four sources related to your research question, including at least two from scholarly journal articles. All four sources should be high-quality sources that you can use in your research project. Refer to Week 3: Selecting Sources Wisely. You may decide to use some or all of the sources that you posted in Week 3, Discussion 1: Identifying and Evaluating Sources.

  • Reference citation in APA format
  • Annotation of 150 ±25 words, with
    • summary
    • evaluation
    • use

You may (but do not have to) use CiteFast to create your reference citations.

Formatting your assignment

Incorporate these elements of APA style:

  • Use one-inch margins.
  • Double space.
  • Use an easy-to-read font between 10-point and 12-point.
  • Reference entries should be formatted with a hanging indent.

Ashford, W. (2019). Top lessons learned from cyber attacks. Computer Weekly, 4. Retrieved from http://search.ebscohost.com.ezproxy.umuc.edu/login.aspx?direct=true&db=f5h&AN=136279251&site=eds-live&scope=site

The article discusses the highlights of a panel discussion on the lessons that cybersecurity experts have learned from past cyber attacks, held at the National Cybersecurity Agency’s CyberUK conference in Glasgow, Scotland.

Slocombe, G. (2018). United States Strategies Their Cyber Security Capabilities. Asia-Pacific Defence Reporter, 44(9), 44–46. Retrieved from http://search.ebscohost.com.ezproxy.umuc.edu/login.aspx?direct=true&db=a9h&AN=132882514&login.asp&site=ehost-live&scope=site

Scholarly journal articles

Fuller, C. J. (2019). The Roots of the United States’ Cyber (In)Security. Diplomatic History, 43(1), 157–185. https://doi-org.ezproxy.umuc.edu/10.1093/dh/dhy038

The article traces the roots of U.S. cyber insecurity and explores the emergence of cyber security as a policy issue for the U.S. government. It highlights the proliferation of computer networks. which will help in my project.

Kovac`s, L. (2018). National Cyber Security as the Cornerstone of National Security. Revista Academiei Fortelor Terestre, 23(2), 113–120. Retrieved from http://search.ebscohost.com.ezproxy.umuc.edu/login.aspx?direct=true&db=asn&AN=130455890&site=eds-live&scope=site

The article discusses more advanced digital economy and society a country has the more exposed it is to cyber threats. Consequently, countries with the advanced digital economy and digital infrastructure naturally need to pay more attention to protecting cyberspace.

Create an annotated bibliography of four sources that could be used for your research project, including at least two articles from scholarly journals. Length: Four citations, each with an annotation of 150 +/- 25 words (125-175 words each). The entire completed assignment should be at least 600 words.Sources: Four sources related to your research question, including at least two from scholarly journal articles. All four sources should be high-quality sources that you can use in your research project. Refer to Week 3: Selecting Sources Wisely. You may decide to use some or all of the sources that you posted in Week 3, Discussion 1: Identifying and Evaluating Sources.Reference citation in APA formatAnnotation of 150 ±25 words, withsummaryevaluationuseYou may (but do not have to) use CiteFast to create your reference citations.Formatting your assignmentIncorporate these elements of APA style:Use one-inch margins.Double space.Use an easy-to-read font between 10-point and 12-point.Reference entries should be formatted with a hanging indent.Ashford, W. (2019). Top lessons learned from cyber attacks. Computer Weekly, 4. Retrieved from http://search.ebscohost.com.ezproxy.umuc.edu/login.aspx?direct=true&db=f5h&AN=136279251&site=eds-live&scope=siteThe article discusses the highlights of a panel discussion on the lessons that cybersecurity experts have learned from past cyber attacks, held at the National Cybersecurity Agency’s CyberUK conference in Glasgow, Scotland.Slocombe, G. (2018). United States Strategies Their Cyber Security Capabilities. Asia-Pacific Defence Reporter, 44(9), 44–46. Retrieved from http://search.ebscohost.com.ezproxy.umuc.edu/login.aspx?direct=true&db=a9h&AN=132882514&login.asp&site=ehost-live&scope=siteScholarly journal articlesFuller, C. J. (2019). The Roots of the United States’ Cyber (In)Security. Diplomatic History, 43(1), 157–185. https://doi-org.ezproxy.umuc.edu/10.1093/dh/dhy038The article traces the roots of U.S. cyber insecurity and explores the emergence of cyber security as a policy issue for the U.S. government. It highlights the proliferation of computer networks. which will help in my project.Kovac`s, L. (2018). National Cyber Security as the Cornerstone of National Security. Revista Academiei Fortelor Terestre, 23(2), 113–120. Retrieved from http://search.ebscohost.com.ezproxy.umuc.edu/login.aspx?direct=true&db=asn&AN=130455890&site=eds-live&scope=siteThe article discusses more advanced digital economy and society a country has the more exposed it is to cyber threats. Consequently, countries with the advanced digital economy and digital infrastructure naturally need to pay more attention to protecting cyberspace.