paper on Information systems-I JUST NEED SOURCES EXPLAINED 4 ATTACHED

Get quality term paper help at Unemployedprofessor.net. Use our paper writing services to score better and meet your deadlines. It is simple and straightforward. Whatever paper you need—we will help you write it!


Order a Similar Paper Order a Different Paper

This assignment will give you an opportunity to analyze the strength of your sources and to practice citing two of your sources in the documentation style you have chosen for your paper. Remember, your final paper must include a minimum of 7 sources with at least 4 sources coming from peer-reviewed journals taken from the APUS library database.

Source Evaluations: After completing this week’s required readings, select 2 of the sources you will use in your paper and compose a minimum one page evaluation of each source. Ensure that 1 of those sources is from a peer-reviewed journal at the APUS Library. Be sure to include your documentation style in your heading. After formatting the source information according to your documentation style, use the headings below to create your evaluation.

How the teacher wants this assignment:
First Source (including proper citation )

From Peer-reviewed Journal at APUS Library?

Credible Author: Explain how/why the author should be considered an expert on your chosen topic.
Reliable Publisher: Who is the publisher? What is the publisher’s reputation? Has this source been published by a scholarly or peer-reviewed press? Is this source available in trusted archives, such as subscription databases? If this is from a website, how stable is that website?
Accuracy: Does the information seem to be accurate? Does the information correspond with or contradict information found in sources known to be reliable? Has the information been peer-reviewed? Is there a reference list available so you can verify the information? Are there any factual errors, statistical flaws, or faulty conclusions?
Current Information: Is the material up to date? If it is from a website, when was it last updated?
Objectivity (Bias): Are all sides of the issue/topic treated fairly? Do you detect any bias? (For instance, is the author connected to any institution or foundation that might be paying him, which could suggest bias?)

Second Source (including proper citation)

From Peer-reviewed Journal at APUS Library?

Credible Author: Explain how/why the author should be considered an expert on your chosen topic.
Reliable Publisher: Who is the publisher? What is the publisher’s reputation? Has this source been published by a scholarly or peer-reviewed press? Is this source available in trusted archives, such as subscription databases? If this is from a website, how stable is that website?
Accuracy: Does the information seem to be accurate? Does the information correspond with or contradict information found in sources known to be reliable? Has the information been peer-reviewed? Is there a reference list available so you can verify the information? Are there any factual errors, statistical flaws, or faulty conclusions?
Current Information: Is the material up to date? If it is from a website, when was it last updated?
Objectivity (Bias): Are all sides of the issue/topic treated fairly? Do you detect any bias? (For instance, is the author connected to any institution or foundation that might be paying him, which could suggest bias?)

Peer reviewed sources from APUS Library:

Okenyi, P. O., & Owens, T. J. (2007). On the Anatomy of Human Hacking. Information Systems Security, 16(6), 302-314. doi:10.1080/10658980701747237

Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its impact is continuously giving serious concern in the Information technology arena which has often been undermined due to the ease with which this technique is widely used to infiltrate networks through unsuspecting individuals that are undeniably considered the “weakest link” in the security circle. Security awareness that brings about behavioral change, reduces employees’ vulnerability, and protects against threats exploiting employees’ vulnerability having a positive impact overall on risks related to information assets. Strategies for developing and implementing a successful information security awareness program are presented in this article, which also provides an introduction to the subject of human hacking while discussing the various counter-measures available to minimize the likelihood of such occurrences and their financial, reputation, psychological, and legal ramifications. [ABSTRACT FROM AUTHOR]

Attached sources:

Grimes, H. “. (2007). Security Sickness in the Health Networks. Information Systems Security, 16(6), 355-356. doi:10.1080/10658980701752864

Malin, Alex. Information Systems Security. Jan2007, Vol. 16 Issue 1, p47-53. 7p. DOI: 10.1080/10658980601051490.

Research Spotlights. (2018). Information Systems Research, 29(1), iii-vi

As for the last 3 sources you can choose any that talks about the information in thesis(attached as well)

Writerbay.net

Our affordable academic writing services save you time, which is your most valuable asset. Share your time with your loved ones as our Unemployedprofessor.net experts deliver unique, and custom-written paper for you.

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper