Conduct a robust literature review of a current Cyber Security, information security issue. The literature review must consist of the following elements:
Abstract – single-spaced and includes a summary of the proposed research and how it constitutes an
original contribution in your respective field (i.e., identity theft, encryption, malware). An abstract is a stand-alone document, and therefore should not include citations because it would need references.
Introduction – Present enough information about the proposed work that it is easy to understand the general context of your work. It should include a summary of how the rest of the document is organized.
Problem Statement – Present a concise, literature-supported statement of the issue you have identified. The statement of the problem should be followed with a well-supported discussion of the its scope and nature. It should include: what the problem is and how it has evolved to its current state.
Literature Review – The literature review will expand on the problem statement. It should include the following elements:
· an overview of the subject, along with the objectives of the review;
· identification of the prior works including the strengths and weaknesses of existing studies;
· Identification of any gaps in the literature;
· Analysis of the research methods used in previous studies and whether they were reliable and/or valid;
· An discussion of the literature presented in a way that helps the reader gain a new understanding of the literature; and
· Summary of the review
With the exception of the abstract, the remainder of the literature review should be double spaced and follow APA formatting guidelines.
Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.
[order_calculator]