Technology Review #1: Emerging Application of Technology (Consumer or Business).
The purpose of this technology review is to identify an emerging application of technology, suitable for use by businesses or consumers, and then research the cybersecurity implications of the technology using journal articles, papers published in conference proceedings, and research studies published in dissertations. This type of research is also referred to as a survey of the literature.
Your audience is a group of senior executives who will be meeting to decide which emerging technologies or emerging applications of technologies should be selectedfor one or more security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for a business area that will (a) develop products that incorporate emerging applications of technology or (b) depend upon such products to support their organizations operations.
The high-level visibility for your deliverable means that you need to start from a strong foundation of suitable research-based journal articles, papers published in conference proceedings, and doctoral dissertations. The basic question that must be answered is:what are the cybersecurity implications (good or bad) of a specific emerging application of technology.
In addition, the executives have expressed the following information needs, which must be met by the deliverable for this assignment.
(a) characteristics of the technology,
(b) use of the technology to support or improve cybersecurity,
(c) use of the technology to reduce or manage risk,
(d) use of the technology to increase resistance to threats/attacks,
(e) use of the technology to decrease vulnerabilities in an existing technology application,
(f) use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals.
Format your deliverable as a descriptive or informative annotated bibliography. The UMGC library provides information about how to complete this type of assignment. See http://sites.umgc.edu/library/libhow/bibliography_apa.cfm (sub-heading To get started). APA style is recommended but, you may use another professional format for your annotated bibliography.
In addition to the list of sources and annotations, you must provide an introductory paragraph.
See the rubric for additional requirements for this assignment.
Choose an Emerging Application of Technology
To begin, choose an emerging application of technology, which is suitable for future use in a consumer-oriented product or service (i.e. a new product for personal or home use) or a business-oriented product or service.Applications of technology that are currently in the emerging stages include:
Machine Learning and/or Artificial Intelligence
Data Science (especially when used to identify patterns and indicators of threats and attacks)
5G Telecommunications Networks
Physical Unclonable Functions (PUFs) (devices & electrical circuits)
Neuromorphic computer chips
You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment.
If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructors permission. Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment.
Find Appropriate Sources(Survey the Literature)
Brainstorm keywords that you can use to help find articles, papers, and other scholarly publications (sources) which discuss your chosen emerging application of technology.
Your selected sources must come from publications indexed in one or more of the following library databases:
ACM Digital Library http://ezproxy.umgc.edu/login?url=http://www.acm.org/dl
Dissertations & Theses (Pro Quest) http://ezproxy.umgc.edu/login?url=http://search.proquest.com/pqdtft/advanced?accountid=14580
IEEE Computer Society Digital Library https://www-computer-org.ezproxy.umgc.edu/csdl/home
Science Direct http://ezproxy.umgc.edu/login?url=http://www.sciencedirect.com/science/search
Since the point of this search is to find information about emerging applications of technology, your sources must have a publication date of 2017 or later (2017, 2018, 2019, 2020, 2021). For papers indexed in Science Direct, you may also use papers that are marked In Press.
Allowable source types are: (a) professional journals, (b) conference proceedings, (c) dissertations or theses, and (d) technical magazines (published by either the ACM or IEEE). Each of your selected sources must have a reference list containing at least 3 references for authoritative papers. (See http://sites.umgc.edu/library/libhow/scholarlyjournals.cfm)
To complete this part of the assignment, you may need to review 15 20 sources (search results) in order to find 10 papers or articles that are usable for this assignment. The sources you choose must provide technical information about your selected technology (see selection requirements for each paper).
Note: If you have problems accessing any of the library databases, contact the UMGC librarians via the contact methods listed on the librarys home page https://sites.umgc.edu/library/index.cfm . They will be able to assist you with login issues and/or search engine questions (but will not do your research for you).
Create YourBibliography (List of Sources)
Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones that give details about your technology and how it can be used in an emerging application of technology. Next, write the reference list entry (APA, MLA, or another appropriate professional citation style) for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMGC Librarys Get Help > Citing and Writing for samples and explanations of the formatting rules. If you are using APA format, your list should look something like the following.
1. Authors. (date). Article title. Publication name, vol(issue), #-#.
2. Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.
Write Your Annotations
In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of that information. To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper.For dissertations, look over the Introduction and the Literature Review (usually Chapters 1 & 2). From this information, develop a one to three paragraph informative or descriptive summary of the source that includes: (a) a description of technology and its characteristics, (b) planned uses of the technology (products, services, etc.), and (c) your thoughts and opinions as to how you could use this paper to justify selecting the technology for an Internal Research & Development study.
In each annotation, you should provide at least one specific example of a characteristic and/or application of the technology, e.g. an emerging technology, which impacts cybersecurity.
For example, for an annotation for an article about graphenes applications to product design, you could discuss how it could be used to manufacture cell phone cases or laptop cases which are less breakable than cases made with current materials. This could positively impact availability because the new case design using graphene would be expected to decrease the risk of breakage. Decreased risk of breakage will decrease the probability of loss of availability caused by a broken case. Decreasing the probability of a negative event will decrease the risk associated with that event
Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability. Negative impacts on the security posture will result in increased risk, decreased resistance to threats / attacks, and increased vulnerability (weakness).
As you write the annotations for each article / paper / dissertation, make sure that you include YOUR thoughts and ideas about the security implications of this technology. Use standard terminology from the readings and glossaries provided in the LEO classroom.
As you brainstorm the security implications of this technology (if these are not specifically discussed by your source), you should consider use of the technology to improve cybersecurity. Then consider applications or uses which will negatively impact the security posture of an organization or the security of individual consumers or users of the product. It is very important that you consider BOTH SIDES OF THIS ISSUE.
Putting It All Together
1. Consult the grading rubric for specific content and formatting requirements for this assignment.
2. Your 5-8 page annotated bibliography should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.
3. Your paper should use standard terms and definitions for cybersecurity.
4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the professional appearance requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignments page count.
6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) , (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more