Please read the attachments below and provide an annotated bibliography for the reference list provided. This is a graduate
Please read the attachments below and provide an annotated bibliography for the reference list provided. This is a graduate level class. Be very careful with it and provide the best solution possible.
This is the research question
President Obama vs President Trump Cybersecurity Strategy
President Obama’s 2016 Cybersecurity Strategy versus President Trump’s 2017 Cybersecurity Strategy
1. Introduction
2. Cybercrime becoming A Critical National and Global Threat.
3. Overview of President Obama’s overall Cybersecurity Strategy during his term.
4. Overview of President Trump’s Cybersecurity strategy during his term.
5. President Obama’s 2016 Cybersecurity strategy to combat cybercrime
6. President Trump’s 2017 Cybersecurity strategy to combat cybercrime
7. Differences and Similarities between the 2016 and 2017 Cybersecurity Strategy
8. Conclusion and Biblical worldview, An ethics-based analysis and/or a worldview analysis.
Annotated bibliography instruction
Overview
An annotated bibliography is a tool often used by researchers to record findings in important scholarly work that relates to their research question(s). An annotated bibliography is a listing of sources, with each entry followed by a brief paragraph summarizing key arguments, concepts, information, important findings, and conclusions. In addition, there should be a brief evaluation of the source (e.g., accuracy, relevance, quality), the professional or personal or other bias (if any) and worldview (if decipherable) of the author(s). Summaries may include properly cited quotations or data from the work but must be in the researcher’s own writing.
Instructions
Requirements for this paper are outlined as follows:
· Length of assignment is 4 full body pages.
· Format of assignment is the latest version of APA.
· Title page, and annotations; no reference page(s) are required.
· 9 Total references/sources with 7 of them scholarly sources relevant to your topic
· The Analysis Paper: Annotated Bibliography Assignment must be formatted in current APA Author-Date Reference list style, with a paragraph of descriptive annotations following each list entry with about 125 words for each annotation. A very brief evaluation (evaluative annotation) will be included at the end—usually 1–2 sentences.
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.
,
References
Azhibayev, M. G., & Dzhanadilov, O. M. (2018). Cybercrime as a modern threat to military security. J. Advanced Res. L. & Econ., 9, 1551.
Blinderman, E., & Din, M. (2017). Hidden by sovereign shadows: Improving the domestic framework for deterring state-sponsored cybercrime. Vand. J. Transnat'l L., 50, 889.
Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime: attack motivations and implications for big data and national security. In Application of big data for national security (pp. 108-127). Butterworth-Heinemann.
Iasiello, E. (2016). China’s three warfares strategy mitigates fallout from cyber espionage activities. Journal of Strategic Security, 9(2), 45-69.
Nye Jr, J. S. (2016). Deterrence and dissuasion in cyberspace. International security, 41(3), 44-71.
Patel, K., & Chudasama, D. (2021). National security threats in cyberspace. National Journal of Cyber Security Law, 4(1), 12-20p.
Shackelford, S. J. (2016). Protecting intellectual property and privacy in the digital age: the use of national cybersecurity strategies to mitigate cyber risk. Chap. L. Rev., 19, 445.
Tengjun, Z. (2018). The cybersecurity policy adjustment of the Trump administration. China Int'l Stud., 72, 128.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.