Research Paper Presentation ? With the information you gathered for your Research Paper, you will now create an intriguing visual presentation and present it to the class. P
- Research Paper Presentation
- With the information you gathered for your Research Paper, you will now create an intriguing visual presentation and present it to the class.
- Presentation should include following slides-
- Introduction (1 slide)
- literature review (2 slide)
- Analysis of the literature (1slide)
- Discussion paragraphs 1, 2, 3 (2 slide)
- Conclusion (1slide)
- Title page and reference list (2 slides)
- Your presentation should be between 5-7 minutes long; practice it several times beforehand!
Chocolate!
What is the name of your favorite kind in the chat bar!
Sorry!!!!!
I am sure I made you hungry!!
You’ll see, it was all for a good cause!
Today, you will write the introduction and conclusion for to your research paper!
A research paper typically includes these sections:
• Introduction • Literature review • Discussion • Conclusion
You have written these parts of your research paper:
• Introduction • Literature review • Discussion • Conclusion
Today you will write
• Introduction • Literature review • Discussion • Conclusion
Introduction
• Opening Sentence – Grab the attention of your reader – Make them want to read more!
Sentences in between • Closing Sentence – Thesis Statement* – States your stance/recommendation for your
reader (the rest of the paper will literally expand on this one sentence – you’ll see!)
SO… BACK to chocolate!
SO… BACK to chocolate!
Sorry!!!
A little-known fact…
According to Forbes (2020), Americans consume an average of 11 pounds of chocolate per person per year.
According to Forbes (2020), Americans consume an average of 11 pounds of chocolate per person per year.
Did you know that?!
(By the way, there are resources about the
Opening Sentence on page 60 of your manual!
Flip to it!)
Can you find all the elements of an opening sentence here?
According to Forbes (2020), Americans consume an average of 11 pounds of chocolate per person per year.
Hint: here are the elements: • a surprising, disturbing, little-known, or
wonderful fact • a statistic • an in-text citation
Wait!
I found it, but I don’t know how to DO it!
In-text citations!
In-text citations need
Who wrote it When
Two ways to cite: (p. 33-38 in manual)
author names are part of the sentence (narrative format)
author names and date of publication are not part of the sentence
(parenthetical format)
Remember….
Who wrote it When
Examples
One Author Research by Smith (2004) found… Recent research (Smith, 2004) found…
Two Authors Research by Wager and Petty (1994) found… Paraphrased material (Wager & Petty, 1994).
Which way of citing is used here?
According to Forbes (2020), Americans consume an average of 11 pounds of chocolate per person per year.
Now YOU write an opening sentence on YOUR topic.
This will open your research paper!
Expect to spend 20-40 minutes on this one sentence!!! Surprising, but true!!
Break time!
Please read the top of p. 61 in your manual
What is a thesis statement?
The Thesis Statement: Justifying Your Stance Based on
Research
The thesis statement
Is the driving force of your paper based on research Contains no opinions or generic and broad advice Contains your stance on the topic based on research.
The Thesis Statement: Justifying Your Stance Based on
Research
The thesis statement
Is the driving force of your paper based on research Contains no opinions or generic and broad advice Contains your stance on the topic based on research.
The Thesis Statement Justifying Your Stance Based on
Research
The thesis statement
Is the driving force of your paper based on research Contains no opinions or generic and broad advice Contains your stance on the topic based on research.
The Thesis Statement Justifying Your Stance Based on
Research
The thesis statement
Is the driving force of your paper based on research Contains no opinions or generic and broad advice Contains your stance on the topic based on research.
General Formula
topic + your stance on the topic + how your stance is supported by research
(citation) = your thesis statement
Formula
topic + your stance on the topic + how your stance is supported by research
(citation) = your thesis statement
General Formula
topic + your stance on the topic + how your stance is supported by research
(citation) = your thesis statement
General Formula
topic + your stance on the topic + how your stance is supported by research
(citation) = your thesis statement
General Formula
topic + your stance on the topic + how your stance is supported by research
(citation) = your thesis statement
Now, Let’s write YOURS on YOUR topic!
Expect to spend 25 -45 minutes on this. This is a hard one, because it is the outline to your paper!!!
See samples on pp 61-63
Take a BREATH!!!
Where in the Opening
Paragraph does the
thesis statement go?
Where in the Opening Paragraph
does it go?
It’s the LAST sentence of the Opening Paragraph
(and helps you to organize your paper!)
Now, you have the two “BOOKENDS!”
Your opening sentence
Now, you have the two “BOOKENDS!”
Your opening sentence
Your thesis statement
and
Green = Opening sentence meant to grab reader’s attention Red = Sentences in between that are needed to transition from Green to Blue Blue = Recommendation based on research
Food fraud has been identified in multiple communities, and in some cases there is a rise in this fraudulent behavior with the increase in different needs regarding food types (Northern District of Iowa, 2019this s). Food fraud refers to the deliberate alteration of food, related ingredients, or packaging, as well as the creation of false or deceptive assertions about a product in order to profit financially (Spink & Moyer, 2011, as cited in Levy, 2020). This fraud can cause damage to consumers’ health, or can affect entire supply chains (Northern District of Iowa, 2019). Food fraud has been found in the research and in (popular press/relevant journals) to be a threat to public health as well as to the economy. Due to food fraud’s threats to segments of business as well as communities, government and food, organizations should install more efficient legislature such as (name of policy with citation) to oversee and regulate the food chains operated by independent providers such as farmers and sole proprietors.
Please write your
opening paragraph in color!
• Start with your opening sentence • Have red sentences in the
middle • End with your thesis
statement
Conclusion Paragraph
• Most students overthink this but think of it like a mirror image of your introduction paragraph.
So… Turn the opening paragraph upside down!
Conclusion Paragraph Turn the opening paragraph upside down!
Food fraud has been identified in multiple communities, and in some cases there is a rise in this fraudulent behavior with the increase in different needs regarding food types (Northern District of Iowa, 2019). Food fraud refers to the deliberate alteration of food, related ingredients, or packaging, as well as the creation of false or deceptive assertions about a product in order to profit financially (Spink & Moyer, 2011, as cited in Levy, 2020). This fraud can cause damage to consumers’ health, or can affect entire supply chains (Northern District of Iowa, 2019). Food fraud has been found in the research and in (popular press/relevant journals) to be a threat to public health as well as to the economy. Due to food fraud’s threats to segments of business as well as communities,government and food, organizations should install more efficient legislature such as (name of policy with citation) tooversee and regulate the food chains operated by independent providers such as farmers and sole proprietors.
Conclusion Paragraph Turn the opening paragraph upside down!
Due to food fraud’s threats to segments of business as well as to communities, government and food, organizations should install more efficient legislature such as (name of policy with citation) to oversee and regulate the food chains operated by independent providers such as farmers and sole proprietors. Food fraud has been found in the research and in (popular press/relevant journals) to be a threat to public health as well as to the economy. This fraud, as seen in the research (cite all research studies from the literature review), can cause damage to consumers’ health, or can affect entire supply chains (Northern District of Iowa, 2019). The (recommended action) is necessary, as food fraud has been identified in multiple communities, and in some cases there is a rise in this fraudulent behavior with the increase in different needs regarding food types (Northern District of Iowa, 2019).
,
3
Literature Discussion: Hacking on Social Media Platforms
Students Name
Professors Name
Course Title
Date
Discussion
Social media usage has increased rapidly with the emergence of the Covid-19 pandemic. People have engaged in social media in shopping, education, business, and other social activities. As the usage of social networks increased rapidly, both negative and positive impacts affected humans. All this led to illegal activities and social crimes such as password attacks, blackmailing, spyware, phishing, ransomware, hacking, and middleman attack. According to Suciu (2022), 5.4 million Twitter accounts are vulnerable to hackers, which could expose vital user information. This literature mainly discusses the issue of hacking social media platforms, provides solutions to the problem and recommends how to handle hackers in the future. In social media, most of the activities involved involve sharing data, education, business, and information. Numerous people share personal information on media platforms, thus enabling attackers or hackers to tamper with it either externally or internally. Due to Covid-19 physical working places have been changed to online workflow to control the spread of the virus. Therefore the use of social media has increased. Unlike before, hackers mainly use the same information updated to get their targets. Hackers are getting smarter daily; nowadays, they hide their attacks on social media posts (Malik et al., 2016).
Mitigations
For many years social media and other digital platforms have been the main source of information for users. With many misunderstandings and misconceptions about social media information, it played a great role in supporting evidence-based content. During the pandemic, communication frequency increased, and there was minimal secrecy of the information (Malik et al., 2016). People kept posting their daily lives and achievements on social networks, hence increasing hacking cases. To deal with the hacking issue on social media, one needs to keep updating their mobile apps regularly and ensure they have a unique password and email, which shall keep their accounts secure. People should monitor their accounts regularly to check if any suspicious activities are happening. When looking for likes or followers, one should consider the kind of friends they would have. Organizations should embrace the use of internal communication, which considers several factors such as age, cultural diversity, literacy, and beliefs that may positively influence individuals' perception of internal communication (Ecklebe & Loffler, 2021). In an organization, there should be system access management. Each user should have a different login and password to increase security and improve its performance due to a secure environment. Numerous schools have opted to develop innovative and successful methods through which they may conduct performance-based assessments online (Du et al., 2016).
Recommendations
Effective communication and the right education should be directed to the public on how they should be dealing with personal or organizational social networking accounts. Over the last few years, social media has always been the main source of information, and its uses have increased rapidly (Malik et al., 2016). In the future, if a trustworthy and confident interface can be established, such risks may be reduced. The most important step that should be applied to reduce the risk of hacking is the creation of awareness. Users should be trained to avoid security threats and spread awareness via online campaigns, seminars, or events. We are living in a world of advanced technology. Therefore, there is a need for social media users to understand how they can avoid breaching privacy and information leakages. Passwords should not be kept for long because they make the systems to be vulnerable to attacks.
References
Du, H.S., Chu, S.K.W., Chan, R.C.H. and He, W. (2016), "Collaborative writing with wikis: an empirical investigation", Online Information Review,40(3), 380-399. https://doi.org/10.1108/OIR-06-2015-0173
Ecklebe, S. and Löffler, N. (2021), "A question of quality: perceptions of internal communication during the Covid-19 pandemic in Germany", Journal of Communication Management, 25(3), 214-232. https://doi.org/10.1108/JCOM-09-2020-0101
Malik, A., Dhir, A., Kaur, P., &Johri, A. (2020). Correlates of social media fatigue academic performance decrement: a large cross-sectional study. Information Technology & People. https://doi.org/10.1108/JCOM-01-2019-0002
Suciu P., (2022). Social Media User Information for Sale On the Dark Web. Forbes. https://www.forbes.com/sites/petersuciu/2022/07/27/social-media-user-information-for-sale-on-the-dark-web/?sh=33ad5ae77111
,
2
Name
Affiliation
Course
Instructor's
Date
Part 1
Compare: How are your articles similar for each section below?
a. Methodology
According to Du et al. (2016), assessing the revisions history and composition of wiki pages yielded both quantitative and qualitative information. Ecklebe & Löffler. (2021) employ an SEM paradigm with the lavaan package to test their assumptions. The SSO concept is employed by Malik et al. (2020). The study is built around the results of two separate cross-sectional surveys given to college-aged individuals. This and the other outlet both rely on first-hand accounts for their reporting. Thus, there is a large discrepancy in the research methods used by the two groups. But Ecklebe & Löffler. (2021) and Malik et al. (2020) are similar to each other.
b. Findings
Both Du et al. (2016) and Malik et al. (2020) found that differential usage of social networking sites and the prevalence of teamwork were shown to be very noteworthy amongst elementary, intermediate, and undergrads. On the contrary, all three sources (Du et al., 2016; Ecklebe & Löffler, 2021 and Malik et al., 2020) showed how using social networks might have repercussions in the workplace and among pupils of various ages.
c. Recommendations
According to Ecklebe & Löffler's (2021) study, companies may influence how employees rate the efficiency of their communication within the organization by considering a number of factors. Both (Du et al., 2016; Malik et al., 2020) suggest ways of increasing awareness of social media users. Wikis in elementary schools need a notification system to encourage users to edit and upload new material. Periodic lectures and therapy services must be given by institutions to deal with the issues and worries linked with social media activity and abusive behavior.
Part Two: Review
Hacking On Social Media Platforms
Anxiety over being hacked has coincided with a broad reduction in trust in social media. Individuals who use a particular social network may become exhausted from constantly adjusting their profile settings to protect their privacy (Malik et al., 2020). In contrast, Du et al. (2016) Search-Together is a tool that allows people to learn with each other in teams to develop and update online data in real-time. Similarly, personnel should be familiar with the need for efficient inner conflict management and the protocols that should be followed during an outbreak. (Ecklebe & Löffler, 2021).
Social Media Platforms usage
It's also possible that people's internet usage was influenced by their seclusion from other individuals during the curfew, which raises the issue of whether the restrictions enforced during the quarantine led to an increase in the prevalence estimates of prolonged social media activity (Ecklebe & Löffler, 2021). According to Malik et al. (2020), whenever consumers change their content available to both the web and the public, they put themselves at risk of falling victim to password hacking and cyber surveillance. In comparison to reports produced by learners in middle and high school, those written by college freshmen on a joint wiki showed substantially more regular communication. Their social media usage is high (Du et al., 2016).
Approaches to reduce hacking
According to Malik et al. (2020), a growing collection of research documents the deleterious impacts of excessive social networking site use in developing countries. This is particularly true in postsecondary learning, where instructors must give as much support and guidance as possible via digital means, which could be mitigated if pupils have experience writing on their own and collaborating with others (Du et al., 2016). Discourage the use of social media as a means of maintaining a sense of community during the shutdown (Ecklebe & Löffler, 2021).
References.
Du, H. S., Chu, S. K., Chan, R. C., & He, W. (2016). Collaborative writing with wikis: An empirical investigation. Online Information Review, 40(3), 380-399. https://doi.org/10.1108/oir-06-2015-0173
Ecklebe, S., & Löffler, N. (2021). A question of quality: Perceptions of internal communication during the COVID-19 pandemic in Germany. Journal of Communication Management, 25(3), 214-232. https://doi.org/10.1108/jcom-09-2020-0101
Malik, A., Dhir, A., Kaur, P., & Johri, A. (2020). Correlates of social media fatigue and academic performance decrement. Information Technology & People, 34(2), 557-580. https://doi.org/10.1108/itp-06-2019-0289
,
2
Hacking On Social Media Platforms
Your Name
Your Institution
Course
Instructor's Name
Date
Hacking On Social Media Platforms
Introduction
According to the findings of this study, hacking on social networking sites has an influence on users, particularly students (Du et al., 2016; Malik et al., 2020). Since students' performance decreases when they are allowed to use social media during class, teachers must take steps to control the situation. Information on users, particularly students, and on internal communication throughout Germany's COVID-19 lockdown are culled from the aforementioned study publications and literature (Ecklebe & Löffler, 2021). Hacking, the impacts of social media on students, student concentration in the classroom, and effective classroom management were some of the search phrases used to locate the relevant literature.
Review of Literature
Du et al. (2016) looked into how students in Hong Kong's elementary, secondary, and higher education settings collaborated on wiki-based CW projects and how they used these tools. Examination of wiki pages' history of changes and their actual content yielded both qualitative and quantitative information. The findings revealed that students' education level had a significant effect on their CW actions, as well as their engagement and synchronization tendencies used to co-construct the project. Furthermore, there was a notable difference in the regularity of collaborative activities among students in elementary, secondary, and higher education.
Malik et al. (2020) use Stressor-strain-outcome (SSO) theory to analyze the causes and effects of social media burnout. Two separate cross-sectional surveys were conducted with college-aged participants for this investigation. One thousand three hundred and ninety-eight WhatsApp users (between 19 and 27 yrs.) participated in Study A, while forty-seventy-two participants made up Study B (between 18 and 23 yrs.). Significantly predictive of media platforms burnout were self-disclosure and online social comparison. It appears that social media tiredness adds even more to a decline in educational outcomes, according to the results.
Ecklebe & Löffler. (2021) surveyed workers in Germany polled (n = 934) to provide a cross-section of the country's workforce. "Confirmatory factor analysis (CFA) was used to verify the data's dimensionality, and then a structural equation model (SEM) was run in R with the lavaan package to test the hypotheses." (Ecklebe & Löffler, 2021, pp. 214-232). This study sheds light on the many aspects of team interaction that helped get us through the Covid-19 crisis, including the timeliness and quantity of information shared, the encouragement of employee participation, and a firm stance against keeping information under wraps. The findings also highlight the need for open and honest communication inside an organization to foster a strong team spirit and mutual respect.
Analysis of Literature
There are risks associated with social media use that extend beyond the consumers themselves and into the realms of networks and providers. According to Malik et al. (2020), in order to maximize their user base, social media sites encourage users to create and share content. People would risk identity fraud, hacking of their accounts, harassment, and online monitoring when they maintain a media profile and share content inside the system and with the general.
Ecklebe & Löffler. (2021) supports the idea that it is critical to have internal communications that are strategically aligned during the COVID-19 epidemic. Companies may improve their internal communication, as seen by their staff, by taking into account a variety of elements. This research examines the theoretical implications of high-quality internal information by discussing and examining how this idea might be operationalized.
Teachers need to provide as much internet coaching as possible, and interaction may be reduced at the middle school, and undergraduate stages as learners build greater proficiency in writing and collaborative abilities. According to Du et al. (2016), primary school children were also linked to the least common input activities an
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.