Demonstrate the ability to create a final project that uses both research-based and personal content?while using presentation software to communicate with an intended audience
Instructions
Goal: Demonstrate the ability to create a final project that uses both research-based and personal content while using presentation software to communicate with an intended audience.
Description:
During the first six-weeks you formulated a project plan, researched the content of the plan, and collected quality academic and non-academic sources. For the week 7 Final Project you will create a presentation (CO8) that builds upon the Week 3 Project Plan and the Week 5 Location and Access (Source Organization worksheet) that effectively communicates the knowledge you have gained during COMM120.
Please consider the following:
- Presentation will include an introduction, body, conclusion, and properly formatted reference/work cited slide in the citation style of your degree program (APA, MLA, or Chicago).
- Clear evidence that the topic was researched and expanded upon the week 2 Project Plan (CO2 & 5).
- Presentation provides audience with information to increase their knowledge of the topic presented (CO1).
- Presentation engages the audience by using elements such as images, graphs, and charts. Appropriate citations must be included.
- Three (3) vetted credible sources. One (1) of the sources must be scholarly and from the library.
- Appropriate length 7-9 slides.
If you have multimedia skills and want to add creative content to your presentation, please do! Try to add any of the following enhancements and as you do, think about how it will impact your presentation and improve communication with the intended audience.
- Voice narration, closed captioning, script.
- Appropriate background music (must be cited on reference page).
- Creative use of slide animations and transitions.
After submitting your presentation, review your TurnItIn Originality Report. (Note: Review the individual flags, decide why that text is flagged, and make corrections as appropriate.). Please see the attached rubric for grading guidelines.
Note: The Week 7 Final Project is a presentation and be turned in as a PowerPoint, a Prezi, or a different type of presentation software. If you chose something other than PowerPoint, you have to do the following:
- Submit a link to the presentation such as for Prezi.
- Ensure that the faculty can open the presentation.
- turn in a document with the presentation material so it can go through Turnitin.
- If you have a question, please contact your faculty member.
1
The Importance of Cybersecurity
Name
Institution
Date
Garlin Saintice
AMU
2024/01/16
2
The Importance of Cybersecurity
Internet safety matters a lot nowadays. It is not just about keeping data safe. It is also
shielding everyone, from regular people to businesses and governments, from online threats
(Perwej et al., 2021). These dangers grow as technology evolves. Folks who look for digital
weaknesses to take advantage of often create risks. To really get cybersecurity, you need to know
all its parts. It includes both tech stuff, like coding data and using firewalls, and people stuff, like
how internet scammers trick people. Hence, the significance of this study lies in the fact that it
enhances our own online safety and provides assistance to professionals working in industries
where the protection of digital assets is of utmost importance.
Communication Medium
You can show findings about internet safety in many formats. You can use things like
graphics, videos or interactive presentations to make hard tech ideas easier for everyone to
understand. Plus, showing reallife examples can make the information more practical. It shows
how internet safety actions actually work. Making a different, interesting presentation is key to
properly showing why internet safety matters.
Critical Thinking Questions
Thinking deeply about cybersecurity's many sides with these critical questions will help
in digging into the topic better than just a basic understanding would. Here are some things to
ponder:
a) How are cyber threats changing, and how can we all try to outsmart them?
b) What part do people play in making cybersecurity weak, and how can we reduce this
problem?
c) How does working with other countries help fight cyber threats across the globe?
3
d) Where does the line cross between using cybersecurity ethically and protecting personal
privacy?
e) How are new things like artificial intelligence affecting cybersecurity, for better or
worse?
Possible Subtopics
One can examine different angles of cybersecurity in these optional subtopics. They broaden the
essay, covering multiple aspects of cybersecurity.
a) Cybersecurity's Effect on National Security.
b) How Ethical Hacking Aids Cybersecurity.
c) Cybersecurity Breaches' effects on Financial Institutions.
d) Programs for Cybersecurity Awareness and Education.
e) Legal Rules and Standards in Cybersecurity.
Reflection
When doing research on this topic, one should focus on solid sources like academic
articles, wellknown cybersecurity journals, and trusted security group reports (Perwej, et al.,
2021). Interview transcripts with cybersecurity pros and experts are also great, giving reallife
views on the field's problems and progress (Fujs, 2019). It is key to make sure information is
believable, uptodate, dependable, precise, and linked to the topic. This leads to strong points
and helps the audience truly get why cybersecurity matters.
4
References
Fujs, D., Mihelič, A., & Vrhovec, S. L. (2019, August). The power of interpretation: Qualitative
methods in cybersecurity research. In Proceedings of the 14th International Conference
on Availability, Reliability and Security (pp. 110).
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature
review on the cyber security. International Journal of scientific research and
management, 9(12), 669710.
,
1
The Importance of Cybersecurity
Name
Institution
Date
Garlin Saintice
AMU
2024/01/16
2
The Importance of Cybersecurity
Internet safety matters a lot nowadays. It is not just about keeping data safe. It is also
shielding everyone, from regular people to businesses and governments, from online threats
(Perwej et al., 2021). These dangers grow as technology evolves. Folks who look for digital
weaknesses to take advantage of often create risks. To really get cybersecurity, you need to know
all its parts. It includes both tech stuff, like coding data and using firewalls, and people stuff, like
how internet scammers trick people. Hence, the significance of this study lies in the fact that it
enhances our own online safety and provides assistance to professionals working in industries
where the protection of digital assets is of utmost importance.
Communication Medium
You can show findings about internet safety in many formats. You can use things like
graphics, videos or interactive presentations to make hard tech ideas easier for everyone to
understand. Plus, showing reallife examples can make the information more practical. It shows
how internet safety actions actually work. Making a different, interesting presentation is key to
properly showing why internet safety matters.
Critical Thinking Questions
Thinking deeply about cybersecurity's many sides with these critical questions will help
in digging into the topic better than just a basic understanding would. Here are some things to
ponder:
a) How are cyber threats changing, and how can we all try to outsmart them?
b) What part do people play in making cybersecurity weak, and how can we reduce this
problem?
c) How does working with other countries help fight cyber threats across the globe?
3
d) Where does the line cross between using cybersecurity ethically and protecting personal
privacy?
e) How are new things like artificial intelligence affecting cybersecurity, for better or
worse?
Possible Subtopics
One can examine different angles of cybersecurity in these optional subtopics. They broaden the
essay, covering multiple aspects of cybersecurity.
a) Cybersecurity's Effect on National Security.
b) How Ethical Hacking Aids Cybersecurity.
c) Cybersecurity Breaches' effects on Financial Institutions.
d) Programs for Cybersecurity Awareness and Education.
e) Legal Rules and Standards in Cybersecurity.
Reflection
When doing research on this topic, one should focus on solid sources like academic
articles, wellknown cybersecurity journals, and trusted security group reports (Perwej, et al.,
2021). Interview transcripts with cybersecurity pros and experts are also great, giving reallife
views on the field's problems and progress (Fujs, 2019). It is key to make sure information is
believable, uptodate, dependable, precise, and linked to the topic. This leads to strong points
and helps the audience truly get why cybersecurity matters.
4
References
Fujs, D., Mihelič, A., & Vrhovec, S. L. (2019, August). The power of interpretation: Qualitative
methods in cybersecurity research. In Proceedings of the 14th International Conference
on Availability, Reliability and Security (pp. 110).
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature
review on the cyber security. International Journal of scientific research and
management, 9(12), 669710.
,
EXEMPLARY
(4 pts) ACCOMPLISHED
(3.4 pts) DEVELOPING
(3 pts) BEGINNING
(2.6 pts) DID NOT ATTEMPT
(0 pts)
Use Information
Effectively* (40%)
(ILO-AL.A.2)
Communicates, organizes and synthesizes information from sources to fully achieve a specific purpose, with clarity and depth. Provides the audience with substantive information that increases their knowledge of the topic.
Communicates, organizes and synthesizes information from sources. Intended purpose is achieved. Provides the audience with information that increases their knowledge of the topic.
Communicates and organizes information from sources. The information is not yet synthesized, so the intended purpose is not fully achieved. Did not provide the audience with information that increases their knowledge of the topic.
Communicates information from sources. The information is fragmented and/or used inappropriately (misquoted, taken out of context, or incorrectly paraphrased, etc.), so the intended purpose is not achieved. Did not provide the audience with information that increases their knowledge of the topic.
Student did not attempt.
Presentation Organization
(20%)
The organization of the presentation includes an introduction, body, conclusion, and properly formatted reference/works cited page.
The organization of the presentation includes an introduction, body, conclusion, and reference/works cited page.
The organization of the presentation includes an introduction, body, and conclusion, but no reference/works cited page
The presentation lacks a cohesive organization or a reference/works cited page.
Student did not attempt.
Graphics and Appearance
(20%)
Effective use of bullets and spacing on all slides. Pictures, in addition to the slide background are used strategically on slides. A professional-looking slide background is used.
Effective use of bullets and spacing on most slides. Pictures used on some slides. A professional-looking slide background is used.
Effective use of bullets and spacing on is inconsistent on the slides or pictures are not used appropriately or a professional-looking slide background
Effective use of bullets and spacing on is inconsistent on the slides and pictures are not used appropriately and a professional-looking slide background is not used.
Student did not attempt.
Sources and Evidence*
(10%)
Demonstrates skillful use of high- quality, credible, relevant sources to develop ideas that are appropriate for the discipline and genre of the writing
Demonstrates consistent use of credible, relevant sources to support ideas that are situated within the discipline and genre of the writing.
Demonstrates an attempt to use credible and/or relevant sources to support ideas that are appropriate for the discipline and genre of the writing.
Demonstrates an attempt to use sources to support ideas in the writing.
Student did not attempt.
Writing Quality* (10%)
Uses graceful language that skillfully communicates meaning to readers with clarity and fluency, and is virtually error- free.
Uses straightforward language that generally conveys meaning to readers. The language in the portfolio has few errors.
Uses language that generally conveys meaning to readers with clarity, although writing may include some errors.
Uses language that sometimes impedes meaning because of errors in usage.
Student did not attempt.
*Portions of this rubric come from the AAC&U Value Rubrics. Retrieved from https://www.aacu.org/value-rubrics
The Sources and Evidence and Writing Quality criteria come from the AAC&U Written Communication Value Rubric
The Use Information Effectively criteria comes from the Information Literacy Value Rubric.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.