Lit Review
25 pages
APA Format
10 sources min
see attached for outline
the themes are:
– terrorism (at home and abroad)
– critical infrastructure
– ( haven’t picked out a third one yet, let me know if you do)
Remember all of this has to do with cyber warfare and American cyber laws, whether or not they protect america good enough and why we need better cyber laws
Literature Review Outline Template
Jackson
RES 5000/6000
Appalachian State University
Literature Review Outline
I. Introduction
a. Describe the overall topic that you have been investigating, why it is important to the field, and why you are interested in the topic.
b. Identify themes and trends in research questions, methodology, and findings. Give a “big picture” of the literature.
II. Theme A
a. Overview of characteristics of the theme (commonalities, differences, nuances)
b. Sub-theme – narrow but grouped findings related to the theme
i. Study 1 (Research question(s), Methods/Participants, Related Findings)
ii. Study 2 (Research question(s), Methods/Participants, Related Findings)
iii. Study 3 (Research question(s), Methods/Participants, Related Findings)
c. Sub-theme – narrow but grouped findings related to the theme
i. Study 4 (Research question(s), Methods/Participants, Related Findings)
ii. Study 5 (Research question(s), Methods/Participants, Related Findings)
iii. Study 6 (Research question(s), Methods/Participants, Related Findings)
d. Etc., etc., etc. with other findings that fit Theme A; studies can be repeated if there are multiple findings that fit under more than one theme. However, no need to re-write methods/participants in detail (just enough to remind the reader about the study).
III. Theme B – follow a, b, c, and so on from above
IV. Keep repeating with themes
V. Conclusion:
An evaluation/critique of the existing literature
. Write several paragraphs.
a. What are the contributions of this literature to the field?
b. What are the overall strengths?
c. What are the overall weaknesses?
d. What might be missing?
e. What are some next steps for research? The next steps should explicitly address how to “correct” for strengths, weaknesses, and gaps.
Use APA level headings 1, 3, & 4. See Creswell (page 112) or APA manual for formatting.
Review of the Literature on Girl Culture (Level 1)
Resistance (Level 3)
Overview of resistance. (Level 4)
Resistance to teachers. (Level 4)
Resistance as strategic. (Level 4)
Resistance as subconscious. (Level 4)
� Remember: The theme is a broad word or phrase that synthesizes a more narrow group of related findings. E.g., a theme of “Resistance” would include types of resistance, resistance to whom, resisting what, etc.
SOME REFERENCES PREVIOUSLY USED
Cimbala, S. (2017). Nuclear deterrence and cyber warfare: coexistence or competition? Defense & Security Analysis, 33(3), 193-208.
Galinec, D., Možnik, D., & Guberina, B. (2017). Cybersecurity and cyber defence: national level strategic approach. Automatika, 58(3), 273-286.
Garrie, D. (2013). Journal of law & cyber warfare. Lulu Com.
Schmitt, M. (2015). Tallinn manual on the international law applicable to cyber warfare. Cambridge: Cambridge University Press.
Cimbala, S. (2017). Nuclear deterrence and cyber warfare: coexistence or competition?. Defense & Security Analysis, 33(3), 193-208. Retrieved from
https://doi.org/10.1080/14751798.2017.1351142
Dilbert, R. W. (2016). United States cybersecurity enforcement: leading roles of the Federal Trade Commission and state attorneys general. Northern Kentucky law review, 1-28. Retrieved from https://chaselaw.nku.edu/content/dam/chase/docs/lawreview/v43/nklr_v43n1
Galinec, D., Možnik, D., & Guberina, B. (2017). Cybersecurity and cyber defence: national level strategic approach. Automatika, 58(3), 273-286. Retrieved from https://hrcak.srce.hr/file/299324
Klein, J. J. (2015). Deterring and Dissuading Cyberterrorism. Journal of Strategic Security, 23-38. Retrieved from http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1460&context=jss
Kosenkov, A. (2016). Cyber Conflicts as a New Global Threat. Future Internet, 8(3), 45. Retrieved from http://www.mdpi.com/1999-5903/8/3/45/htm
Mauricio, G., & Olvera, B. (2014). The security council and the illegal transfer of small arms and light weapons to non-state actors. Mexican Law Review, 6(2), 225-250. Retrieved from https://www.sciencedirect.com/science/article/pii/S1870057816300130
Shackelford, S. J. (2016). Securing North American critical infrastructure: a comparative case study in cybersecurity regulation. Canada-United States law journal, 61-70. Retrived from https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=2641&context=cuslj
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital Crime and Digital Terrorism. Upper Saddle River: Prentice Hall Press.
Top-quality papers guaranteed
100% original papers
We sell only unique pieces of writing completed according to your demands.
Confidential service
We use security encryption to keep your personal data protected.
Money-back guarantee
We can give your money back if something goes wrong with your order.
Enjoy the free features we offer to everyone
-
Title page
Get a free title page formatted according to the specifics of your particular style.
-
Custom formatting
Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.
-
Bibliography page
Don’t pay extra for a list of references that perfectly fits your academic needs.
-
24/7 support assistance
Ask us a question anytime you need to—we don’t charge extra for supporting you!
Calculate how much your essay costs
What we are popular for
- English 101
- History
- Business Studies
- Management
- Literature
- Composition
- Psychology
- Philosophy
- Marketing
- Economics