CyberSecurity, information security issue

CHESTER BUSINESS SCHOOL
May 15, 2020
American Popular Culture of Violence in American Cinema
May 15, 2020

CyberSecurity, information security issue

Paper instructions:
Conduct a robust literature review of a current CyberSecurity, information security issue.  The literature review must consist of the following elements:

Abstract €“ single-spaced and includes a summary of the proposed research and how it constitutes an
original contribution in your respective field (i.e., identity theft, encryption, malware). An abstract is a stand-alone document, and therefore should not include citations because it would need references.

Introduction –  Present enough information about the proposed work that it is easy to understand the general context of your work.  It should include a summary of how the rest of the document is organized.

Problem Statement €“ Present a concise, literature-supported statement of the issue you have identified. The statement of the problem should be followed with a well-supported discussion of the its scope and nature.  It should include: what the problem is and how it has evolved to its current state.

Literature Review €“ The literature review will expand on the problem statement. It should include the following elements:
·        an overview of the subject, along with the objectives of the review;
·        identification of the prior works including the strengths and weaknesses of existing studies;
·        Identification of any gaps in the literature;
·        Analysis of the research methods used in previous studies and whether they were reliable and/or valid;
·        An discussion of the literature presented in a way that helps the reader gain a new understanding of the literature; and
·        Summary of the review

With the exception of the abstract, the remainder of the literature review should be double spaced and follow APA formatting guidelines.