Paper instructions:
Conduct a robust literature review of a current CyberSecurity, information security issue. The literature review must consist of the following elements:
Abstract single-spaced and includes a summary of the proposed research and how it constitutes an
original contribution in your respective field (i.e., identity theft, encryption, malware). An abstract is a stand-alone document, and therefore should not include citations because it would need references.
Introduction – Present enough information about the proposed work that it is easy to understand the general context of your work. It should include a summary of how the rest of the document is organized.
Problem Statement Present a concise, literature-supported statement of the issue you have identified. The statement of the problem should be followed with a well-supported discussion of the its scope and nature. It should include: what the problem is and how it has evolved to its current state.
Literature Review The literature review will expand on the problem statement. It should include the following elements:
· an overview of the subject, along with the objectives of the review;
· identification of the prior works including the strengths and weaknesses of existing studies;
· Identification of any gaps in the literature;
· Analysis of the research methods used in previous studies and whether they were reliable and/or valid;
· An discussion of the literature presented in a way that helps the reader gain a new understanding of the literature; and
· Summary of the review
With the exception of the abstract, the remainder of the literature review should be double spaced and follow APA formatting guidelines.