Techniques to Enhance Data Security in Education Paper
Order ID:89JHGSJE83839 | Style:APA/MLA/Harvard/Chicago | Pages:5-10 |
Instructions:
Techniques to Enhance Data Security in Education Paper
Overview: The term “abstract” is a homophone which can mean one of two scholarly writing activities. One, is the abstract that you will write to introduce your dissertation. The other meaning is a shortened writing assignment whereby you write a condensed summary of an academic journal. For this week, we will focus on writing a scholarly abstract of a qualitative journal. More information about writing an abstract can be found via the web resource “Writing Scholarly Abstracts.”
Directions: View the rubric and examples to make sure you understand the expectations of this assignment. Create a 1-2 (more is fine) page single-spaced Analysis of Research abstract published qualitative scholarly article related to your mock dissertation topic/research question from week 1.
Brevity and being concise are important as this analysis is intended to be a brief summation of the research.
Each abstract must therefore consist of the following in this order:
Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.
Author Qualifications – name and qualification of each author conducting the research
Research Concern – one paragraph summary of the reason for the overall research topic
Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research
Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)
Research Methodology – description of the population, sample, and data gathering techniques used in the research
Instrumentation – description of the tools used to gather data (surveys, tests, interviews, etc.)
Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)
Techniques to Enhance Data Security in Education Paper
RUBRIC |
||||||
Excellent Quality 95-100%
|
Introduction
45-41 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Literature Support 91-84 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Methodology 58-53 points Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met. |
|||
Average Score 50-85% |
40-38 points More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided. |
83-76 points Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration. |
52-49 points Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met. |
|||
Poor Quality 0-45% |
37-1 points The background and/or significance are missing. No search history information is provided. |
75-1 points Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration. |
48-1 points There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met |
|||
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow
Techniques to Enhance Data Security in Education Paper
|
Techniques to Enhance Data Security in Education Paper