research cybersecurity capacity building|My essay solution

Posted: February 25th, 2023

Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on sources that give details about your research topic. Next, write the reference list entry (APA citation style) for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMGC Library’s “Get Help > Citing and Writing for samples and explanations of the formatting rules. If you are using APA format, your list should look something like the following.

  1. Authors.      (date). Article title. Publication name, vol(issue), #-#.
  2. Authors.      (date). Paper title. Published in the Proceedings of conference-name, pp.      #-#.
  3. Authors.      (date). Book title. City, state (or country) of publication:      Publisher.

Next, write your annotations for each source in your list. In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of the quality and usefulness of the information; you will be combining the descriptive and analytical styles of annotations.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually the first two chapters). From this information, develop a short informative or descriptive summary of the source that includes: (a) a description the information provided in the source, (b) how you plan to use this source to support your analysis of your research topic, and (c) your thoughts and opinions about the utility or quality of the source. Each annotation should be approximately 100-125 words (five to seven sentences). Place this summary after the reference list entry for the source.

For more information about annotated bibliographies, see https://libguides.umgc.edu/annotated-bibliography-apa

Submit your annotated bibliography for review and feedback from your instructor.

This project is an individual effort that you will work on throughout your capstone course for your Master of Science degree. In this project, you will research cybersecurity capacity building and then develop a proposal to help build (improve) cybersecurity capacity by improving a small nation’s cybersecurity education and training for its workforce. You will also research public-private partnerships and additional international efforts whereby nations and multinational organizations cooperate to improve global cybersecurity including efforts wherein they provide expertise and other types of assistance to nations needing to improve their cybersecurity capabilities.

 

Your work will be evaluated using the competencies listed below.

· 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.

· 7.1: Evaluate national cybersecurity policy.

· 7.4: Knowledge of policies, processes, and technologies that are used to create a balanced approach to identifying and assessing risks to information assets, personnel, facilities, and equipment, and to manage mitigation strategies that achieve the security needed at an affordable cost.

 

Read: Collett, R., & Bampaliou, N. (2021).  International cyber capacity building: Global trends and scenarios.  https://www.iss.europa.eu/sites/default/files/EUISSFiles/CCB%20Report%20Final.pdf

In this report, the authors discuss the findings of an international research study, sponsored and supported by the European Commission. The purpose of this study was to identify trends in cyber capacity building and included information derived from interviews with subject matter experts representing 50 organizations from around the world (See Annex 1. List of Interviews). Secondary data was obtained from public sources including government and organizational websites and document repositories.

Read: Ramim, M. M., & Hueca, A. (2021). Cybersecurity capacity building of human capital: Nations supporting nations.  Online Journal of Applied Knowledge Management9(2), 65–85.  https://doi-org.ezproxy.umgc.edu/10.36965/ojakm.2021.9(2)65-85

 

 

In this article, the authors discuss a  cybersecurity capacity building framework and the roles that various nations and organization play in helping building cybersecurity capacity on a global basis.

Step 2: Research International Cooperation and Joint Efforts to Improve Global Cybersecurity

 

The resources listed below provide information about current international efforts to improve global cybersecurity through cooperation between nations through projects involving businesses, governments, nongovernmental organizations, and individuals. As you review these materials, focus o

SOLUTION

  1. Abbott, L., & Goujon, P. (2019). Public-private partnerships in cybersecurity. Journal of Cybersecurity, 5(1), 1-17. https://doi.org/10.1093/cybsec/tyz005

In this article, Abbott and Goujon analyze the role of public-private partnerships (PPP) in cybersecurity. The authors examine the benefits and challenges of PPPs in cybersecurity and provide examples of successful PPPs in the US and Europe. They argue that PPPs are essential for improving cybersecurity and suggest strategies for building and sustaining effective PPPs. This article provides valuable information about PPPs that can help to inform the proposal for cybersecurity capacity building.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00