How well does author explain their method of collecting data


Homework

Select a peer reviewed article that is focused on one of the following subject areas:

a. Port Security
b. Vulnerability of the Maritime Transportation Security (MTS)
c. Vulnerability to world shipping
d. Threats presented within the Maritime focused cyber space
e. Maritime cyber security
f. Treatment of longshoreman in developing countries
g. Resilience and Maritime Security

Include the following information:

a. Article name and author

b. Is there a research question that it clearly stated or implied? If so, what is it? Do you believe it is academically rigorous?

c. Is there a hypothesis or thesis or central argument that is clearly stated or implied? If so, what is it?

d. Does the Author answer the "So What?" Were you convinced that the study was worth doing?

e. Is the study unique in any way?

f. What are the main points of the article?

g. What kind of literature review is provided and/or what sources are cited? How well does it fulfill that purpose?

h. How well does the Author explain their method of collecting and analyzing data? Could you replicate the study based upon the article before you?

i. Is there any discussion of variables? Is so, how? Does the Author look at alternative points of view?

j. Do the study's findings support the authors Goals or Thesis? How valid are they?

k. Does the conclusion follow from the evidence provided? Are you persuaded by it? Why or Why Not?

l. Does the Author address the implications of these results? If so, how comprehensively is this done?

m. Do you notice other strengths and limitations of this study?

Format your homework according to the give formatting requirements:

a. The answer must be double spaced, typed, using Times New Roman font (size 12), with one-inch margins on all sides.

b. The response also includes a cover page containing the title of the homework, the course title, the student's name, and the date. The cover page is not included in the required page length.

c. Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: How well does author explain their method of collecting data
Reference No:- TGS03110067

Now Priced at $40 (50% Discount)

Recommended (95%)

Rated (4.7/5)