Individual Research Assignment ENGR8762 Computer Networks and Cybersecurity GE
The topic for research is Information Security Policies.
Sections of these policies include
• Internet Acceptable Usage Policy
• eMail Acceptable Use Policy
• Malicious Software Protection Policy
• Network Security Policy
• Physical and Environmental Security Policy
• Information Security Awareness Policy
• Data Classification Policy
Select one of these sections to research and find 4 relevant papers which assist someone developing
a policy.
Compose an annotated bibliography of research papers that relate to the issue so your annotated
bibliography will help you (and others) to have a good resource to evaluate and think
about the relevance and quality of material on the topic.
Make sure that the information meets the requirements of the topic and is from a reliable and
academically respected source. Website references are not permitted unless the website is authoritative
e.g., an electronic journal such as IEEE X plore digital library or ACM digital library,
both of which are available through the university library, or a government site.
What is an annotated bibliography?
An annotated bibliography is a list of citations to books, articles, and documents. Each citation
is followed by a brief (usually about 150 – 300 words) descriptive and evaluative paragraph, the
annotation. The purpose of the annotation is to inform the reader of the relevance, accuracy,
and quality of the sources cited.
Annotations are NOT abstracts
Abstracts are the purely descriptive summaries often found at the beginning of scholarly journal
articles or in periodical indexes. Annotations are descriptive and critical; they expose the
author’s point of view, clarity and appropriateness of expression, and authority.
General Instructions
The annotated bibliography is to be produced using a word-processor and the EndNote reference
database and the Annotate18.ens style file. The submitted document must be in PDF
format. The style file will output the citation, the abstract and your annotations, which should
be entered in the ‘Research Notes’ field. EndNote can be downloaded from
https://www.flinders.edu.au/its/computers-and-software/software-licensing/endnote/
endnote_home.cfm
Individual Research Assignment ENGR8762 Computer Networks and
1
Individual Research Assignment ENGR8762 Computer Networks and Cybersecurity GE
The Process
Creating an annotated bibliography calls for the application of a variety of intellectual skills:
concise exposition, succinct analysis, and informed library research.
First, locate and record citations to books, periodicals, and documents that may contain useful
information and ideas on your topic. Briefly examine and review the actual items. Then choose
those works that provide a variety of perspectives on your topic. You may have to quickly
review many works before you find good ones. Annotate at least four of these. The length of
the annotation will depend on why it has been included and on the source itself.
Cite the book, article, or document, including the abstract.
Write a concise annotation that summarises the central theme and scope of the book or article.
Include one or more sentences that
• evaluate the authority or background of the author,
• comment on the intended audience
• compare or contrast this work with another you have cited,
or
• explain how this work illuminates your bibliography topic.
Each student must ensure that the annotations are in their own words
Submission
The PDF file of the report should submitted by 11 pm, Friday, 19 October 2018. An early
start with information gathering is very strongly encouraged.
Assessment
Quality will be the deciding factor. Read the marking guide carefully. If you have questions,
please contact me either via FLO or see me in my consulting time.
Individual Research Assignment ENGR8762 Computer Networks and Cybersecurity GE, DDV
2