Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Length:2000 words XXXXXXXXXXpages)Submission method optionsAlternative submission method Task WHAT TO DO: Tasks 1 and 2 below TASK 1 Annotated Bibliography 20% Write an Annotated Bibliography for your...

1 answer below »
Length:2000 words XXXXXXXXXXpages)Submission method optionsAlternative submission method

WHAT TO DO: Tasks 1 and 2 below

TASK 1 Annotated Bibliography 20%

  1. Write anAnnotated Bibliography for your Capstone Topicwith a collection of12 articlesfollowing a set structure. The Annotated Bibliography is a critical examination of the most relevant, recent and scholarly research on the topic area that is not just a summary of the articles you have read on done in Topics 1 to 5.
  2. Use the latest online search tools (CSU PRIMO, Google Scholar, Online databases) and efficient bibliographic organisers - CSU supports the use ofEndNote. (available on iPad). EndNote is a bibliographic citation program, allowing references and footnotes to be translated into a variety of standard formats.
  3. As a CSU student you can download and installEndNote X7for Windows or Mac OS platforms from
  4. ForGroup Work OPTION teams only: Assessment Item 3 Annotated Bibliography is doneINDIVIDUALLYbyALLstudents.
  5. Ensure that the Annotated Bibliography submitted by you is your own work and has not been submitted elsewhere and comply with the University's requirements foracademic integrity.
  6. You can get help inBuilding and Writing an Annotated BibliographyfromTopic 3Tutorial Topic in the ITC571 Interact2 site sidebar menu and other study advices and tips from:
    1. Study Resources (PDF files to download):
    2. APA style Referencing from
    3. The CSU Library website for LibGuides in Information Technology, Computing and Mathematics at
    4. EndNoteBibliographic software and tutorials LibGuide at
  7. Review the emerging technology (use internet for journals, conference papers, magazines, news articles, online databases, eBooks) and submit a12-article Annotated Bibliographyon your topic.
  8. A good place to start a collection of articles in your annotated bibliography is via the PRIMO search tool located on theCSU Library websiteat

As an example, the Capstone TopicPRIMOsearch on a topic like "near field communication applications" returned the following list of very recent journals, books, conference proceedings and eBooks related to the Topic:

Library Resources
Information Technology Journal Databases:
Information Technology & Computing LibGuides:
The following questions may be useful while reviewing the topic:

  1. What is the new technology?
  2. What does it do and what are the special features it has?
  3. When is it coming out in the market and how much will it cost?
  4. What industry will the new technology affect? (Medical, agricultural, computer, business, etc….).
  5. In your opinion, will the new technology be beneficial to society? Why or why not.
  6. What did you learn from a critical analysis of your sources of information on this new technology?

TASK 2 Originality Report and Questions 5%

  1. Generate anoriginality reportand submit this report via EASTS
  2. CSU recommendsTurnitinatturnitin.comfor checkingoriginality of contentis assessment tasks as described in the Subject Outline and in the Assessment Task where it is required.
  3. For this subject if you or your organisation use another similar tool then that is fine to use, but let me approve it first.
  4. One approved alternative to Turnitinis theSEO Tools Plagiarism Checkerat This is used by several institutions, academics and research students as an alternative to
  5. Answer the following questions to interpret theoriginality report. The questions can be found through the following link:
  6. Submit your question answers via EASTS.

Turnitin is more than a ‘gotcha’ device – it is an effective learning tool:
Because the sophisticated use of sources involves a complex set of research, critical thinking, and writing skills, you should expect to take several years to master them. Turnitin can be a helpful tool in this developmental process. You should use your originality reports as feedback on a first draft so that you can improve your use of sources before submitting the final draft for marking.
Interpreting the Turnitin Originality Report:
After you submit your draft to Turnitin for self-checking, you should look carefully at the originality report so that you can improve on your use of sources. Your essay will be on the left side of the screen, and the matching colour-coded sources will be listed on the right. Then you can make the necessary changes to your essay before you submit the final draft for marking.
You need to register with Turnitin to create a Student Account under the CSU Turnitin Licence at
Further information on how to use Turnitin can be found through the following link:


The rationale of this assessment is to test your ability to review, evaluate, critique and support others opinions as well as existing literature, using a scholarly writing style. You will also demonstrate your ability to carry out independently research and locate information from various sources such as journals, conference proceedings, online databases, eBooks and industry magazines.

TheLearning Outcomesbeing assessed in this second task include your ability to perform literature searches and critically analyse the literature in the chosen topic and then to critically reflect on and synthesize complex information, problems, concepts and theories in the chosen topic. As the Annotated Bibliography develops, so will also be demonstrating your advanced communication and academic writing skills in transmitting your capstone experiences and ideas to others.

What does a well constructed annotated bibliography contain?

That is a research topic on its own, however I recommend the list of SIX structural elements below

  1. Interpretation and evaluation of an overview of recent trends in emerging technologies and innovation;
  2. Evidence of literature searches and critical analysis of the literature in the chosen capstone topic;
  3. Critical reflection and synthesis of complex information, problems, concepts and theories in the chosen topic;
  4. Original opinion on the benefits of your capstone project to others;
  5. Reflective comments on what was learnt from a review of the literature;
  6. Use of correct citations and referencing conforming to recognised referencing format.

TheChecklist for the Annotationselements can be used as a quality check as you write:

Content Elements

  • Coverage of topic
  • Depth of discussion
  • Development of argument and reasoning
  • Selection of literature

Writing Style Elements

  • Structure of review
  • Technical competence
  • Use of citations and quotations
  • Referencing

Task 2is designed for you to learn the functions of the Turnitin software.

Marking criteria

Information and Research Tools and Techniques: Annotated Bibliography 20%

Contains 12 articles on the chosen topic, recognition of research methods used in the articles and synthesis of data, findings and ideas)

Task 2 Turnitin original report
Value 5% (5 marks)

Submission via EASTS. (2 marks)Q&A section (3 marks)


The Annotated Bibliography should be presented in form of:

  • submit as a PDF file
  • include a References appendix in APA style
Answered Same Day Apr 08, 2020 ITC571 Charles Sturt University


Ahmedali answered on Apr 22 2020
144 Votes
Annotated Bibliography
Annotated Bibliography
Annotated Bibliography
) (
Internet of Things (IoT) Application
Abomhara, M., & Koien, G. (2015). Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. Retrieved 19 April 2018, from https:
IoT applications have proved to be successful since their emergence. The increase in the usage of the technology has introduced a few security threats and concerns. The journal article by Abomhara and Koien covers the security concerns and aspects associated with IoT. The authors have utilized exploratory research methodologies for analyzing the issues and have also used numerous published journals and whitepapers as references. An IoT model is described as an amalgamation of four components viz. devices/gadgets, resources, services and entities. The hardware components may lead to the presence of hardware vulnerabilities. Software components will also be vulnerable to issues, such as design e
ors, technical problems, etc. the authors have listed various security threats that may be structured or unstructured and may include attacks on availability, such as denial of service and distributed denial of service, physical security attacks, violation of access control, reconnaissance attacks, and many more. These attacks may have an adverse implication on the information properties, such as confidentiality, availability, and integrity. There is lesser use of tables and figures that could have been included by mapping the threats and proposed solutions.
Barcena, M., & Wueest, C. (2015). Insecurity in the Internet of Things. Retrieved 19 April 2018, from https:
IoT applications have disrupted the cu
ent markets by emerging as an innovative technology that has created a lot many capabilities. There are several benefits that are provided by IoT to the users and the technology has also
ought with itself a few risks and challenges. The authors, Barcena and Wueest have covered the insecurities that are present in the IoT applications. The security threats and attacks are given shape by the malicious entities by using the access points that are available to them in abundance. Physical and network access points, unsecure cloud access points, and malware are the primary agents that are utilized by the attackers. The IoT providers and users can mitigate the risks by implementing the basic and advanced security measures. Some of these measures include setting up of strong passwords, connectivity to private and secure networks, security updates and patches, market study of the vendor etc. It is necessary to configure the devices and gadgets to their latest versions so that the version specific attacks are prevented. The data collection and research analysis method used by the authors is qualitative research.
Buyya, R., & Dastjerdi, A. (2016). Internet of Things: Principles and Paradigms. Retrieved 19 April 2018, from http:
IoT is a technology that is composed of a lot many components and entities. The reference is a book that covers the various principles and paradigms related to the Internet of Things. The authors Buyya and Dastjerdi have covered the major aspects of IoT in the book. There are five sections in the book comprising of seventeen chapters. The first part focuses on IoT Ecosystem Concepts and Architectures that includes the basic framework and model associated with IoT, definitions and terminology along with main components that are involved. The second part is based on IoT Enablers and Solutions followed by part three as IoT Data and Knowledge Management. These include the data and information sets involved in an IoT application along with the measures that are used to manage the same. The fourth part is titled as IoT reliability, Security and Privacy. It covers the security and privacy issues that are associated with IoT and also lists out some of the countermeasures to control the same. The last part discusses the various IoT applications in a number of different sectors and industries.
Chase, J. (2013). The Evolution of the Internet of Things. Retrieved 19 April 2018, from http:
IoT is an emerging technology and innovation that has gained a lot of popularity in the recent years. It has provided the users to develop a network that can be easily developed and controlled. Jim...

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here