Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

nnotated Bibliography Value: 25% Due Date: 04-Sep-2018 Return Date: 26-Sep-2018 Length: 2000 words XXXXXXXXXXpages) Submission method options: Alternative submission method Task back to top WHAT TO...

1 answer below »

nnotated Bibliography

Value: 25% Due Date: 04-Sep-2018 Return Date: 26-Sep-2018 Length: 2000 words XXXXXXXXXXpages) Submission method options: Alternative submission method


back to top

WHAT TO DO: Tasks 1 and 2 below

TASK 1 Annotated Bibliography 20%

  1. Write an Annotated Bibliography for your Capstone Topic with a collection of 12 articles following a set structure. The Annotated Bibliography is a critical examination of the most relevant, recent and scholarly research on the topic area that is not just a summary of the articles you have read on done in Topics 1 to 5.
  2. Use the latest online search tools (CSU PRIMO, Google Scholar, Online databases) and efficient bibliographic organisers - CSU supports the use of EndNote. (available on iPad). EndNote is a bibliographic citation program, allowing references and footnotes to be translated into a variety of standard formats.
  3. As a CSU student you can download and install EndNote X7 for Windows or Mac OS platforms from
  4. For Group Work OPTION teams only: Assessment Item 3 Annotated Bibliography is done INDIVIDUALLY by ALL students.
  5. Ensure that the Annotated Bibliography submitted by you is your own work and has not been submitted elsewhere and comply with the University's requirements for academic integrity.
  6. You can get help in Building and Writing an Annotated Bibliography from Topic 3 Tutorial Topic in the ITC571 Interact2 site sidebar menu and other study advices and tips from:
    1. Study Resources (PDF files to download):
    2. APA style Referencing from
    3. The CSU Library website for LibGuides in Information Technology, Computing and Mathematics at
    4. EndNote Bibliographic software and tutorials LibGuide at
  7. Review the emerging technology (use internet for journals, conference papers, magazines, news articles, online databases, eBooks) and submit a 12-article Annotated Bibliography on your topic.
  8. A good place to start a collection of articles in your annotated bibliography is via the PRIMO search tool located on the CSU Library website at

As an example, the Capstone Topic PRIMO search on a topic like "near field communication applications" returned the following list of very recent journals, books, conference proceedings and eBooks related to the Topic:

Library Resources
Information Technology Journal Databases:
Information Technology & Computing LibGuides :
The following questions may be useful while reviewing the topic:

  1. What is the new technology?
  2. What does it do and what are the special features it has?
  3. When is it coming out in the market and how much will it cost?
  4. What industry will the new technology affect? (Medical, agricultural, computer, business, etc….).
  5. In your opinion, will the new technology be beneficial to society? Why or why not.
  6. What did you learn from a critical analysis of your sources of information on this new technology?

TASK 2 Self-Evaluation Report on Originality XXXXXXXXXXwords) 5%

  1. Select an 800-word sample of annotations from Task 1 and submit it for testing at either Turnitin or Small SEO Tools Plagiarism Checker sites.
  2. Save a copy of the originality report obtained from the chosen site.
  3. Critically evaluate and interpret the originality report, from your context or point of view as your personal Self-Evaluation Report on Originality XXXXXXXXXXwords).
  4. Append this short evaluation report to the saved copy of originality report from the chosen site as Task 2 completed.
  5. Finally submit the combined Tasks 1 and 2 via Turnitin as required.

Turnitin is more than a ‘gotcha’ device – it is an effective learning tool:
Because the sophisticated use of sources involves a complex set of research, critical thinking, and writing skills, you should expect to take several years to master them. Turnitin can be a helpful tool in this developmental process. You should use your originality reports as feedback on a first draft so that you can improve your use of sources before submitting the final draft for marking.
Interpreting the Turnitin Originality Report:
After you submit your draft to Turnitin for self-checking, you should look carefully at the originality report so that you can improve on your use of sources. Your essay will be on the left side of the screen, and the matching colour-coded sources will be listed on the right. Then you can make the necessary changes to your essay before you submit the final draft for marking.
You need to register with Turnitin to create a Student Account under the CSU Turnitin Licence at
Further information on how to use Turnitin can be found through the following link:


back to top

This assessment task will assess the following learning outcome/s:

  • be able to perform literature searches and critically analyse the literature in the chosen topic.
  • be able to critically reflect on and synthesize complex information, problems, concepts and theories in the chosen topic.

The rationale of this assessment is to test your ability to review, evaluate, critique and support others opinions as well as existing literature, using a scholarly writing style. You will also demonstrate your ability to carry out independently research and locate information from various sources such as journals, conference proceedings, online databases, eBooks and industry magazines.

The Learning Outcomes being assessed in this second task include your ability to perform literature searches and critically analyse the literature in the chosen topic and then to critically reflect on and synthesize complex information, problems, concepts and theories in the chosen topic. As the Annotated Bibliography develops, so will also be demonstrating your advanced communication and academic writing skills in transmitting your capstone experiences and ideas to others.

What does a well constructed annotated bibliography contain?

That is a research topic on its own, however I recommend the list of SIX structural elements below

  1. Interpretation and evaluation of an overview of recent trends in emerging technologies and innovation;
  2. Evidence of literature searches and critical analysis of the literature in the chosen capstone topic;
  3. Critical reflection and synthesis of complex information, problems, concepts and theories in the chosen topic;
  4. Original opinion on the benefits of your capstone project to others;
  5. Reflective comments on what was learnt from a review of the literature;
  6. Use of correct citations and referencing conforming to recognised referencing format.

The Checklist for the Annotations elements can be used as a quality check as you write:

Content Elements

  • Coverage of topic
  • Depth of discussion
  • Development of argument and reasoning
  • Selection of literature

Writing Style Elements

  • Structure of review
  • Technical competence
  • Use of citations and quotations
  • Referencing
Answered Same Day Aug 13, 2020 ITC571 Charles Sturt University


Kuldeep answered on Aug 20 2020
132 Votes
Running head: Big data security and privacy
Big data security and privacy
Big data security and privacy
Student Name
University Name
Unit Name
Unit Code
Today, big data is everywhere. Big data contain tremendous value moreover opportunities. But, big data
ings several security threats or privacy problems. Privacy and Security problem are amplified by speed, quantity or various big data. After that, a traditional safety mechanism is not co
ect for big data safety. The Privacy protections are one of the major challenges of big data. This article includes an explanation and assessment of recent trends in emerging technologies and innovations; a critical analysis of literature search and big data security and privacy literature.
Abstract    2
Introduction    4
Research problem overview    4
Applications of technology    5
About technology    5
Research issues    6
Related work    6
Proposed solutions to solve the research    7
Experimental analysis    7
Conclusion    8
Recommendations    8
Annotated Bibliography    9
Task 2    15
References    16
The concept of privacy varies greatly depending on the country, religion, culture and legal background. In general, privacy refers to sensitive information such as personal wages, patient records, as well as company economic data. However, for various data or information owners, definition of the privacy can also vary. Such as, the conservative patient will treat the data they may have as personal privacy, but patients with open minds may not think so. Generally, right to be exempt from covert surveillance and to determine if, when, how and to whom to disclose personal organizational information.
Research problem overview
This is a relevant party that needs to be addressed by users to share more personal data and content into social networks and public networks through their devices and computers. Therefore, the social network's security plans are very hot topic. The last topic was a case study in two areas of this chapter. In addition, traditional methods of supporting security such as firewalls and military concu
ency areas are not suitable for use in computing systems to support big data. SDN is an emergency management solution that can be a convenient way to implement big data system security, as shown in the second case study at the end of this chapter. It also discussed cu
ent staff and identified unresolved issues. Increasing the amount of data collected, processed, and processed by increasing the number of connected devices and interconnecting each other presents new challenges for privacy and security.
In fact, presently use security systems (for example Firewalls or DMZs) cannot be use in large data infrastructures as it must be extended beyond the perimeters of organization's network to meet security mechanism / data mobility needs or BYOD policies (on their personal device). . Considering this latest solution, the related problem is that security or privacy policy as well as technologies is useful in meeting today's most important data security and privacy challenges. These challenges can be protected for example infrastructure safety (securely distributed computing using MPRADUS), information privacy (such as data mining’s for privacy / donor access) and information management (such as secure data sources as well as storage). An integrity or feedback security (such as i
egular and real-time inspections of attacks)
Applications of technology
The main purpose of large data applications is to help businesses makes more informed-rich company decisions by recognizing large numbers of information, including Web server log, Internet click data stream, media content as well as activity report, text in client’s email, mobile phone call details or capture by many sensors.
Big Data provides comprehensive facilities for services like government agencies, electricity checks, misleading identities, fitness internet exploration, financial incentives, and environmental ba
iers. In today's world, big data is needed. Most people connect with each other through different communication methods. People share information in different ways The amount of information connecting to the population is increasing, creating security and privacy issues. It also creates a location for the rapid development of large data technology, security and privacy issues. As long as these problems are not answered properly, it can create obstacles for large data and expected growth and can achieve long-term success.
About technology
Big data processing creates new opportunities due to its analytical ability. In the business sector big data can benefit from analyzing large numbers of data, the automotive industry, energy distribution industry, healthcare and retail. Examples of this area are the use of consumer purchase history to analyze the search engine queries to find out the out
eak of firewalls to analyze the driving behavior discrepancy using energy grid data and the use of consumer purchase history to generate driving estimates. However, all these examples have data related to the person, so that the underlying data becomes potentially sensitive. Any emergence of the risk shows a privacy and security vulnerability. Data is the most important part of large data. Therefore data protection and data protection between data conversion and privacy implementation is a major requirement for large data.
Research issues
Over the past fifteen years, many technologies have been proposed to ensure data privacy and privacy protection. From encryption technology, for example forgotten data structure in data anonymization technology, in undercover data access mode, data is more difficult to change. Add specific data record for specific people, as well as advanced access controlled models. Nevertheless, several research challenges have been resolved. In the following, we will discuss some. There are many data privacy technologies and mechanisms - mostly access control moreover encryption. Both also have been extensively researched. The option to protect data privacy is a core module for protecting confidentiality, while investigating more relevant cases is necessary in order to protect large data privacy.
Related work
It is necessary to understand how to recognize large data security and confidentiality challenges, as well as how to protect traditional security mechanisms, designed to protect small amounts of static data, largely due to the large number of complex structured and unorganized data stored. Unfair access to this data to make new information, gathering various data sources or making them available to malicious users is a serious threat to large data. The common or basic means for these are to encrypt all to secure information, even where the data live (computer, data center, and mobile devices). As a large number of data increases and processing speed increases, masking, encryption, or tokenization are important factors to protect sensitive information. Due to its features, large data project want to achieve a holistic view of...

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here