Using Resources to Promote Critical Thinking
Critical thinking is an integral part of any educational program
At UC, we encourage and provide applicable resources for the promotion of critical thinking
In order to properly research and complete course papers, proper resources must be utilized
Critical Thinking helps us to:
Understand the links between ideas.
Determine the importance and relevance of arguments and ideas.
Recognize, build and appraise arguments.
Identify inconsistencies and errors in reasoning.
Approach problems in a consistent and systematic way.
Reflect on the justification of their own assumptions, beliefs and values.
http://www.skillsyouneed..html
Researching Using the Critical Questions
When using research resources, it is imperative to review the six critical questions and implement that data into your writings.
Proper Resources for Research
When asked to completed a research paper in the UC School for Computer and Information Sciences, you must use scholarly, .
A is one that has been evaluated by several researchers or subject specialist in the academic community prior to accepting it for publication and is also known as scholarly or refereed.
Your professor or the UC Librarian team can help you determine whether or not an article is peer-reviewed.
Proper Resources for Research
Examples of sites with peer-reviewed resources
UC Library Site
EBSCOhost
JSTOR
Google Scholar
Examples of sites with unacceptable resources
PC Magazine
Cisco
Ars Technica
Proper Format is Important
All papers written for courses within the School for Computer and Information Sciences must follow the American Psychological Association (APA) writing style.
University Resources
The a myriad of online resources to assist students with proper research
Resources referring to Information Security can be found inside the UC Library site
www.ucumberlands.edu/library
Groups
Group 1
Group Topic: Deterrence in Physical Security
Members:
Group 2
Group Topic: Delay in Physical Security
Members:
Group 3
Group Topic: Detection in Physical Security
Members:
Group 4
Group Topic: Assessment in Physical Security
Members:
Group 5
Group Topic: Response in Physical Security
Members:
Group 6
Group Topic: Recovery in Physical Security
Members:
Group 7
Group Topic: Physical Security during a Pandemic
Members:
Group 8
Group Topic: Physical Security during Political/Social Unrest
Members:
Research
Research Paper
10-12 pages (not including title, TOC, references, and any appendices)
Double spaced APA style
At least 10 references
At least 5 of your references must be scholarly peer-reviewed articles
Research Paper
The purpose of the research paper is to associate controls (administrative, technical, and physical) with your assigned physical security goal.
Some items that need to be addressed are:
Associated Threats
Policies
Procedures
Plans
Guidelines and standards
Appropriate controls
Issues and concerns for different industries
Business continuity and risk mitigation
Budgetary concerns
Research Paper
Find and review peer-reviewed scholarly articles concerning the access control and the associated industry
Find and review other information that associates with your topic area
Apply research from articles on chosen topic area to create research paper
Research Topic
DO
Provide a working knowledge physical security
Compare and contrast your assigned goal with others
Deeply research the use of physical security to meet your assigned goal
Tie your research back to recommendations for physical security controls
DO NOT
Get lost and broaden the topic too far
Disassociate your from the topic
Plagiarize and copy/paste from sites
Forget the topic of our course
Research Presentation
Goal is to summarize your research and recommendations
Must present for at least 20 minutes but no more than 30 minutes
Your group will be randomly selected for presentation
All group members need to participate in the presentation
Rubric
Please visit the Residency folder and select the specific dropbox to view the associated rubric
The rubrics will be used when grading the paper and presentation
ISOL531 | Access Control
Dr. Justin O. Hensley
School of Computer and Information Sciences
24
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more