24 Jan What have researchers learned about the security ? vulnerabilities in social media platforms, and what strategies can be employed to mitigate these ?
What have researchers learned about the security
vulnerabilities in social media platforms, and what strategies can be employed to mitigate these
vulnerabilities.
-
jan23.docx
-
HOWWHATwhowhenwherewhy.xlsx
HW/In-Class: Article 1, HOW + WHAT EXCEL (W. 3)
Assignment Content
PLEASE!!!!! DO NOT ATTEMPT THIS ASSIGNMENT UNLESS YOU HAVE:
1.COMPLETED THE PREVIOUS ASSIGNMENT and gained approval of a research question
2.Found 1 SOLID RESEARCH ARTICLE using the method taught in the video in this week’s folder
For this assignment, follow the directions CAREFULLY:
Step 1: Download the EXCEL document below
Step 2: Fill in ONLY the BLUE portions
(If you have answers for how and what, your article IS a research article; if not, please go back to find one)
Step 3: SAVE AS an EXCEL (NOT a PDF)
Sheet1
| Research Articles | |||||||
| WHO conducted the research (authors of article) | WHEN year research was conducted (within last 10 years) | WHERE the research was conducted | WHY was the research conducted | HOW the research was conducted (NAME the METHODOLO-GY) | HOW the research was conducted (DESCRIBE the PROCESS) | WHAT the reseachers learned – results | Link to article |
| News articles and websites | |||||||
| Who wrote it? | rationale for inclusion | When was the article written (within the last 5 years) | Link to article/site | ||||
