IT and Censorship

Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Note: When using sources to support ideas and elements in an assessment, the submission MUST include APA formatted in-text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the assessment.
A.  Compose an appropriate, arguable thesis statement that previews two to four main points and that you plan to use in your research paper.
B.  Create an annotated bibliography of eight to ten appropriate, credible sources that you plan to use in your research paper.
Note: You may use the attached Annotated Bibliography Template to complete your annotated bibliography, but use of the attached template is not required.
1.  Provide a full, APA-formatted reference citation for the 810 sources.
2.  Provide an annotation (suggested length of 150 words) for each of the 810 sources by doing the following:
a.  Summarize the information presented in the source.
b.  Analyze the credibility of the author of the source or of the publication (e.g. journal, publisher, or website), if no author is present.
c.  Analyze the relevance of the source to your chosen research topic.
3.  Write each  annotation in your own words, without the excessive use of direct quotation or extensive paraphrasing, for the 810 sources from part B.
C.  Demonstrate professional communication in the content and presentation of your submission.
These are 7 of my 8 sources, you can find an 8th random article concerning IT and censorship.
Barrinha, A., & Renard, T. (2017). Cyber-diplomacy: The making of an international society in the digital age. Global Affairs, 3(4-5), 353-364. DOI: 10.1080/23340460.2017.1414924.
Ensafi, R., Winter, P., Mueen, A., & Crandall, J. (2015). Analyzing the Great Firewall of China over space and time. Proceedings on Privacy Enhancing Technologies, 2015(1), 61-76. DOI: 10.1515/popets-2015-0005.
Fourie, I., Bitso, C., & J.D. Bothma, T. (2014). Methods and resources to monitor internet censorship. Library Hi Tech, 32(4), 723-739. DOI: 10.1108/lht-11-2013-0156.
Liang, B., & Lu, H. (2010). Internet development, censorship, and cyber-crimes in China. Journal of Contemporary Criminal Justice, 26(1), 103-120. DOI: 10.1177/1043986209350437.
Maitland, C., Thomas, H., & Tchouakeu, L. (2012). Internet censorship circumvention technology use in human rights organizations: An exploratory analysis. Journal of Information Technology, 27(4), 285-300. DOI: 10.1057/jit.2012.20.
Terman, R. Internet censorship (Part 2): The technology of information control. Townsend Center for the Humanities. Retrieved from https://townsendcenter.berkeley.edu/blog/internet-censorship-part-2-technology-information-control.
Ververis, V., Marguel, S., & Fabian, B. (2019). Cross country comparison of Internet censorship: A literature review. Policy & Internet. DOI: 10.1002/poi3.228.

CLICK HERE TO ORDER NOW!

Leave a Reply

Your email address will not be published. Required fields are marked *