What methods were used to gather the evidence used in the source?

Y‌‍‍‍‌‍‍‌‌‍‍‍‌‍‍‍‍‌‍‍our annotations must be written in your own words. It may not be copied from the ab-stract or any other description, and it may not include direct quotations from the publica-tion itself. Want My Annotaded bibliography to be on Computer Science ( Technology Information – Cyber

Security – Data ) • This assignment will get you to ask questions such as: Is this source the best one to use out all sources available to me?

• What information, scope, or viewpoints does this source offer than other sources written in the same month/year don’t?

Research Requirements • 10-15 sources total for the Annotated Bibliography •

At least SIX must be from peer-reviewed journals • At least FOUR sources must be recent, published within the past year • Sources can overlap in the requirements (a recent, peer-reviewed source, for example, meets both requirements). • You can have more sources, more peer-reviewed sources, and more recent sources f‌‍‍‍‌‍‍‌‌‍‍‍‌‍‍‍‍‌‍‍rom Twit-ter, IG, Tik Tok, blogs, Reddit, news sources, etc. • The key is to always ask which authors you trust, and why do you believe them?

Your annotations will include the following • Summary & Purpose: What are the main ideas of the source? Is the main purpose of the source to contribute new knowledge about the topic or to try to persuade an audience to believe or to do something about the topic? How so?

• Methods Used to Collect Data & Reliability of Data:

What methods were used to gather the evidence used in the source?

Does the source convince you that its evidence is reliable?

Why or why not? Were blind studies performed?

How many people were surveyed? Who conducted the surveys to ensure a lack of bias? Where did the research take place?

• Authority: Is the source written by someone who has the expertise to write on the topic? List the credentials of the author(s) in your own words. Currency: Is the source u‌‍‍‍‌‍‍‌‌‍‍‍‌‍‍‍‍‌‍‍p-to-date for your topic?