Topic is Data SecurityIdentify and select one peer-reviewed research article. Evaluate the article using the template provided. Submit to Blackboard.Identify and select one professional article. Evaluate the article using the template provided. Submit to Blackboard.Identify and select one popular article. Evaluate the article using the template provided. Submit to Blackboard.
peer_reviewed_research_article_evaluation_form.doc

popular_article_evaluation_form.doc

professional_article_evaluation_form.doc

Unformatted Attachment Preview

Research Article Evaluation Form
This is a peer-reviewed, academic journal article on a topic of their choice. The article should be a
research study. Learners should read the article, and evaluate it with this form.
Name _Akhilesh Basam Date submitted for class: April 4th 2017
Journal reference (APA style)
John, Black. (2013), Developments in Data Security Breach Liability. ProQuest. Retrieved From:
http://search.proquest.com.ezproxy.csp.edu/docview/1490901623?pq-origsite=summon
Introduction, purpose, or Problem
Who or what was studied?
Method and or type of research
Discussion summary; Was the question answered?
Any red flags to the study? (i.e., questionable funding, ego, suspicious method, suspicion of
carelessness, etc.)
Questions this brought up for you or personal learnings, if any.
Popular Article Evaluation Form
This is a popular research-like study—from a newspaper or Internet source. It should not be peerreviewed or scholarly, but popular. It might be a survey, a poll, or some kind of “pretend” research. It
should not be a newspaper article that is a press release of a peer-reviewed article. Learners should read
the article, and evaluate it with this form.
Name: Date submitted for class:
Reference (APA style)
Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu, M. (2014). Data security and
privacy in cloud computing : International Journal of Distributed Sensor Networks.
Retrieved from: http://journals.sagepub.com/doi/full/10.1155/2014/190903
Question, purpose, or problem
Who or what was studied? What was the data used? What was the method?
Was the method appropriate? Why or why not?
Was the question answered, or did poor methodology obscure the answer?
What are the red flags or things that would make you suspend your trust?
Questions this brought up for you or personal learnings, if any.
Professional Article Evaluation Form
A professional article is from a periodical that is theoretical and scholarly, but the article is not an
experimental research study. It should cite research, and be theoretical and conceptual in nature, but
should not conduct its own research study in the article. Learners should read the article, and evaluate it
with this form.
Name: Date submitted for class _____________
Article reference (APA style)
Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu, M. (2014). Data security and
privacy in cloud computing : International Journal of Distributed Sensor Networks.
Retrieved from: http://journals.sagepub.com/doi/full/10.1155/2014/190903
Introduction, purpose, or issue
What was the point of the article?
How did the author deal with opposing points of view? Did the authors discuss only their own
perspectives?
Any red flags to the article? (i.e., author motivation, author credentials, author deals disingenuously with
other perspectives, etc.)
Questions this brought up for you or personal learnings, if any.

Purchase answer to see full
attachment