The idea for my research is that I create a cybersecurity education course for teenagers and young adults in the UAE. There is a problem with cybersecurity awareness among high schooler and undergraduate in the UAE. The current cybersecurity awareness programs in schools and universities are ineffective, as many of the skills gained from the programs do not reflect in the real world. The UAE was chosen because of the resources available to me as high school student, and because it is a gap of existing research evaluating the effectiveness of cybersecurity programs in the region (The attached poster expands more on idea). THE METHOD SECTION OF RESEARCH SHOULD DOCUMENT THE STEPS OF CREATING THE COURSE, KEEP THE COURSE BREIF AND ABOUT THE BASICS OF CYBERSECURITY. (CREATING THE COURSE IS PART OF THE ORDER). Some rules we should follow:
Use in text citation as part of the literature review (the rest of the paper needs to be my own writing and will mostly) (original)
No use of AI or any form of plagirism
You must follow the template below (attached a more detailed version)
Do not stray from the orginial topic of the research paper (the topic provided above)
The literature review must explicitly mention the gap (the same gap in my problem statment)
I would advise you to read the poster carefully before you start writing
About the course (the one created as part of the research):
The research paper must be about the creation process of the course, the course itself is NOT a part of the paper but I do want you to make a course as part of the order
Just so we are clear, the order consistents of two documents (the research paper and the course)
Keep the course document breif limited to ~1000-1500 words and use basic langauge as it is meant for teenagers
I need an APA style research paper that follows this EXACT template:
Abstract
Brief description of purpose, method, project goal
Introduction
Context of Problem/Problem Statement
Need for Study
Project Goal
Research Question
Literature Review
Perspective #1
Perspective #2
Perspective #3
etc.
Hypothesis/Original Assumption
Method
Description
Application
Alignment
Results/Method Analysis
Findings
Discussion of Limitations
Conclusion
Connection to Hypothesis
Future Directions
The idea for my research is that I create a cybersecurity education course for t
April 13, 2024