Assignment:
This is the research question
President Obama vs President Trump Cybersecurity Strategy
President Obama's 2016 Cybersecurity Strategy versus President Trump's 2017 Cybersecurity Strategy
1. Introduction
2. Cybercrime becoming A Critical National and Global Threat.
3. Overview of President Obama's overall Cybersecurity Strategy during his term.
4. Overview of President Trump's Cybersecurity strategy during his term.
5. President Obama's 2016 Cybersecurity strategy to combat cybercrime
6. President Trump's 2017 Cybersecurity strategy to combat cybercrime
7. Differences and Similarities between the 2016 and 2017 Cybersecurity Strategy
8. Conclusion and Biblical worldview, An ethics-based analysis and/or a worldview analysis.
ANNOTATED BIBLIOGRAPHY INSTRUCTION
OVERVIEW
An annotated bibliography is a tool often used by researchers to record findings inimportant scholarly work that relatesto their research question(s).An annotated bibliography is a listing of sources, with each entry followed by a brief paragraph summarizing key arguments, concepts, information, important findings, and conclusions. In addition, there should be a brief evaluation of the source (e.g., accuracy, relevance, quality), the professional or personal or other bias (if any) and worldview (if decipherable) of the author(s). Summaries may include properly citedquotations or data from the workbut must be in the researcher's own writing.
INSTRUCTIONS
Requirements for this paper are outlined as follows:
• Length of assignment is 4 full body pages.
• Format of assignment is the latest version of APA.
• Title page, and annotations; no reference page(s) are required.
• 9 Total references/sources with 7 of them scholarly sources relevant to your topic
• The Analysis Paper: Annotated Bibliography Assignmentmust be formatted in current APA Author-Date Reference list style, with a paragraph of descriptive annotations following each list entry with about 125 words for each annotation. A very brief evaluation (evaluative annotation) will be included at the end-usually 1 to 2 sentences.
Note: Your assignment will be checked for originality via the Turnitin plagia
References
Azhibayev, M. G., &Dzhanadilov, O. M. (2018). Cybercrime as a modern threat to military security. J. Advanced Res. L. & Econ., 9, 1551.
Blinderman, E., & Din, M. (2017). Hidden by sovereign shadows: Improving the domestic framework for deterring state-sponsored cybercrime. Vand. J. Transnat'l L., 50, 889.
Brewster, B., Kemp, B., Galehbakhtiari, S., &Akhgar, B. (2015). Cybercrime: attack motivations and implications for big data and national security. In Application of big data for national security (pp. 108-127). Butterworth-Heinemann.
Iasiello, E. (2016). China's three warfares strategy mitigates fallout from cyber espionage activities. Journal of Strategic Security, 9(2), 45-69.
Nye Jr, J. S. (2016). Deterrence and dissuasion in cyberspace. International security, 41(3), 44-71.
Patel, K., &Chudasama, D. (2021). National security threats in cyberspace. National Journal of Cyber Security Law, 4(1), 12-20p.
Shackelford, S. J. (2016). Protecting intellectual property and privacy in the digital age: the use of national cybersecurity strategies to mitigate cyber risk. Chap. L. Rev., 19, 445.
Tengjun, Z. (2018). The cybersecurity policy adjustment of the Trump administration. China Int'l Stud., 72, 128.