Annotated Bibliography Instructions

Create Your Annotated Bibliography (List of Sources)

Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones that give details about your approach. Next, write the reference list entry (use APA, MLA, or another appropriate professional citation style) for each source. Alphabetize your list of reference list entries. After you have alphabetized the list, number the entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Go to the “Get Help: Writing and Citing” section of the UMGC Library for samples and explanations of formatting rules. If you are using APA style, the format of reference list entries should look something like this:

  1. Authors. (date). Article title. Publication name, vol(issue), first page number of article–last page number of article. DOI or URL
  2. Authors. (date). Paper title [Paper presentation]. Name of conference, city of conference, state of conference, country of conference. 
  3. Authors. (date). Book title. Publisher name. DOI or URL
  4. Author (if available, otherwise title). (date, if available, otherwise “n.d.”). Title (if not previously included in the citation). URL 

Write Your Annotations

In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of that information. To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually Chapters 1 and 2). From this information, develop a one- to three-paragraph informative or descriptive summary of the source. 

In each annotation, you should provide at least one specific example from the source that shows its impact on cybersecurity.

For example, for an annotation for an article about graphene’s applications to product design, you could discuss how information from the article could be used to help manufacture cell phone or laptop cases that are less breakable than cases made with current materials. This could positively impact availability because the new case design using graphene would be expected to decrease the risk of breakage. Decreased risk of breakage will decrease the probability of loss of availability caused by a broken case. Decreasing the probability of a negative event will decrease the risk associated with that event.

Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability. Negative impacts on the security posture will result in increased risk, decreased resistance to threats and attacks, and increased vulnerability (weakness).

As you write the annotation for each article, paper, or dissertation, make sure that you include your thoughts and ideas. Use standard terminology from the readings and glossaries provided in the LEO classroom.