Jerry Chen’s Expanded Definition of Authentication

TO: Prof. Ellis
FROM: Jerry Chen
DATE: 3/26/2021
SUBJECT: Expanded Definition of Authentication

Introduction

As we all know, we are human and unique, and all of us have our own way to understand and learn, as well as the way we definite something new to us. Somehow, the different ways of how we definite something new usually end up having various types of meaning. The purpose of this document is to explore the definition of the term that I chose and make it easier for others to understand regardless of the ways that we learn differently. The term that I am defining for a better understanding is “authentication”. As to further explore the definition of the term “authentication”, I am going to discuss the general definitions from my research sources follow by the context that the item being used in. I am also provided the working definition of the term and how it related to the network security field.

Definitions

According to the author (Ince, 2014), “The process of convincing a network that a person is who he or she claims to be. This follows the process of identification. Devices that are used for authentication include passwords, personal identification numbers, smart cards, and biometric identification systems.” This definition generally shows that authentication is a process to identify the identity before allowing admission to access to something, which the secret word or code needs to be correctly matched with the one that set up by the owner previously, otherwise will get declined by the authentication process.

To have a better understanding of the term “authentication”, the following definition also provided a better sense of what authentication is. According to the authors (Butterfield et al., 2016), “A process by which subjects, normal users, establish their identity to a system. This may be effected by the use of a password or possession of a physical device, e.g. a coded token. In reverse authentication, the object is required to authenticate to the subject, e.g. to establish user confidence regarding the object, before sensitive information is entered into a system.” This definition illustrates that authentication is the process by which the users have to provide the exact credentials they set up previously before they can gain access to their information. The purpose of setting up the credentials is to protect unauthorized access to their information in which needs authentication method get involve to makes it fully effective.

In the book “What is authentication?” by Rosencrance (2018). “Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be. Authentication technology provides access control for systems by checking to see if a user’s credentials match the credentials in a database of authorized users or in a data authentication server.” This definition also defines as authentication is the process to identify the identity by asking the users to enter the secure secret word or codes that they set up beforehand. All of these definitions are way similar as they are all defined as authentication is the process to identify the identity by obtaining the right credentials and acknowledged the request if the credentials are matched with the information stored in the cloud or database.

Context

Authentication is widely used in the network security field as it can control who can have access to the credential information within the company in which sort by the role assigned by the one who has that authority. According to the article “Implementation of an Advanced authentication method within Microsoft Active DIRECTORY network services” (Kadlec et al., 2010), “Authentication is the process by which end users identify themselves to a network and customized access capabilities are given based on the role they serve in the organization.” This quote describes the term authentication as best used in the network field. Every organization has its own policy and ranking. Every ranking has its own authority to access certain levels of credential information of the company, where authentication is used in place to identify the accessibility of the employees.

There is another source of reference found to aid in providing more details of the term used in the field. According to Grimes (2019), “The primary reason for authentication is to confirm a subject’s ability to access protected resources (e.g., security domains, files, folders, sites, services). The process determines whether the subject is who they say they are and whether they can prove it.” This quote provided more details to support the previous quote, which proved that the use of authentication in the field is to identify the accessibility of each person who claims to have access to something.

Working Definition

As I am majoring in Computer System and track in networking security, the term authentication is like nothing new to me. I am familiar with this term because it plays a huge role in the networking field. Based on the discussion of the definitions and context of the term used listed above, we can conclude that the main definition of the term authentication is the process to validate the identity. Network administrators always use the authentication method to ensure the safety of the software or systems by validating the users who try to login in by the credentials they enter. Authentication can also definite as simply as the way we unlock our phones, we must enter the right passwords before it allows us to have access to our phones.

References

Ince, D. (2019). A Dictionary of the Internet (4th ed.). Oxford University Press.

Butterfield, A., Ngondi, G. E., & Kerr, A. (2016). A Dictionary of Computer Science (7 ed.). Oxford University Press. https://doi.org/10.1093/acref/9780199688975.001.0001

Rosencrance, L. (2018, May 29). What is authentication? Retrieved March 05, 2021, from https://searchsecurity.techtarget.com/definition/authentication

Kadlec, J., Jaros, D., & Kuchta, R. (2010). Implementation of an Advanced authentication method within Microsoft Active DIRECTORY network services. 2010 6th International Conference on Wireless and Mobile Communications. http://doi:10.1109/icwmc.2010.48

Grimes, R. A. (2020). Hacking Multifactor Authentication. John Wiley & Sons, Incorporated.

Mateo Avila’s Expanded Definition of Virtual Private Network (VPN)

TO: Prof. Jason Ellis

FROM: Mateo Avila

DATE: 3/17/2021

SUBJECT: Expanded Definition of Virtual Private Network (VPN)

Introduction:

The purpose of this document is to provide an Expanded Definition that shows general understanding and use of the following term. The term that I am defining is Virtual Private Network (VPN). This provides an introduction for College Undergraduates that are studying Computer Networking and Security. I am discussing the way it is defined and the way it is used in context by providing several quoted definitions and several quoted sentences that use Virtual Private Network (VPN) in the context. Definitions, context, and finally my working definition will be provided in the order that it was mentioned.

Definitions:

The definition of Virtual Private Network (VPN) according to Encyclopedia of Small Business “Virtual private network (VPNS) are systems that use public networks to carry private information and maintain privacy through the use of a tunneling protocol and security procedures.” (Encyclopedia of Small Business, 2018) Meaning that public connectivity between people, companies, organizations, etc. are kept secure through tunneling protocol which is basically encapsulation of packets. Providing extra layers of security which will be harder to break. This keeps our location as safe.

“A system that uses code to securely access a computer in a different location via the internet. When working from home, you can securely access the office network using the company’s virtual private network” (Oxford, 2021) This definition also provides an example, which is very helpful. According to Oxford, companies use Virtual Private Network to secure their employees with access to the companies working space. This provides security to the Company as well as the employees. This definition is most likely used by people with very little knowledge about technology because it even shows an example to further understand the term.

“A VPN establishes a protected communications link across a public network between the remote computer and the computers physical linked in the local network” (Hoyle, 2018) This definition basically explains the same concept as the Encyclopedia of Small Business. They both mention public network and one uses carrying private information and the other one uses communications links when referring to securely establishing connectivity.

Context:

“In fact, F-Secure says that Freedome’s App Security contains the same scanning engine as its Safe Antivirus, meaning with Freedome installed you don’t need an extra antivirus app.” (Paul, 2019) This quote shows how different apps for Virtual Private Network not only secure your location but also it incorporates tools such as antivirus. This shows how apps for Virtual Private Network have evolve thought out the years. This term is used as a security means for personal information and detection of virus. This scenario of Virtual Private Network is intended to target individuals as an audience. It talks about different types of VPNs and tries to advice you on which you should use depending upon your needs.

“A VPN allows an enterprise to interconnect geographically dispersed sites throughout a public network infrastructure. It is likely to be used by customers instead of networks constructed using private lines.” (Lamti, 2000). Meaning that Virtual Private Networks are beneficial to enterprises because it allows secure communication all over the world within their private lines. In this way, customers can securely gain access to what they are looking for and to trust their information such as back accounts.

“The encrypted messages are sent between a few well-defined points, such as a company headquarters and its branch offices, making part of their journey over the Internet.” (Babcock, 1998) This quoted shows how companies were using Virtual Private Network to encrypt messages in order to flow around the Internet to reach to its final destination securely. This quote by Babcock and the quote by Lamti, provides us examples of how enterprises, companies, business, utilize network communication by implementing security procedures and tools to provide a successful and most importantly secure environment for its customers and its data.

“If you do not have a secure connection especially on a public wireless network that anyone could use online intruders could potentially spy on the websites you visit and even steal passwords and other credentials you enter. Using a VPN while connected to any unprotected public access network is generally advised for information safety” (Biersdorfer, 2017) This quote publish in The New York Times related to first quote publish in an online article by Paul. It relates in a sense that both authors talk about personal security for us, instead of talking about company or business like the others two quotes did. Biersdorfer argues that Virtual Private Network is a key in information security when using public wireless network connections.

Working Definition:

Based on the definitions and quoted sentences about Virtual Private Network (VPN), my working definition about this term is the following. Virtual Private Network (VPN) sets public network communications with encryptions and other security steps in order to secure your data and personal information protection throughout the communication time. Virtual Private Network is so relevant because of the different apps and encryptions which are used to ensure our privacy. This technology keeps on innovating and finding new ways to provide security and integrity for network communication.

References:

Babcock, C. (1998). The art of building VPN firewalls. Inter@ctive Week, 5(29), 18. http://web.b.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/detail/detail?vid=10&sid=a4d7e10e-19f9-441a-9b7a-8ebeea80195e%40pdc-v-sessmgr05&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=a9h&AN=976979

Biersdorfer, J.D. (2017). Tunneling though the internet on vacation. The New York Times. https://www.nytimes.com/2017/08/22/technology/personaltech/tunneling-though-the-internet-on-vacation.html?searchResultPosition=2

Hoyle, B. (2018, June 8th). Computer Hardware Security. Encyclopedia of Espionage, Intelligence, and Security. https://www.encyclopedia.com/social-sciences-and-law/law/crime-and-law-enforcement/computer-hardware-security

Lamti, L., & Yacoub, B. (2000). On managing traffic over virtual private network links. Journal of Communications and Networks, 2(2), 138-146. https://ieeexplore-ieee-org.citytech.ezproxy.cuny.edu/stamp/stamp.jsp?tp=&arnumber=6596734

Leaner’s Dictionaries, O. (2021). Virtual private network. Oxford.com. virtual-private-network noun – Definition, pictures, pronunciation and usage notes | Oxford Advanced Learner’s Dictionary at OxfordLearnersDictionaries.com

Paul, I. (2019). 5 Best Vpns for Android. PCWorld, 37(4), 81-86. http://web.a.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/detail/detail?vid=8&sid=5161d3b1-9062-40dc-a8cd-4b9fa00c5047%40sessionmgr4008&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=135617888&db=a9h

Small business, E. (2018, June 8th). Virtual private networks. Encyclopedia.com. https://www.encyclopedia.com/science-and-technology/computers-and-electrical-engineering/computers-and-computing/virtual-private

Pranta Dutta’s Expanded Definition of Cloud Computing.

TO: Prof. Jason Ellis

FROM: Pranta Dutta

DATE: March 23, 2021

SUBJECT: Expanded Definition of Cloud Computing

Introduction

The purpose of this 750-1000 word expanded definition is to elaborate the definition of the term “cloud computing.” The evaluation technology, where an organization may not have to maintain a costly data center to run their day-to-day activities. They can utilize cloud computing to bring the cost down and use the right amount of resources they needed. In this document, I will discuss the definition of cloud computing and how it came to be known as cloud computing. Then I will discuss its context and the working definitions.

Definitions

The Oxford English Dictionary 1996’s definition defines cloud computing as “The use of networked facilities for the storage and processing of data rather than a user’s local computer, access to data or services typically being via the internet.” According to the Oxford English Dictionary 1996’s definition, cloud computing is something that can be used to access and process data via the internet. Usually, people or any organization save and store their personal or company data in their network facilities. To obtain data from that facilities, users require permissions & they must be under the same network, which can be very costly and time-consuming. In this case, cloud computing can be beneficial. An organization or person does not need to build a data center to store all their data. They can utilize cloud storage, where they can buy as much as spaces they need, & all the data can be accessed via the internet.           

Another definition of cloud computing from Oxford’s 2001 English Dictionary defines cloud computing as “attributive, with the sense ‘relating to or involving cloud computing,’ as cloud provider, cloud service, cloud storage, etc. Cloud computing has many attributes, such as cloud service provider, cloud storage, etc. There are many companies; like Microsoft Azure, Amazon AWS that occupy large datacenter in numerous places & other people and organizations can utilize those datacenters with a fee. They do not have to think about maintaining it. On the other hand, providers like Amazon, Microsoft, Google generating money by renting their cloud space to others.

Context

“The appeal of cloud computing to a variety of buyers contributes to strong growth. The services provided are flexible and can be tailored to suit start-ups, small to medium-sized businesses, and huge enterprises, meaning that cloud computing has a wide appeal.” (Market Line Industry, 2019). In this context, cloud computing has been used as an opportunity. Buyers of the cloud space contribute to the growth also; they can cut their costs while having access to flexible cloud space. They can increase and reduce the amount of space they need. Many start-ups do not have access to a large amount of capital, to begin with. In that case, they can use cloud computing to operate their day-to-day business.

“A single cloud computing data center includes a data center building, power supply, and cooling as supporting equipment, as well as servers and networking ICT equipment.” (MASTELIC & et al. 47(2)). According to the article Cloud Computing: Survey on Energy Efficiency, to build a data center, the organization needs data center building, power supply, cooling equipment, and servers. If every organization tries to implement one for themselves, then, it would be very inefficient when it comes to energy. As previously mentioned, a datacenter provides a lot more than what an organization requires. Their share in power consumption generates between 1.1% and 1.5% of the total electricity use worldwide and is projected to rise even more. Such alarming numbers demand rethinking the energy efficiency of such infrastructures. Therefore, sharing cloud space is a way to go in terms of affordability and efficiency.

Moving to cloud computing helped three mutual funds beat the S&P 500 in the second quarter. Mutual funds invest in many different companies. DocuSign is one of them. “DocuSign benefited from the migration to cloud-based computing before the coronavirus arrived, Mr. Kass said. Then it enjoyed a boost in the first quarter as many people were forced to work from home.” (Tim, 2020). DocuSign is a cloud-based company that specializes in electronic signatures. Their business took off due to pandemics since many people started working from home. Also, they migrated to cloud-based computing before the pandemic, which gives them another boost in profitably. Most of their employees are working from home, which reduces the cost of office space, electricity, and many more. This shows the effectiveness of cloud computing. It not only helps you save money also increases profitability.

Working Definition

Based on my research, I would define cloud computing as storing and accessing data and programs over the internet instead of your computer’s hard drive. As we move forward, cloud computing will become more and more popular as it promotes minimalism. For example, you might have Microsoft office, excel, notes, etc. installed on your computer. But if you use cloud computing, then you can simply log in to one drive & use all these services without installing them on your computer.

Reference

Cloud computing. (1996). In Oxford English Dictionary. https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/34689?redirectedFrom=cloud+computing+#eid189443962

Cloud Computing. (2001). In Oxford English Dictionary. https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/34689?redirectedFrom=cloud+computing+#eid189443962

MarketLine Industry Profile: Cloud Computing in Global. (2019). Cloud Computing Industry Profile: Global, N.PAG. http://web.b.ebscohost.com.citytech.ezproxy.cuny.edu/ehost/pdfviewer/pdfviewer?vid=5&sid=7d308bce-b05b-4ea1-9533-ac816c00dd4e%40pdc-v-sessmgr04

MASTELIC, T., OLEKSIAK, A., CLAUSSEN, H., BRANDIC, I., PIERSON, J.-M., & VASILAKOS, A. V. (2015). Cloud Computing: Survey on Energy Efficiency. ACM Computing Surveys, 47(2), 33:1-33:36. https://doi.org/10.1145/2656204

Gray, Tim. “Investors Posted Returns So Great They Seemed Wrong.” New York Times, 10 July 2020, www.nytimes.com/2020/07/10/business/investors-returns-great-funds.html?searchResultPosition=4.

Expanded Definition of Cybersecurity.

TO: Professor Jason Ellis

FROM: Ali Hossain

DATE:03/20/2021

SUBJECT: Expanded Definition of Cybersecurity.

Cybersecurity and Enhancement of Cybersecurity:

This document will explain why and how to enhance cybersecurity. Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. With associate degree increasing variety of users, devices and programs within the trendy enterprise, combined with the accumulated deluge of information — a lot of that is sensitive or confidential — the importance of cybersecurity continues to grow. The growing volume and class of cyber attackers and attack techniques compound the matter even further. With AN increasing variety of users, devices and programs within the fashionable enterprise, combined with the exaggerated deluge of knowledge — a lot of that is sensitive or confidential — the importance of cybersecurity continues to grow. The growing volume and class of cyber attackers and attack techniques compound the matter even further. Reducing model complexity, improve prediction accuracy and assess exploitability are the topic that will be explained throughout the document.

“In the last few years, advancement in Artificial Intelligent (AI) such as machine learning and deep learning techniques has been used to improve IoT IDS (Intrusion Detection System).”

Dynamic Feature Selector:

“Dynamic Feature Selector (DFS) uses statistical analysis and feature importance tests to reduce model complexity and improve prediction accuracy.”

Using normal human selection is a lot slower and have higher feature size. Whereas dynamic feature selector is the only way to go. The energetic and intelligent highlights of programming dialects are powerful develops that software engineers regularly say as amazingly valuable. However, the capacity to adjust a program at runtime can be both a boon—in terms of flexibility—, and a curse—in terms of device back. For occasion, utilization of these features hampers the plan of sort frameworks, the precision of inactive investigation tech- neq, or the presentation of optimizations by compilers. In this paper, we perform an observational consider of a expansive Smalltalk codebase—often respected as the poster- child in terms of accessibility of these features—, in arrange to evaluate how much these features are really utilized in hone, whether a few are utilized more than others, and in which sorts of ventures. In expansion, we performed a subjective investigation of a agent test of utilizations of energetic highlights in arrange to reveal  the principal reasons that drive individuals to utilize energetic highlights, and  whether and how these energetic highlight utilized

Necessity of Dynamic Feature Selector

The Internet of Things has a great influence over system which have attracted a lot of cybercriminal to do malicious attack and open an end node to attack continuously. To prevent huge data loss it is crucial to detect infiltration and intruders. Reducin0g model Complexity and improving prediction accuracy can do the work. Machine learning and Deep machine learning are helping the matter of detecting intruder.

“Abstract Machine learning algorithms are becoming very efficient in intrusion detection systems with their real time response and adaptive learning process.”

Statistical analysis and feature importance tests can be used to reduce model complexity and improve prediction accuracy. This is where dynamic feature selector comes to rescue. DFS showed high accuracy and reduce in feature size.

“For NSL-KDD, experiments revealed an increment in accuracy from 99.54% to 99.64% while reducing feature size of one-hot encoded features from 123 to 50. In UNSW-NB15 we observed an increase in accuracy from 90.98% to 92.46% while reducing feature size from 196 to 47.”

It is clear that the new process is much accurate and less feature are required for processing.

Model Complexity, Prediction Accuracy and Exploitability:

In machine learning, model complexity often refers to the number of features or terms included in a given predictive model, as well as whether the chosen model is linear, nonlinear, and so on. It can also refer to the algorithmic learning complexity or computational complexity. Accuracy is defined as the percentage of correct predictions for the test data. It can be calculated easily by dividing the number of correct predictions by the number of total predictions. An exploit is any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware. Exploits usually take the form of software or code that aims to take control of computers or steal network data.

Reference:

Alazab.A.,& Khraisat.A.(2021), Cybersecurity, A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges, 4, Article number: 18(2021).

Ahsan.M., Gomes.R., Chowdhury.M.M., & Nygard.K.E.(2021), Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector, J. Cybersecur. Priv. 2021, 1(1), 199-218.

Weekly Writing Assignment, Week 7

You might find it beneficial to reflect on your experiences with a given type of document–including those you have made and those made by others that you have used. Let’s do this with instructions.

After watching this week’s lecture, I would like you to write a brief memo of at least 250 words reflecting on instructions. There are two main things that I would like you to respond to in your reflection: (1) Discuss a good set of instructions that you’ve used before, (2) Discuss a bad set of instructions that you’ve used before, and (3) Write some ideas that you have about how to make technical instructions useful and engaging.

When you have completed your memo, copy-and-paste it into a comment added to this post on our OpenLab Course Site.

Submit Your 750-1,000-Word Expanded Definition Project, Week 7

Last week, I sent around the “Reply All” starter email for each team’s peer review on the second major project in our class: the Expanded Definition Essay project.

Since peer review didn’t begin until Friday, Mar. 12, you have until Friday, Mar. 19 to complete peer review on your Expanded Definition Project.

This gives you until Friday, Mar. 26 to submit your Expanded Definition Project on OpenLab (though, you are welcome to submit it earlier when you are ready).

Below, I am including the model for the Expanded Definition Project with a few notes to pay attention to regarding publishing your Expanded Definition Project as a post on our OpenLab Course Site. Watch this week’s lecture for detailed instructions on posting your work to OpenLab.

Your Name's Expanded Definition of YOUR TERM

TO: Prof. Jason Ellis
FROM: Your Name
DATE: Due Date
SUBJECT: Expanded Definition of YOUR TERM

Introduction [Heading Level 2]
What is the purpose of this document? What term are you defining? How are you discussing the way it is defined and the way it is used in context? Describe a road map for what follows (definitions and context). This content should be published as paragraphs, unlike the heading for this section, which is a level 2 heading.

Definitions [Heading Level 2]
Quote several definitions of the term that you selected. Provide quotes and parenthetical citations for each definition, and include your sources in the References section at the end of the document. Each definition that you include deserves discussion in your words about what it means and how it relates to the other definitions that you include. Consider how they are alike, how are they different, who might use one versus another, etc.

Context [Heading Level 2]
Quote several sentences from a variety of sources that use the term in context. A range of sources would provide the best source material for your discussion of how the term is used in these contexts. For example, a quote from an academic journal or two, a quote from a newspaper or magazine, a quote from a blog, and a quote from social media would give you a range of uses that might have different audiences. For each quote, you should devote at least as much space as the quote discussing what it means in that context and how it relates to the other quotes in context. Each quote should be in quotes, have a parenthetical citation, and a bibliographic entry in your references at the end of your document.

Working Definition [Heading Level 2]
Based on the definitions that you quoted and discussed, and the contextual uses of the term that you quoted and discussed, write a working definition of the term that's relevant to your career field or major, which you will need to identify (this is the specific context for your working definition).

References [Heading Level 2]
Order your APA-formatted bibliographic references by the author's last name, alphabetically. In your posted version, they do not need a hanging indent. And, they should not be in a bulleted list.

Submission Notes:

Outline for Expanded Definition Project, Week 4

During this week’s lecture, I discussed the following outline as a good model for you to follow while creating your own Expanded Definition essay. A good rule of thumb for your quoted material would be at least 2 cited definitions and 3 cited contextual sentences, but you might find having more definitions and more contextual sentences strengthen your essay. Remember to discuss, explain, and compare/contrast the quotes that you find to help your reader understand how these all relate to one another before endeavoring to write your working definition at the end of your essay.

Your Name's Expanded Definition of YOUR TERM

TO: Prof. Jason Ellis
FROM: Your Name
DATE: Due Date
SUBJECT: Expanded Definition of YOUR TERM

Introduction [Heading Level 2]
What is the purpose of this document? What term are you defining? How are you discussing the way it is defined and the way it is used in context? Describe a road map for what follows (definitions and context). This content should be published as paragraphs, unlike the heading for this section, which is a level 2 heading.

Definitions [Heading Level 2]
Quote several definitions of the term that you selected. Provide quotes and parenthetical citations for each definition, and include your sources in the References section at the end of the document. Each definition that you include deserves discussion in your words about what it means and how it relates to the other definitions that you include. Consider how they are alike, how are they different, who might use one versus another, etc.

Context [Heading Level 2]
Quote several sentences from a variety of sources that use the term in context. A range of sources would provide the best source material for your discussion of how the term is used in these contexts. For example, a quote from an academic journal or two, a quote from a newspaper or magazine, a quote from a blog, and a quote from social media would give you a range of uses that might have different audiences. For each quote, you should devote at least as much space as the quote discussing what it means in that context and how it relates to the other quotes in context. Each quote should be in quotes, have a parenthetical citation, and a bibliographic entry in your references at the end of your document.

Working Definition [Heading Level 2]
Based on the definitions that you quoted and discussed, and the contextual uses of the term that you quoted and discussed, write a working definition of the term that's relevant to your career field or major, which you will need to identify (this is the specific context for your working definition).

References [Heading Level 2]
Order your APA-formatted bibliographic references by the author's last name, alphabetically. In your posted version, they do not need a hanging indent. And, they should not be in a bulleted list.

Weekly Writing Assignment, Week 3

After watching this week’s lecture above, use this week’s Weekly Writing Assignment to begin your initial research on the next project: 750-1000-Word Expanded Definition Project. This is the second individually-based project in the class. The goal is to write 750-1000 words that provide an extended definition of a term relevant to your field of studies and/or future career. Below is the synopsis of the assignment from the syllabus:

Individual: 750-1000-Word Expanded Definition, 15%

Individually, you will write a 750-1000 word expanded definition of a technical or scientific term, with cover memo, which demonstrates: 1. correct memorandum format. 2. knowledge of the etymology and historical development of the term. 3. examples of the term’s use in various written contexts. 4. ability to compare and contrast various uses of the term. 5. use and citation of sources with proper attribution. 6. awareness of audience. At least three library-sourced citations are required and should be cited following APA format.

As detailed and explained in this week’s lecture, your Weekly Writing Assignment this week is an opportunity to begin your research, settle on a term to focus on, and find three quotes that you might use in your project. With that in mind, add a comment to this post with the following before next week:

  • Begin with a short paragraph that begins with a statement about three possible terms that you considered and performed cursory research on for your project and concludes with the one term out of the three candidates that you ultimately decided to focus your expanded definition project on.
  • After using the library’s databases and reference guide shown in this week’s lecture, perform more focused research on the single term that you selected and copy-and-paste three quotes–each quote must come from a different source (e.g., one from a dictionary, one from an encyclopedia, and one from an ebook, or all three from different dictionaries, or all three from three different encyclopedias, or all three from journal articles, etc. All combinations will yield quotes that you might use in your expanded definition essay).
  • After each quote, write an APA bibliographic reference for your selection.
  • As always, write your Weekly Writing Assignment in a word processor, save your work, and then copy-and-paste it into a comment added to this post.
  • Remember to rely on the Purdue Owl APA Guide (and its sections listed on the left menu), and the APA Style Guide’s Dictionary References Guide.