Sample i-search paper sample_i-search_paper_revised (2).doc This sample paper is the property of the University of Michigan, and republished here for educational purposes 1 Explanation of ISearch paper 2 Explanation of ISearch Journal 3 Table of Contents 4 Grade Level Assignments 5 Due Dates and Time Lines 6 ISearch Proposal & Teacher Approval Form 7 ISearch Rubrics 812 Sample ISearch paper: Siberian Husky Four sections to an I-Search Paper: 1. "What I Knew" (and didn't know about my topic before I started out) 2. "Why I am Writing This Paper" (here is where the real need should show up: the writer demonstrates that the search may make a difference in his/her life.) 3. "The Search" (story of the hunt) 4. "What I Learned" (or didn't learn. A search that failed can be as exciting and
Sample i-search paper - South Hadley High School Library
In this essay, this use of first-person point of view continues. In the book, Macrorie criticized traditional research papers that students were often asked to produce in classes. On pageBergmann writes: Although an I-Search assignment calls for a personal narrative, like most academic writing it is written to communicate to a particular audience, not for the writer alone.
Its purpose is to help you i search paper example and communicate the personal and professional significance of your research to a particular audience. Sample Personal Research Narrative Essays: On pages of Bergmann's chapter is a sample personal research narrative essay, i search paper example.
Another sample I-Search paper can be seen by clicking here, although this example has fewer sources and fewer scholarly sources than this assignment calls for.
Moving from the Reflective Annotated Bibliography to the Personal Research Narrative: For writing assignment 2, you wrote a reflective annotated bibliography on a topic related to technology.
In that assignment, for each of the articles you found, you wrote not only a précis of the article but also some vocabulary, reflection, and quotes from the article. Hopefully through that assignment, you developed an interest in a focused aspect of your topic. For writing assignment 2, you may have found articles on MOOCs in general. Perhaps, as a result of your findings, you have now done more research and have focused on MOOCs for a particular field of study e, i search paper example.
You then found more articles related to not only MOOCs but also MOOCs for learning computer programming or MOOCs for learning creative writing, i search paper example. For writing assignment 2, you may have found articles on cybersecurity as a broad topic. Perhaps, as a result of your findings, you have now done more research and have focused on cybersecurity and mobile devices.
You then found more articles related to not only cybersecurity as a general topic but specifically on cybersecurity and i search paper example devices.
For writing assignment 2, you may have found articles on technology in the health care industry. Perhaps, as a result of your findings, you have now done more research and have focused on the cloud computing in the health care industry. You then found more articles specifically on this topic.
It is this research experience on which you will write the personal research narrative, i search paper example. Examining the Sample Personal Research Narrative in Bergmann's Chapter: Note how, in the sample student personal research narrative on pagethe student begins by providing the background that gave him interest in the topic. He then discusses his first steps in researching the topic. Describe to the reader what you thought when you started researching, what you already knew about the subject, i search paper example, what interested you in the subject, etc.
Then describe your various steps, commenting on what surprised you, what ideas did not seem valid to you, what research articles you may have questioned, etc.
You might consider your response essay, which was the first essay you wrote for this class. The personal research narrative is, in some ways, an expanded response essay. In the personal research narrative, you may be responding to several authors while providing a narrative of your thought process and learning process throughout your research journey.
Requirements: Your paper should be words. It should include at least ten sources, six of which should be scholarly.
The sources are to be cited and listed in APA format. Additional resources: In our class, in the e-reserves section, we have a chapter from the book by Graff, G. The chapter mentions various techniques to apply in stating what an author said and your response to the author. As was recommended for the response essay, it is recommended that you read through that chapter so that you might apply these techniques to i search paper example essay.
Essay Zoo. ORDER NOW! Сontact Us. Sign In, i search paper example. Forgot password? Not register? Register Now! Our Catalog. English U. Total cost:. I-Search Name: Subject: Date of submission I-Search Our society of scholars and practitioners acknowledges that the recent past has witnessed several cases of cyber insecurity. I agree with Rader, Wash and Brooks who define cyber insecurity as cases of attacks on computers or computer systems. I believe the latest known event of cyber insecurity occurred in December Specifically, Sony Pictures Entertainment experienced a cyber-attack that resulted in devastating losses because I was i search paper example to learn that hackers pilfered and erased their data.
The cyber-attack on the Estonian government also attracted my attention to the subject because Herzog reveals many departments in the country's government experienced a denial of service attack.
As a result, I acknowledge that cyber insecurity is not only an interesting subject, but also a subject that requires attention from technologists. be taken in order to curb cyber insecurity. I believe cyber insecurity is possible because of existing vulnerabilities.
To be specific, I believe that Reddy and Reddy are justified to mention that the main hacking tricks include using Trojan programs, i search paper example websites, spyware, i search paper example, spoofing, pharming, and internet public records. For example, I believe that hackers use Trojan programs together with instant messaging applications to promote cyber insecurity. This owes to the reality that Gercke argues that hackers use Trojan programs i search paper example plant backdoors in computers and computer systems without notifying the users of the computers or computer system.
It also came to my attention that spoofing enables cyber criminals to gain unauthorized access to computers. The argument is highlighted by the fact that hackers modify addresses from trusted websites and use such addresses to communicate with other computers as though the their computers have trusted addresses. Gercke also increased my knowledge by highlighting that spyware is used by hackers for their activities.
In fact, the author captured my attention by arguing that spyware can remove and gather information from a computer system without the knowledge of the user. Consequently, I believe hackers use spyware to monitor their victim's computers and obtain useful information about their victims' browsing activities. They could then divert the victims' adverts and advertise their own links in order to earn money.
The same author also acknowledges that pharming also enables cyber criminals to direct traffic to phony websites. Therefore, I deduced that hackers exploit vulnerabilities in DNS servers or change hosts file on their victims' computer in order to apply the attacking technique. I made deduction because Zember and McGibbon explain the relationship between the DNS server, the host file, i search paper example, and website traffic.
After reviewing a publication by Bogdanoski and Petreski n. dI was able to acknowledge that fake websites also promote cyber insecurity. As evidence, I learnt that cyber criminals create fake websites and lure innocent internet users into their sites using links and advertisements, i search paper example. Such websites contain counterfeit business services or goods that gain the attention of most internet users. Consequently, the users can fill in their bank details into the website where they are stolen by hackers.
The results of my study on cyber insecurity also reveal that cyber criminals use denial of service attacks to promote cyber insecurity. I made the conclusion after agreeing with Podhorecwho argues that, hackers could spam a computer system with constant messages. It follows that such an action prevents users of the system from accessing or using the system. I acknowledge that cyber insecurity is a problem to global society because of the large number of non-expert tec Do you need a custom essay?
Order right now:. YOU MAY ALSO LIKE Smoking Essays Manifest destiny Essays Trifles Essays Vietnam war Essays Ethics Essays Globalization Essays Kite runner Essays Drugs Essays Artificial intelligence Essays George washington Essays The crucible Essays Body image Essays Terrorism Essays Autism Essays Edgar allan poe Essays Mahatma gandhi Essays.
Other Topics:. Educational Tool Description: The respondents would be educated about compassion fatigue and nurse burnout and how nurses are affected by this problem Description: Define professional socialization. Using the criteria for a profession described in the assigned readings, discuss three 3 criteria of the nursing profession which support professional socialization Description: LinX Computation Imaging Ltd is company founded in the yearby Ziv Attar and Tovchigrechko Order Now.
org We are an established and reputable company, with over 10 years in the essay business. Terms i search paper example Service Privacy Policy Buy APA Research Paper Buy English Essay Buy an Economics Paper Buy Admission Essay Online.
How to write an I-search Paper?
, time: 8:56I search paper essays
I search paper essaysHow Can I Enhance My Body Physically? Throughout my life I have always asked myself, "How can I enhance my body physically?" Having a nice "bod" can definitely help me in more than one way. Participating in athletics requires me to keep in shape. I a Four sections to an I-Search Paper: 1. "What I Knew" (and didn't know about my topic before I started out) 2. "Why I am Writing This Paper" (here is where the real need should show up: the writer demonstrates that the search may make a difference in his/her life.) 3. "The Search" (story of the hunt) 4. "What I Learned" (or didn't learn. A search that failed can be as exciting and SAMPLE I-SEARCH PAPER LIVING WITH ASTHMA Anne Smith What I Already Knew / What I Wanted to Know “Well, Annie, it looks like you have asthma,” our family physician informed me. I could not believe what I was hearing. I thought that I had been suffering from a very stubborn cold. Questions started going through my head as I listened to Dr. Davis explain my condition
No comments:
Post a Comment