DSRT 736 UC Blockchain Enabled Security & Data Integrity Literature Outline

Description

Having Trouble Meeting Your Deadline?

Get your assignment on DSRT 736 UC Blockchain Enabled Security & Data Integrity Literature Outline  completed on time. avoid delay and – ORDER NOW

Literature review should consist of these things.

Introduction

The introduction should:

  • define your topic and provide an appropriate context for reviewing the literature;
  • establish your reasons – i.e. point of view – for
  • reviewing the literature;
  • explain the organization – i.e. sequence – of the review;
  • state the scope of the review – i.e. what is included and whatisn’t included. For example, if you were reviewing the literature onobesity in children you might say something like: There are a largenumber of studies of obesity trends in the general population. However,since the focus of this research is on obesity in children, these willnot be reviewed in detail and will only be referred to as appropriate.
Subsections based on a deductive approach

This areas should:

  • organize the literature according to common themes (subsections);
  • provide insight into the relationship between your research topicand the wider subject area (example: how blockchain it to globalfinancial security)
  • move from a general, wider view of the literature being reviewedto the specific focus of your research. Think of it has a funnel startat the top of the funnel then get specific. If your topic was firstdenied because you were told to be more specific or that it was togeneric and you honed in to specify your topic, then your initial topicis likely part of the top of your funnel or wider view.
Summary

The summary should:

  • summarize the important aspects of the existing body of literature;
  • evaluate the current state of the literature reviewed;
  • identify significant flaws or gaps in existing knowledge;
  • outline areas for future study;
  • link your research to existing knowledge.

Reference:

And the topic is Blockchain enabled security and data integrity in cloud computing environments and applications

Order Solution Now

Similar Posts