The Title of the Paper
Author
Abstract: The abstract should provide a summary of your paper. This section should have at least 300 and at most 500 words in one paragraph. This template contains information about the formatting requirements for the review paper. Please follow the guidelines in this document. Use Calibri 11pt throughout the paper except for the titles. The paper should have at least 10,000 words or at least 20 pages, including the abstract, tables, figures, and references. The references and all referencing should be in APA style. The page should include page numbers. Margins should be fully justified for the main text but left aligned for headings.
Keywords: Include up to 5 keywords or phrases here.
1. Introduction (Heading 1 – Calibri 13pt – Bold)
The introduction sections should provide the context of the review study by summarizing:
· The background of the chosen topic (past and current work).
· The definitions of the key terms in the selected topic.
· The purpose of the paper (the focus of the review study).
· The description of your systematic approach for your synthesis, comparison, contrast, and/or analysis.
· The summary of your findings.
2. Review Method
This section provides the mechanics of your review. You should provide the following information to share your review approach with the reader:
1. The criteria you used to select the information sources (see next section for possible information sources you can use).
2. The type of information you extracted from the information sources for your synthesis, comparison, contrast, and/or analysis.
3. The description of your review method that aims to convey refined information to the reader in the “Literature Review” and “Discussion and Conclusion” sections. For example:
a. You may synthesize several security solutions to suggest a more effective and comprehensive security practice for a specific use-case/network or point out gaps. In this case, you should describe your synthesis method in this section.
b. You may analyze a security solution or a group of solutions in order to provide some potential implementation guidance to prevent systemic vulnerabilities or simply explain the main contribution of the solution(s) or identify trends. In this case, you should describe your analysis method in this section.
c. You may extract some solid and well-defined criteria to compare or contrast a given set of security solutions. In this case, you should describe your comparison and contrast method in this section.
3. Literature Review
The is the core section of the study where you do the actual review. You can research academic literature or grey literature. Please check for the scope of the grey literature. Specifically, you can use vendor’s websites, white papers, documents prepared by market research companies as primary information resources. Generally, you shouldn't use the information discussed in web forums or provided in personal blogs unless it is a top-quality post provided by an expert in the field. The source of information should be private companies, NGOs, academics, experts, and government agencies.
Firstly, you should give detailed information about each security solution, method, approach, and/or tool about the particular topic you selected. You can group them chronologically or thematically or by any means that would be suitable in your case. Secondly, you should perform your actual synthesis, comparison, contrast, and/or analysis of the existing solutions in this section. For example, this is the section where you can create tables to show your comparisons.
2.1 Heading 2 – Calibri 11pt – Bold
You may use up to three levels of heading.
2.1.1 Heading 3 – Calibri 10pt – Bold
Figures should be numbered consecutively throughout the paper and not according to the section in which they appear. Figure captions should appear below the figure. Use the word Figure in full, rather than Fig or F. The figure below gives information about the placing of figures.
Figure 1: This is how a figure should appear.
Create tables using the table option of your word processing package.
Security solution |
Criteria-A |
Criteria-B |
Criteria-C |
Criteria-D |
Solution-1 |
Text |
Text |
Text |
Text |
Solution-2 |
Text |
Text |
Text |
Text |
Solution-3 |
Text |
Text |
Text |
Text |
Solution-4 |
Text |
Text |
Text |
Text |
Table 1: This is how a table should appear
If your table runs over two pages, please ensure that headings are also carried over. Do not allow rows to split across pages.
The language, style, and content of the review paper should follow the listed general concepts below:
· Write in a straightforward style.
· Try to avoid long or complex sentence structures.
· Explain all acronyms at first use, i.e., Secure Access Service Edge (SASE).
· Remember to spell check your paper before submission.
4. Discussion and Conclusion
Discussion and Conclusion is an essential section of review papers. This section should reiterate and summarize your findings in the previous section. Moreover, this section is the place where you share your thoughts and personal comments on the chosen topic. You create an understanding of the topic by discussing the findings presented in the Literature Review section. Specifically, this section summarizes the main contributions of the existing solutions, any gaps in the existing solution space, possible suggestions, questions, and future directions.
Acknowledgments
If you wish to make acknowledgments in your paper, this is the place.
References
The reference list is an essential part of a literature review, as your article is based entirely on primary sources. References section, citations, and quotations should follow APA style. The following table provides a list of the academic journals accessible by Franklin students using single-sign-on credentials.
Journal Name |
Maximum Coverage |
Access Details |
Information and Organization |
2001 – present |
|
International Journal of Information Management |
1986 – present |
|
MIS Quarterly |
1977 – present |
|
Information Systems Research |
1990 – present (5-year delay) |
|
Management Science |
1954 – present (5-year delay) |
|
Journal of Management Info. Systems |
1984 – present |
|
Decision Sciences |
1996 – present |
|
Communications of the ACM |
1958 – present |
|
Decision Support Systems |
1985 – present |
|
ACM Transactions |
1983 – present |
|
Journal of AIS |
1954 – present (1-year delay) |
|
Information Systems |
1975 – present |
|
ACM Computing Surveys |
1969 – present |
|
Journal of Information Systems |
1986 – present |
|
Journal of Strategic Info. Systems |
1991 – present |
|
Information and Management |
1977 – present |
|
Journal of Information Management |
1999 – 2018 |
|
Journal of Computer Info. Systems |
2000 – 2001 |
|
Journal of Management Systems |
1999 – present |
|
Journal of the ACM |
1954 – present |
|
Omega |
1973 – present |
|
Journal of Info. Systems Management |
1986 – present |
|
Journal of Information Science |
1979 – present |
|
Human-Computer Interaction |
2018 |
|
Operations Research |
1956 – present (5-year delay) |
|
Int'l Journal of Human-Computer Studies |
1994 – present |
|
Journal of Information Systems Educ. |
2004 – present |
|
Knowledge-Based Systems |
1987 – present |
|
Journal of Systems and Software |
1979 – present |
|
Expert Systems with Applications |
1990 – present |
|
Organizational Behavior and Human Decision |
1985 – present |
|
Journal of Systems Management |
1995 – 1996 |
|
INFOR |
1971 – present (18 months) |
|
Behavior and Information Technology |
||
Communication Research |
1974 – present |
|
Simulation |
2006 |
|
Journal of Software Maintenance |
1989 – 2000 |
|
Computers in Human Behavior |
1985 – present |
2