ISEC690ReviewPaperTemplate.docx

The Title of the Paper

Author

[email protected]

Abstract: The abstract should provide a summary of your paper. This section should have at least 300 and at most 500 words in one paragraph. This template contains information about the formatting requirements for the review paper. Please follow the guidelines in this document. Use Calibri 11pt throughout the paper except for the titles. The paper should have at least 10,000 words or at least 20 pages, including the abstract, tables, figures, and references. The references and all referencing should be in APA style. The page should include page numbers. Margins should be fully justified for the main text but left aligned for headings.

Keywords: Include up to 5 keywords or phrases here.

1. Introduction (Heading 1 – Calibri 13pt – Bold)

The introduction sections should provide the context of the review study by summarizing:

· The background of the chosen topic (past and current work).

· The definitions of the key terms in the selected topic.

· The purpose of the paper (the focus of the review study).

· The description of your systematic approach for your synthesis, comparison, contrast, and/or analysis.

· The summary of your findings.

2. Review Method

This section provides the mechanics of your review. You should provide the following information to share your review approach with the reader:

1. The criteria you used to select the information sources (see next section for possible information sources you can use).

2. The type of information you extracted from the information sources for your synthesis, comparison, contrast, and/or analysis.

3. The description of your review method that aims to convey refined information to the reader in the “Literature Review” and “Discussion and Conclusion” sections. For example:

a. You may synthesize several security solutions to suggest a more effective and comprehensive security practice for a specific use-case/network or point out gaps. In this case, you should describe your synthesis method in this section.

b. You may analyze a security solution or a group of solutions in order to provide some potential implementation guidance to prevent systemic vulnerabilities or simply explain the main contribution of the solution(s) or identify trends. In this case, you should describe your analysis method in this section.

c. You may extract some solid and well-defined criteria to compare or contrast a given set of security solutions. In this case, you should describe your comparison and contrast method in this section.

3. Literature Review

The is the core section of the study where you do the actual review. You can research academic literature or grey literature. Please check for the scope of the grey literature. Specifically, you can use vendor’s websites, white papers, documents prepared by market research companies as primary information resources. Generally, you shouldn't use the information discussed in web forums or provided in personal blogs unless it is a top-quality post provided by an expert in the field. The source of information should be private companies, NGOs, academics, experts, and government agencies.

Firstly, you should give detailed information about each security solution, method, approach, and/or tool about the particular topic you selected. You can group them chronologically or thematically or by any means that would be suitable in your case. Secondly, you should perform your actual synthesis, comparison, contrast, and/or analysis of the existing solutions in this section. For example, this is the section where you can create tables to show your comparisons.

2.1 Heading 2 – Calibri 11pt – Bold

You may use up to three levels of heading.

2.1.1 Heading 3 – Calibri 10pt – Bold

Figures should be numbered consecutively throughout the paper and not according to the section in which they appear. Figure captions should appear below the figure. Use the word Figure in full, rather than Fig or F. The figure below gives information about the placing of figures.

Figure 1: This is how a figure should appear.

Create tables using the table option of your word processing package.

Security solution

Criteria-A

Criteria-B

Criteria-C

Criteria-D

Solution-1

Text

Text

Text

Text

Solution-2

Text

Text

Text

Text

Solution-3

Text

Text

Text

Text

Solution-4

Text

Text

Text

Text

Table 1: This is how a table should appear

If your table runs over two pages, please ensure that headings are also carried over. Do not allow rows to split across pages.

The language, style, and content of the review paper should follow the listed general concepts below:

· Write in a straightforward style.

· Try to avoid long or complex sentence structures.

· Explain all acronyms at first use, i.e., Secure Access Service Edge (SASE).

· Remember to spell check your paper before submission.

4. Discussion and Conclusion

Discussion and Conclusion is an essential section of review papers. This section should reiterate and summarize your findings in the previous section. Moreover, this section is the place where you share your thoughts and personal comments on the chosen topic. You create an understanding of the topic by discussing the findings presented in the Literature Review section. Specifically, this section summarizes the main contributions of the existing solutions, any gaps in the existing solution space, possible suggestions, questions, and future directions.

Acknowledgments

If you wish to make acknowledgments in your paper, this is the place.

References

The reference list is an essential part of a literature review, as your article is based entirely on primary sources. References section, citations, and quotations should follow APA style. The following table provides a list of the academic journals accessible by Franklin students using single-sign-on credentials.

Journal Name 

Maximum Coverage

Access Details

Information and Organization

2001 – present

International Journal of Information Management

1986 – present

MIS Quarterly

1977 – present

Information Systems Research

1990 – present (5-year delay)

Management Science

1954 – present (5-year delay)

Journal of Management Info. Systems

1984 – present

Decision Sciences

1996 – present

Communications of the ACM

1958 – present

Decision Support Systems

1985 – present

ACM Transactions

1983 – present

Journal of AIS

1954 – present (1-year delay)

Information Systems

1975 – present

ACM Computing Surveys

1969 – present

Journal of Information Systems

1986 – present

Journal of Strategic Info. Systems

1991 – present

Information and Management

1977 – present

Journal of Information Management

1999 – 2018

Journal of Computer Info. Systems

2000 – 2001

Journal of Management Systems

1999 – present

Journal of the ACM

1954 – present

Omega

1973 – present

Journal of Info. Systems Management

1986 – present

Journal of Information Science

1979 – present

Human-Computer Interaction

2018

Operations Research

1956 – present (5-year delay)

Int'l Journal of Human-Computer Studies

1994 – present

Journal of Information Systems Educ.

2004 – present

Knowledge-Based Systems

1987 – present

Journal of Systems and Software

1979 – present

Expert Systems with Applications

1990 – present

Organizational Behavior and Human Decision

1985 – present

Journal of Systems Management

1995 – 1996

INFOR

1971 – present (18 months)

Behavior and Information Technology

Communication Research

1974 – present

Simulation

2006

Journal of Software Maintenance

1989 – 2000

Computers in Human Behavior

1985 – present

2

image1.jpeg

Our customer support team is here to answer your questions. Ask us anything!