1. Research Paper Presentation  
    • With the information you gathered for your Research Paper, you will now create an intriguing visual presentation and present it to the class.
    • Presentation should include following slides-
    • Introduction (1 slide)
    • literature review (2 slide)
    • Analysis of the literature (1slide)
    • Discussion paragraphs 1, 2, 3 (2 slide)
    • Conclusion (1slide)
    • Title page and reference list (2 slides)
    • Your presentation should be between 5-7 minutes long; practice it several times beforehand!

Welcome!! PowerPoint and

presentation skills!

Let’s go BACK in time:

Remember YOUR “why”!

WHY were Why were your topic

and your research question

important to YOU?

What SERVICE did you want to perform by conducting this research?

How can you best tell that “story,” and the “story” of what you learned?

What “story” will YOU tell about YOUR topic?

Put it in the chat bar!

First, let’s make sure your PowerPoint has IMPACT

Presentation Action

(Your presentation needs to tell YOUR “story” in a way that makes people want

to take some form of action as a result.)

Now, let’s see HOW you can tell it BEST!

1st prize

APA PowerPoint Design

What do these have in common?

H. A. T. S.

H. A. T. S.

• Headings – for easy navigation

H. A. T. S.

• Headings – for easy navigation

• Access – for finding and understanding

• Typeface – for ease of reading

H. A. T. S.

• Headings – for easy navigation

• Access – for finding and understanding

• Typeface – for ease of reading

• Space – for effective document design

H. A. T. S.

• Headings – for easy navigation

• Access – for finding and understanding

• Typeface – for ease of reading

• Space – for effective document design

Let’s take a look!

Compare the 4 following slides

They have the SAME exact words!

1. Pay attention to: Headings to promote easy navigation Access to promote the finding and understanding of information Typography to promote ease of reading and clear levels of information hierarchy Space to promote effective document design

2. Pay attention to headings to promote easy navigation, access to promote the finding and understanding of information, typography to promote ease of reading and clear levels of information hierarchy, and space to promote effective document design.

3. Pay attention to: Headings to promote easy navigation Access to promote the finding and understanding of information Typography to promote ease of reading and clear levels of information hierarchy Space to promote effective document design

4. Pay attention to:

Headings to promote easy navigation

Access to promote the finding and understanding of information

Typography to promote ease of reading and clear levels of information hierarchy

Space to promote effective document design

Below they are featured on a single slide

Which is hardest, and which is easiest to read, and WHY?

1. Pay attention to: Headings to promote easy navigation Access to promote the finding and understanding of information Typography to promote ease of reading and clear levels of information hierarchy Space to promote effective document design

3. Pay attention to: Headings to promote easy navigation Access to promote the finding and understanding of information Typography to promote ease of reading and clear levels of information hierarchy Space to promote effective document design

4. Pay attention to:

Headings to promote easy navigation

Access to promote the finding and understanding of information

Typography to promote ease of reading and clear levels of information hierarchy

Space to promote effective document design

2. Pay attention to headings to promote easy navigation, access to promote the finding and understanding of information, typography to promote ease of reading and clear levels of information hierarchy, and space to promote effective document design.

Slides are a backdrop to your words

Slides are a backdrop to your words

Your slide

Slides are a backdrop to your words

Your slide

YOU!

Slides almost NEVER need to stand alone

Slides almost NEVER need to stand alone

*yawn*

They need YOU to tell the story

GAME! Compare slides

• Look at the following 3 pairs of slides

GAME! Compare slides

• Look at the following 3 pairs of slides

• For each pair, identify the ways in which the second one is a “slam dunk” (or better)?

Our 20th President

• PDie He served as president for only 6 months, from March 4, 1881, until his assassination later that year

James A. Garfield

20th U.S. President

6-month term

3/1881 to

9/1881 (assassinated)

James A. Garfield

H.A.T.S.

Headings

Access

Typeface

Space

H.A.T.S.

Headings

Access

Typeface

Space

The Apes of Africa

• The following presentation is about the apes of Africa.

• It looks at the differences in ape behavior depending on their gender.

• It explores the cause of the reduction in ape population.

Apes of Africa

• differences in behavior by gender

• cause of reduction in population

What did you notice about the 2nd

slide in each pair?

Be “LEAN and MEAN!!!”

Be “LEAN and MEAN!!!”

• LESS isMORE!

Be “LEAN and MEAN!!!”

• LESS isMORE!

• Each word costs you…

Be “LEAN and MEAN!!!”

• LESS isMORE!

• Each word costs you !

Font sizes

Which do you think is the smallest everyone can reasonably see

44 point

40 point

36 point

32 point

28 point

24 point

20 point

A

B

C

D

E

F G

Font sizes 44 point

40 point

36 point

32 point

28 point

24 point

20 point

A

B

C

D

E

F G

Your answer may have been different!

Please do not go below this anyway!

Parallel Construction

Which of these sets of lines is parallel?

A

B

C

D

Puppies are

1. Cute 2. Frisky 3. I love them

Which is NOT parallel?

Puppies are 1. Cute 2. Frisky 3. I love them

Can you fix it?

Puppies are 1. Cute 2. Frisky 3. Lovable

Patient factors in medical care

1. Type of insurance 2. Is the doctor qualified 3. Pre-existing conditions

Which is not parallel?

Patient factors in medical care

1. Type of insurance 2. Is the doctor qualified 3. Pre-existing conditions

Can you fix it?

Patient factors in medical care

1. Type of insurance 2. Doctor qualifications 3. Pre-existing conditions

Develop YOUR PowerPoint to tell YOUR story!

Workshop!

Time to check

Time to check 1. Few words per slide, any art or graphics are relevant, and professional. (slides are a backdrop to what you say, not substituting for what you say)

Time to check 1. Few words per slide, any art or graphics are relevant, and professional. (slides are a backdrop to what you say, not substituting for what you say)

2. Type size is a minimum of 32 points even in graphics Font type is the same throughout the presentation

Time to check 1. Few words per slide, any art or graphics are relevant, and professional. (slides are a backdrop to what you say, not substituting for what you say)

2. Type size is a minimum of 32 points even in graphics Font type is the same throughout the presentation

3. Bulleted lists are prepared in parallel construction (see your Manual)

Time to check 1. Few words per slide, any art or graphics are relevant, and professional. (slides are a backdrop to what you say, not substituting for what you say)

2. Type size is a minimum of 32 points even in graphics Font type is the same throughout the presentation

3. Bulleted lists are prepared in parallel construction (see your Manual)

4. All slides lead to main point the presenter wants to make

Oral Presentations

Now, for the fun part!

WAIT!!! FUN???? I’m TERRIFIED of presenting!!!

Oral Presentations

Now, for the fun part!

WAIT!!! FUN???? I’m TERRIFIED of presenting!!!

Oral Presentations

Now, for the fun part!

WAIT!!! FUN???? I’m TERRIFIED of presenting!!!

Let’s see if we CAN make it fun!!

When you hear oral presentations:

What do you REALLY not like?

Make a list!

Oral Presentations What do you REALLY not like?• Reading from the slide

• No eye contact • Too quiet • No expression – all one tone • Too many “um”s • Other??

Oral Presentations What do you REALLY not like?

If you don’t like it…..

Advice:

Oral Presentations What do you REALLY not like?

Don’t do it!!!!

If you don’t like it…..

Now:

Start planning! Start the timer for yourself!

NO MORE THAN 5MINUTES!!!

,

Literature Review: Securing Social Network Data from Privacy Threats

Student Name:

Course Name:

Institutional Affiliation:

Professor's Name:

Date:

Introduction

Data management is integral in day-to-day operations of individuals.

Technology has been at the core of developments.

It has driven globalization to the point it is at the moment.

Aspects comprising principles, rules, and regulations have aided the functionality of different facets within the society.

The benefits, however, also come with downsides.

Data or information of any kind is more or less at the center of much of the activities that people are involved in. Communication and transfer of information from party to party have largely been possible and effective because of technological developments. All kinds of industries rely on technology to accomplish their objectives. As much as technology has been beneficial, it has also contributed towards vices such as cybercrimes.

2

Literature Review

There is need for more understanding about prevention of cyber threats.

This happens to be an issue that keeps growing by the day.

Literature from Loukas et al. (2012), Adu-Gyamfi, et al. (2021) and Garside et al. (2012) help inform on the subject.

They utilize different research methodologies to engage in the topic.

The magnitude of data management has necessitated the developments in cybersecurity because of the rise in cyber attack cases. As technology keeps providing ways of improving in life, it also enables cyber attackers to find more means of intruding private systems. The incorporation of different research studies help in gaining better perspective about the subject.

3

Literature Review Cont’d

Use of MICL according to Loukas et al. (2012).

Applying a cryptographic encryption technique as Adu-Gyamfi et al. (2021) suggested.

Garside et al. (2012) generally social networking sites are integral in sense making.

Essentially, the problem can be addressed from different angles.

An issue such as cybersecurity requires a multifaceted approach which should help in addressing the problems effectively. MICL is a system that incorporates private communities such as research groups and student communities with the main aim of providing education. Cryptographic encryption technique factors in shielding the privacy and identity of users.

4

Analysis of Literature

MILC applications are critical.

More applications should increase in the near future.

The authentication scheme is effective.

Social networking sites can provide critical information.

It is important that the downsides do not overweight the upsides of technology.

MILC application that provides location-based services and mobile instant messaging by providing an acceptable level of security by using cryptography. It integrates with private communities mainly for education reasons. It uses both symmetric and asymmetric cryptography to provide a high level of security. The authentication system is useful for the privacy protection of group users while sharing data in the form of packets via Bluetooth-enabled smartphones. Social networking sites provide vital information for rapid governance and rapid decision-making processes during abrupt governance and eco-system transition.

5

Discussion

Use of internet in search for resources.

Focus point was data security and privacy.

Results indicated significant use of Bluetooth and mobile applications in sharing information.

The information availability especially places the family of military personnel at risk.

It is agreeable that there is need for better security measures.

The internet has been at the core of the functioning of many areas in the society. Research shows that majority of entities rely on the internet in one way or another. The reliance has increased vulnerabilities to security issues which happen to have adverse repercussions. There are numerous devices which enable the sharing of information from person to person and they are usually Bluetooth enabled and have various applications which help in the sharing process. For military people, their information is more sensitive as its availability may jeopardize the safety of their family. Overall, tighter security measures are vital.

6

Discussion Cont’d

by Loukas et al. (2012) uses quantitative research.

Adu-Gyamfi et al. (2021) used literature survey and Garside et al. (2012) relied on policy documents.

Adu-Gyamfi et al. (2021) focused on social media while the other two used internet resources in general.

Loukas et al. (2012) indicated the likelihood of mobile applications increasing even with the risks they pose.

Adu-Gyamfi et al. (2021) showed that authentication system could enhance privacy.

There are various ways through which individuals apply in gaining more knowledge on different subject matters. The issue of information security is one which requires in-depth research and it is thus essential that different studies are incorporated in expanding the knowledge base. The use of different research is helpful in gaining better understanding of the issue. The focus on social media and other internet websites shows the diversity of the problem. There will always be reliance on technological features and products. Importantly, there are solutions that will help improve security.

7

Conclusion

Technological advancements are increasing the connectedness of individuals.

This is an advantage but also can be a disadvantage.

There is need for safety at all times.

Rules and regulations are key in mitigation.

There is need of investment in more safety measures.

Technological developments have been fruitful but have also led to data management issues. There are risks that befall several parties such military members who may be targeted. Terrorists use the internet platforms to determine their target's location in order to attack their exact position. Additionally. Corporate espionage has become quite common. In other cases, information is not filtered before sharing. Safety and security are vital in enhancing the wellbeing of individuals and their information. More attention should be paid towards alleviation of the problem information security.

8

References

Adu-Gyamfi, D., Zhang, F., & Takyi, A. (2021). Anonymizing group data sharing in opportunistic mobile social networks. Wireless Networks, 27(2), 1477-1490. https://link.springer.com/article/10.1007/s11276-020-02524-8

Garside, D., Ponnusamy, A., Chan, S., & Picking, R. (2012). Secure military social networking and rapid sensemaking in domain-specific concept systems: research issues and future solutions. Future Internet, 4(1), 253–264. https://doi.org/10.3390/fi4010253

Loukas, A., Damopoulos, D., Menesidou, S. A., Skarkala, M. E., Kambourakis, G., & Gritzalis, S. (2012). MILC: A secure and privacy- preserving mobile instant locator with chatting. Information Systems Frontiers, 14(3), 481-497. https://link.springer.com/article/10.1007/s10796-010-9254-0

image2.png

image3.png

image4.jpg

image1.png

,

Literature Review: Securing Social Network Data from Privacy Threats

Student Name:

Course Name:

Institutional Affiliation:

Professor's Name:

Date:

Introduction

Data management is integral in day-to-day operations of individuals.

Technology has been at the core of developments.

It has driven globalization to the point it is at the moment.

Aspects comprising principles, rules, and regulations have aided the functionality of different facets within the society.

The benefits, however, also come with downsides.

Data or information of any kind is more or less at the center of much of the activities that people are involved in. Communication and transfer of information from party to party have largely been possible and effective because of technological developments. All kinds of industries rely on technology to accomplish their objectives. As much as technology has been beneficial, it has also contributed towards vices such as cybercrimes.

2

Literature Review

There is need for more understanding about prevention of cyber threats.

This happens to be an issue that keeps growing by the day.

Literature from Loukas et al. (2012), Adu-Gyamfi, et al. (2021) and Garside et al. (2012) help inform on the subject.

They utilize different research methodologies to engage in the topic.

The magnitude of data management has necessitated the developments in cybersecurity because of the rise in cyber attack cases. As technology keeps providing ways of improving in life, it also enables cyber attackers to find more means of intruding private systems. The incorporation of different research studies help in gaining better perspective about the subject.

3

Literature Review Cont’d

Use of MICL according to Loukas et al. (2012).

Applying a cryptographic encryption technique as Adu-Gyamfi et al. (2021) suggested.

Garside et al. (2012) generally social networking sites are integral in sense making.

Essentially, the problem can be addressed from different angles.

An issue such as cybersecurity requires a multifaceted approach which should help in addressing the problems effectively. MICL is a system that incorporates private communities such as research groups and student communities with the main aim of providing education. Cryptographic encryption technique factors in shielding the privacy and identity of users.

4

Analysis of Literature

MILC applications are critical.

More applications should increase in the near future.

The authentication scheme is effective.

Social networking sites can provide critical information.

It is important that the downsides do not overweight the upsides of technology.

MILC application that provides location-based services and mobile instant messaging by providing an acceptable level of security by using cryptography. It integrates with private communities mainly for education reasons. It uses both symmetric and asymmetric cryptography to provide a high level of security. The authentication system is useful for the privacy protection of group users while sharing data in the form of packets via Bluetooth-enabled smartphones. Social networking sites provide vital information for rapid governance and rapid decision-making processes during abrupt governance and eco-system transition.

5

Discussion

Use of internet in search for resources.

Focus point was data security and privacy.

Results indicated significant use of Bluetooth and mobile applications in sharing information.

The information availability especially places the family of military personnel at risk.

It is agreeable that there is need for better security measures.

The internet has been at the core of the functioning of many areas in the society. Research shows that majority of entities rely on the internet in one way or another. The reliance has increased vulnerabilities to security issues which happen to have adverse repercussions. There are numerous devices which enable the sharing of information from person to person and they are usually Bluetooth enabled and have various applications which help in the sharing process. For military people, their information is more sensitive as its availability may jeopardize the safety of their family. Overall, tighter security measures are vital.

6

Discussion Cont’d

by Loukas et al. (2012) uses quantitative research.

Adu-Gyamfi et al. (2021) used literature survey and Garside et al. (2012) relied on policy documents.

Adu-Gyamfi et al. (2021) focused on social media while the other two used internet resources in general.

Loukas et al. (2012) indicated the likelihood of mobile applications increasing even with the risks they pose.

Adu-Gyamfi et al. (2021) showed that authentication system could enhance privacy.

There are various ways through which individuals apply in gaining more knowledge on different subject matters. The issue of information security is one which requires in-depth research and it is thus essential that different studies are incorporated in expanding the knowledge base. The use of different research is helpful in gaining better understanding of the issue. The focus on social media and other internet websites shows the diversity of the problem. There will always be reliance on technological features and products. Importantly, there are solutions that will help improve security.

7

Conclusion

Technological advancements are increasing the connectedness of individuals.

This is an advantage but also can be a disadvantage.

There is need for safety at all times.

Rules and regulations are key in mitigation.

There is need of investment in more safety measures.

Technological developments have been fruitful but have also led to data management issues. There are risks that befall several parties such military members who may be targeted. Terrorists use the internet platforms to determine their target's location in order to attack their exact position. Additionally. Corporate espionage has become quite common. In other cases, information is not filtered before sharing. Safety and security are vital in enhancing the wellbeing of individuals and their information. More attention should be paid towards alleviation of the problem information security.

8

References

Adu-Gyamfi, D., Zhang, F., & Takyi, A. (2021). Anonymizing group data sharing in opportunistic mobile social networks. Wireless Networks, 27(2), 1477-1490. https://link.springer.com/article/10.1007/s11276-020-02524-8

Garside, D., Ponnusamy, A., Chan, S., & Picking, R. (2012). Secure military social networking and rapid sensemaking in domain-specific concept systems: research issues and future solutions. Future Internet, 4(1), 253–264. https://doi.org/10.3390/fi4010253

Loukas, A., Damopoulos, D., Menesidou, S. A., Skarkala, M. E., Kambourakis, G., & Gritzalis, S. (2012). MILC: A secure and privacy- preserving mobile instant locator with chatting. Information Systems Frontiers, 14(3), 481-497. https://link.springer.com/article/10.1007/s10796-010-9254-0

image2.png

image3.png

image4.jpg

image1.png

,

Literature Review: Securing Social Network Data from Privacy Threats

Student Name:

Course Name:

Institutional Affiliation:

Professor's Name:

Date:

Introduction

Data management is integral in day-to-day operations of individuals.

Technology has been at the core of developments.

It has driven globalization to the point it is at the moment.

Aspects comprising principles, rules, and regulations have aided the functionality of different facets within the society.

The benefits, however, also come with downsides.

Data or information of any kind is more or less at the center of much of the activities that people are involved in. Communication and transfer of information from party to party have largely been possible and effective because of technological developments. All kinds of industries rely on technology to accomplish their objectives. As much as technology has been beneficial, it has also contributed towards vices such as cybercrimes.

2

Literature Review

There is need for more understanding about prevention of cyber threats.

This happens to be an issue that keeps growing by the day.

Literature from Loukas et al. (2012), Adu-Gyamfi, et al. (2021) and Garside et al. (2012) help inform on the subject.

They utilize different research methodologies to engage in the topic.

The magnitude of data management has necessitated the developments in cybersecurity because of the rise in cyber attack cases. As technology keeps providing ways of improving in life, it also enables cyber attackers to find more means of intruding private systems. The incorporation of different research studies help in gaining better perspective about the subject.

3

Literature Review Cont’d

Use of MICL according to Loukas et al. (2012).

Applying a cryptographic encryption technique as Adu-Gyamfi et al. (2021) suggested.

Garside et al. (2012) generally social networking sites are integral in sense making.

Essentially, the problem can be addressed from different angles.

An issue such as cybersecurity requires a multifaceted approach which should help in addressing the problems effectively. MICL is a system that incorporates private communities such as research groups and student communities with the main aim of providing education. Cryptographic encryption technique factors in shielding the privacy and identity of users.

4

Analysis of Literature

MILC applications are critical.

More applications should increase in the near future.

The authentication scheme is effective.

Social networking sites can provide critical information.

It is important that the downsides do not overweight the upsides of technology.

MILC application that provides location-based services and mobile instant messaging by providing an acceptable level of security by using cryptography. It integrates with private communities mainly for education reasons. It uses both symmetric and asymmetric cryptography to provide a high level of security. The authentication system is useful for the privacy protection of group users while sharing data in the form of packets via Bluetooth-enabled smartphones. Social networking sites provide vital information for rapid governance and rapid decision-making processes during abrupt governance and eco-system transition.

5

Discussion

Use of internet in search for resources.

Focus point was data security and privacy.

Results indicated significant use of Bluetooth and mobile applications in sharing information.

The information availability especially places the family of military personnel at risk.

It is agreeable that there is need for better security measures.

The internet has been at the core of the functioning of many areas in the society. Research shows that majority of entities rely on the internet in one way or another. The reliance has increased vulnerabilities to security issues which happen to have adverse repercussions. There are numerous devices which enable the sharing of information from person to person and they are usually Bluetooth enabled and have various applications which help in the sharing process. For military people, their information is more sensitive as its availability may jeopardize the safety of their family. Overall, tighter security measures are vital.

6

Discussion Cont’d

by Loukas et al. (2012) uses quantitative research.

Adu-Gyamfi et al. (2021) used literature survey and Garside et al. (2012) relied on policy documents.

Adu-Gyamfi et al. (2021) focused on social media while the other two used internet resources in general.

Loukas et al. (2012) indicated the likelihood of mobile applications increasing even with the risks they pose.

Adu-Gyamfi et al. (2021) showed that authentication system could enhance privacy.

There are various ways through which individuals apply in gaining more knowledge on different subject matters. The issue of information security is one which requires in-depth research and it is thus essential that different studies are incorporated in expanding the knowledge base. The use of different research is helpful in gaining better understanding of the issue. The focus on social media and other internet websites shows the diversity of the problem. There will always be reliance on technological features and products. Importantly, there are solutions that will help improve security.

7

Conclusion

Technological advancements are increasing the connectedness of individuals.

This is an advantage but also can be a disadvantage.

There is need for safety at all times.

Rules and regulations are key in mitigation.

There is need of investment in more safety measures.

Technological developments have been fruitful but have also led to data management issues. There are risks that befall several parties such military members who may be targeted. Terrorists use the internet platforms to determine their target's location in order to attack their exact position. Additionally. Corporate espionage has become quite common. In other cases, information is not filtered before sharing. Safety and security are vital in enhancing the wellbeing of individuals and their information. More attention should be paid towards alleviation of the problem information security.

8

References

Adu-Gyamfi, D., Zhang, F., & Takyi, A. (2021). Anonymizing group data sharing in opportunistic mobile social networks. Wireless Networks, 27(2), 1477-1490. https://link.springer.com/article/10.1007/s11276-020-02524-8

Garside, D., Ponnusamy, A., Chan, S., & Picking, R. (2012). Secure military social networking and rapid sensemaking in domain-specific concept systems: research issues and future solutions. Future Internet, 4(1), 253–264. https://doi.org/10.3390/fi4010253

Loukas, A., Damopoulos, D., Menesidou, S. A., Skarkala, M. E., Kambourakis, G., & Gritzalis, S. (2012). MILC: A secure and privacy- preserving mobile instant locator with chatting. Information Systems Frontiers, 14(3), 481-497. https://link.springer.com/article/10.1007/s10796-010-9254-0

image2.png

image3.png

image4.jpg

image1.png