Correlation papers promote your development of concise and focused thought by encouraging accurate and extended
understanding of an author’s ideas. Start with their purpose and thesis in the course-text. Then confirm or deny one
interesting aspect of that course-text by researching that author’s thinking.
Correlation papers must include one of the following three options:
1. Read and connect one book, film, or peer-reviewed article from 2018 to your favorite idea from Shalit, Tocqueville,
or Zengotita. Some possibilities are found in 1) Academic Search Premier (online at Fitzgerald Library), and 2) Google
Scholar. If you prefer a book, film, or peer-reviewed article not from 2018, you must seek permission from the
professor by emailing him no later than 48 hours before due-time, including the title of source and your paper’s
tentative purpose and thesis. You should not correlate the course-text with a second source before 2018 unless you
have received emailed permission from the professor.
2. Develop a theme which you believe was unclear or incomplete in a course text by using two or three articles from
an encyclopedia, reference dictionary, or other reference work.
3. Connect a course text to one classic work or one work read in another LCT-class. You must obtain emailed approval
from this course’s professor by emailing him no later than 48 hours before the due-time, including the title of the
source, class, professor, semester, and your paper’s tentative purpose and thesis.
Correlation papers may not use these sources, which are often superficial or unreliable in academic analysis:
o news articles or newspaper;
o editorials or letters to the editor;
o blogs (indicated by a *.com extension and/or a timestamp and/or words “posted on” and/or length less than 500 words and/or
focus on author’s personality rather than research); and,
o reviews of books and movies.
Papers should range 3–4 word-processed, double-spaced pages, 10- or 12-point type, in MLA8 Style. Papers should be
submitted by relevant deadline to Blackboard|Assignments|Correlation: xxxx (where xxxx indicates course-author used in
paper). PDF format is preferred because it locks your paper in the formatting that you intend. Digital files should be entitled
this way (exclude quotation marks in actual file name): “yourlastname_courseauthorlastname_date”; for example,
“Sobolewski_Shalit_23Sept2018”. Do not send papers by email. Papers submitted within 24 hours past deadline are
penalized 10 points. Papers are not accepted after 24 hours past the deadline, except in a documented medical or personal
emergency. For your protection, a copy of the paper should be retained.
STRUCTURE AND EVALUATION
Header and Title — The title should be a creative description of the contents of the paper. Other information should also
conform to the MLA8 Style.
Introduction — Opening paragraphs should describe the context of your paper, here including both the purpose and thesis of
the course-book as well as your purpose and thesis. Your purpose will identify your paper’s topic as one interesting aspect of
the course-text, and your thesis will confirm or deny the course-book author’s claim based on additional research. Purpose
considers “why” an author writes, i.e., what motivates them. Thesis states one’s overall point in a single elegant sentence; it
highlights “what” an author’s essential thought is. Please underline your thesis statement. Finally, one often includes a
statement of the paper’s organization in the introduction.
Body of Paper — The body of your paper should illustrate the essential connections that you establish and clarify the various
aspects of your thesis. Remember, your point of departure is the book we read for class; your new material is to clarify and
confirm or deny this book’s thesis and/or claims. Show the logic, internal connections, and depth of your sources. Express
your understanding clearly, accurately, and without a slavish use of resources.
Connections — Relationships and connections of your ideas as well as your assessment of the continuing significance of the
matter should be evident. You should not merely say, for example, “I feel this is important” but you should explain why your
connection is important. The main emphasis of your paper is to present a thoughtful, clear, and memorable insight.
LCT475C Capstone, Fall 2018, Correlation Paper, page 2
Technical Aspects — A research paper should be properly documented in order to show exactly where you derived your
quote, fact, or opinion. Parenthetical notes and a Works Cited are required per MLA8 Style. See Purdue Online Writing Center
(OWL), which is hyperlinked through BlackBoard|Capstone. Your paper will be checked by SafeAssign in order to insure
academic honesty. Plagiarism is a form of robbery; it is the stealing of someone else’s words, ideas, or data without proper
documentation. Be aware that you do not need to cite common knowledge: material that you find again and again as you do
your research or your readings. Without documentation, this paper will be graded “F” and other penalties can occur. As
always, present your findings with sufficient attention to grammar and syntax, spelling and punctuation, and wordprocessing.
Tips for more effective writing can be gained from: William Strunk and E.B. White, The Elements of Style, 3rd. ed. (New York:
The professor is available for academic counseling during office hours or by appointment; do not hesitate to contact me
regarding any aspect of your research.
Consider a review of your paper by the Writing Center at HC17; their suggestions will result in a better paper. Call x. 1432 for
details. They can provide instruction and support for any stage of the writing process—generating ideas, organizing material,
revising the paper, and checking mechanics.
Introduction (Possible Points: 20)
Course-writer’s Purpose clear 5 4 3 0 absent
Course-writer’s Thesis clear 5 4 3 0 absent
Your Purpose clear 5 4 3 0 absent
Your Thesis clear 5 4 3 0 absent
Body of the Paper (Possible Points: 40)
Organization of paper clear 10 8 6 4 confusing
Argument of thesis informed 10 8 6 4 uninformed
coherent 10 8 6 4 not coherent
clear 10 8 6 4 not clear
Connections (Possible Points: 20)
Analysis developed 10 8 6 0 ignored directions
Impact meaningful 10 8 6 0 ignored directions
Technical Aspects (Possible Points: 20)
Grammar and syntax no errors 5 4 3 0 many errors
Spelling and punctuation no errors 5 4 3 0 many errors
MLA8 Style no errors 10 8 6 0 many errors
Bad spellers of the world untie!
LCT475C Capstone, Fall 2018, Correlation Paper, page 3
DEVELOPMENT WORKSHEET FOR CORRELATION PAPERS
Prof. Greg Sobolewski
A book is the only place in which you can examine a fragile thought without breaking it, or
explore an explosive idea without fear it will go off in your face. It is one of the few havens
remaining where a person’s mind can get both provocation and privacy. — Edward P. Morgan
1. What is the author’s purpose in our course-book?
Purpose states “why” an author writes, i.e., their motivation.
See PT Cruiser Worksheet.
2. What is the author’s thesis in our course-book?
Thesis states “what” an author’s overall point is in a single elegant sentence, i.e. their most essential thought.
See PT Cruiser Worksheet.
3. What single topic in the course-book especially interests you?
4. What is one new and reliable source to deepen your interest in this topic?
You cannot use these types of sources (hardcopy or digital) because they are often superficial or unreliable for
analysis: newspapers, letters to the editor, wikis, blogs, reviews of books and movies.
5. What is your purpose in this paper?
Purpose states “why” you are writing this paper, i.e., your motivation (beyond a grade).
What connection do you see between course-book and reliable-source? Why does this correlation interest you?
6. What is your thesisin this paper?
Does your reliable-source confirm or deny the course-book? Why?
Or, what does a deeper understanding of the course-book’s topic demonstrate about hidden influences in our
7. Enumerate a very brief outline for this paper.
Part I Presentation Karl von Clausewitz characterized war as "… a demonstration of viciousness proposed to urge our adversary to satisfy our will In request to achieve this protest completely, the foe must be incapacitated, and demilitarization turns out to be along these lines the quick question of threats… ." At the second's end thousand years, this order never again depicts the full range of current fighting. Later on, we will have the imminent to make war without the utilization of viciousness and satisfy the second 50% of von Clausewitz's definition-with programming alone. The present programming concentrated frameworks make this plausible. "Digital" depicts frameworks that utilization mechanical or electronic frameworks to swap human control. Digital fighting can be executed without viciousness and accordingly the dependence on programming escalated frameworks digital frameworks can make countries presented to fighting without brutality. What is Cyber? Terms with digital utilized as prefix are right now in vogue not just among a few visionaries and technologists looking for new ideas, however even by the man in the road, and every ha its own meaning. The term digital is from Greek root kybernan, which means to guide or administer and a related word Kybernetes, which means pilot, representative, as well as helmsman. Norbert Weiner originally presented the prefix during the 1940s in his great works making the field of robotics (which is identified with cybrenetique, a more seasoned French word meaning the specialty of government). Digital, in actuality has been the most worthy term because of the reason that it crosses over any barrier among data and administration, the two indivisible aspects of control. The prefix along these lines, is uninhibitedly utilized in the accompanying: The internet. Initially authored by William Gibson in his sci-fi novel Neuromancer, distributed in 1984, and characterizes it as that situation inside the PC where electronic action/correspondence happens. He further portrays it as a position of " unfathomable unpredictability". The term has offered ascend to a vocabulary of "cyberterms, for example, cybercafes (bistros that offer espresso and PC time), cybermalls (web based shopping administrations) and cyberjunkies (individuals dependent on being on the web). Computer science. It is the exploration of correspondence and control, which interfaces a screen (human mind or an electronic machine) to different parts of a framework. The capacity being, to look at what is going on in the framework, to what ought to have occurred and after that draw the distinction, which is passed on to the control framework for correction (input). It applies similarly to associations, machines and living beings. Artificial intelligence is additionally used to portray a general explanatory way to deal with control, correspondence and other framework advances and endeavors to connect designing orders with the related work of social researchers through the binding together strings of criticism in its most broad angles and through its enthusiasm for exchange of data. Cyberwar. A RAND Corporation equivalent word for data fighting, it is additionally at some point called netwar. Another school considers it as information related clash at the military dimension. Be that as it may, Denis Quigley approaches by assigning it as 'control fighting' or leitenkreig in German. Cyberwar will be talked about additional in detail later in the Study. Cybernation. Approximately utilized, it infers digitisation of different frameworks of a course of action/association or super frameworks, where hardware joins people to machines, consequently immensly enhancing the human abilities. It, in its most essential shape, would show electronic robotized administration of data and learning. Digital fighting (CW). It is a moderately new expansion to the glossary of fighting. With the heightening utilization of PCs in military and government, there has been a developing consciousness of both another weakness in national framework and another strategy for assaulting one's adversaries. There is the capability of utilizing data frameworks to ensure, control or assault data systems. CW could mean winning wars without discharging shots, the closing down of whole national foundations at the push of a catch, and the entire abuse or demolition of a foe's correspondence systems. It could mean dangers from over the world by states with no capacity to dispatch a traditional assault, or assaults by non-state performers utilizing shoddy workstations. There has likewise been discussion of super-infections closing down countries, and how a displeased individual or little gathering could wage a 'war' on a country. CW is the new ponder weapon, and the new obscure risk. In any case, the idea of CW, and the innovation on which it depends, is plagued by dubious delineations of the perils it presents, or the advantages it offers. CW is conceptualized by security master Amit Yoran, digital security boss at the US Department of Homeland Security and VP of PC enterprise Symantec, as the future "essential venue of tasks". There is an accord that CW is something imperative, yet it isn't clear whether this agreement reaches out to a typical comprehension of what CW really is. It is new to the point that there is no standard definition to depict it. This prompts a standout amongst the most incessant disarrays with respect to digital fighting: its connection to Information Warfare (IW). IW isn't unproblematic in definition, yet can be comprehended as the "hostile and guarded utilization of data and data frameworks to deny, abuse, degenerate, or obliterate, a foe's data, data based procedures, data frameworks, and PC based systems while securing one's own". While IW covers the region of digital fighting, it additionally covers an a lot more extensive command. Electronic ('digital') correspondence is just a single part of IW, which incorporates all data tasks in a contention. Chinese strategist Sun Tzu and Napoleonic strategist Carl von Clausewitz alluded to data activities, and the significance of such tasks in war. IW originates before electronic correspondence, and isn't compatible with digital fighting hence. CW includes units sorted out along country state limits, in hostile and protective tasks, utilizing PCs to assault different PCs or systems through electronic means. Programmers and different people prepared in programming and misusing the complexities of PC systems are the essential agents of these assaults. These people regularly work under the sponsorship and perhaps the help of country state performing artists. Later on, if not effectively normal practice, individual digital fighting units will execute assaults against focuses in a helpful and synchronous way. Breaking down the Threat. In 2007, a forswearing of-benefit assault was propelled at regular intervals. The 2007 FBI/Computer Security Institute examine shown that loss of income credited to DDoS (committed refusal of administration) was roughly US$90,000 a hour for a retail inventory deals organization. Malware is a typical digital weapon. Malware (short for malevolent programming) is a PC program structured with malignant plan. This expectation might be to cause irritating spring up promotions with the expectation you will tap on one and create income, or types of spyware, Trojans and infections that can be utilized to assume control over your PC, take your character, swipe touchy monetary data or track your exercises. No less than five new bits of malware develop at regular intervals, as per Kaspersky's Internet Security Lab. One basic measure I screen frequently is the quantity of huge occasions answered to Hackerwatch.Org. At the time I'm composing this, in the previous 24 hours, there have been in excess of 8 million huge episodes revealed. The notice signs are there, yet the inquiry remains: Are we sufficiently brilliant to plan? A key commence of this paper is that data handling whether by gear (PCs) or by people is turning into a "focal point of gravity" in future fighting. In spite of the fact that there is much discussion on the truth of the CW danger, the developing number of PC interruptions on government and non-government frameworks substantiate the way that the risk is genuine. The developing reliance on data and data based advances have made us exceptionally powerless against antagonistic assaults Hence, our prompt objective must be to both envision and characterize how outside digital assault abilities may undermine data arranges in India and what potential impacts they may have. Philosophy Proclamation of Problem This paper tries to think about and investigate the utilization of digital fighting in future clashes and its suggestions on national security. To recommend India's reaction to these digital dangers by laying out an unmistakable, very much characterized digital security technique and propose measures to shield possess national security. Theory As data frameworks saturate in military and common lives, another outskirts is being crossed – The Information Age-which will characterize the future wars. Digital Warfare has turned out to be fundamental to the manner in which countries battle wars and is the developing venue in which future clashes are well on the way to happen. Digital fighting will appear as a staggering weapon of things to come combat zone which will be coordinated in the 'War battling Doctrines' of countries over the world. Avocation of Study The introduce of digital fighting is that countries and basic framework are ending up progressively subject to PC systems for their task. Likewise as armed forces the world over are changing from a stage driven to a system driven power there is expanding dependence on systems administration innovation. With every one of the benefits of such availability come uncommon difficulties to organize security. Dangers to data foundation could be as demolition, divulgence, alteration of information or potentially disavowal of administration. An antagonistic country or gathering could misuse the vulnerabilities in inadequately anchored system to disturb or close down basic capacities. The insurance of our data assets – data confirmation, will>GET ANSWER