Social engineering in cyber security effects on everyday consumers

The following elements must be clearly applied and demonstrated in your Researched Paper:
• Use 5-7 scholarly sources (no .com, .net, .org, or reference material—scholarly academic [database], .gov, edu,
or print sources only).
• Write an attention-grabbing introduction, which takes a position.
• Demonstrate research literacy by using a variety of sources.
• The Research Paper must be written in the 3rd person.
• Acknowledge the alternative viewpoints, make concessions.
• Apply writing process and editing conventions.

Sample Solution