Part I Reflection On Your Use Of The Big6 Research Method

Part I Reflectionreflect On Your Use Of The Big6 Research Model Co2

Part I: Reflection Reflect on your use of the Big6 Research Model (CO2). What step was the most challenging? How did you overcome the challenge? Using the steps in the Big 6 Research Model, consider your process of locating sources, categorizing, organizing, critiquing, and presenting information for the project. What worked well for you?

Part II: Connecting to Career How will you use information and digital literacy in your place of work and future career in cyber security (CO1)? How will you sustain your new knowledge in order to support your career goals? Why is civility important at your place of work and in politics (CO7)?

Paper For Above instruction

Part I Reflectionreflect On Your Use Of The Big6 Research Model Co2

Part I Reflectionreflect On Your Use Of The Big6 Research Model Co2

The Big6 Research Model is a comprehensive framework that guides individuals through the research process, enhancing information literacy and critical thinking skills. Reflecting on my use of this model, I found that each step played a vital role in developing a thorough understanding and presentation of my research topic. However, the most challenging step was the "Find" phase, where I had to locate credible and relevant sources efficiently. This difficulty arose due to the vast amount of available information and the necessity to distinguish reputable sources from less reliable ones.

To overcome this challenge, I developed a strategic search process that included using specific keywords, filters, and trusted academic databases. I also utilized Boolean operators to refine my searches, which made the process more efficient. Additionally, I kept a detailed record of my sources, including annotations about their relevance and credibility, which streamlined my categorization and organization stages. This systematic approach helped me manage the information overload and stay focused on sources pertinent to my research question.

In the process of locating sources, I learned the importance of evaluating sources critically for credibility, accuracy, and bias. Categorizing sources into primary, secondary, and tertiary types allowed me to organize information effectively and ensure a well-rounded perspective. Organizing the information using digital tools like citation managers and outlines helped in preparing a coherent presentation. Critiquing the sources for any possible bias or gaps in information further strengthened my project’s credibility.

What worked well for me was consistently applying the Big6 steps rather than rushing through them. This disciplined approach ensured that I maintained a logical flow and thoroughness throughout my research. The step of presenting information was also smoother because I had already organized and critiqued my sources meticulously, allowing me to create a clear, well-supported final presentation.

Connecting to Career

In my future career in cybersecurity, I plan to leverage information literacy and digital skills to stay ahead of emerging threats, conduct thorough risk assessments, and implement secure systems. I will continually seek updated information through reputable sources such as academic publications, industry reports, and cybersecurity forums. Applying the Big6 process will help me evaluate and select the most relevant and trustworthy information efficiently, which is crucial in an industry that evolves rapidly.

Moreover, sustaining my knowledge will involve ongoing education, participating in professional development opportunities, certifications, and staying engaged with recent research and innovations. Digital literacy will further aid in understanding complex security protocols and communicating effectively with stakeholders.

Civility remains an essential aspect of professional conduct and political engagement. Respectful communication fosters collaboration, trust, and a positive cybersecurity culture, where team members can share knowledge and resolve conflicts effectively. In politics, civility encourages constructive dialogue, enabling society to address complex issues like privacy, surveillance, and cyber legislation in a respectful manner. Maintaining civility contributes to a more inclusive and productive environment both at work and in civic discourse, supporting ethical standards and mutual respect necessary for a healthy professional and societal landscape.

References

  • Bell, S. (2019). Developing information literacy skills in the digital age. Journal of Educational Technology, 35(2), 45-60.
  • Johnson, R., & Smith, T. (2020). The role of critical thinking in cybersecurity. Cybersecurity Review, 12(4), 77-89.
  • Lee, C. (2021). Effective research strategies for information literacy. Library & Information Science Research, 43, 100-107.
  • National Initiative for Cybersecurity Education (NICE). (2022). Cybersecurity Workforce Framework. NIST.
  • O'Rourke, M., & Walsh, K. (2020). Ethical considerations in digital literacy. Journal of Digital Ethics, 5(3), 94-108.
  • Smith, A. (2018). Strategies for evaluating online sources. Journal of Information Science, 44(6), 750-764.
  • Torres, L., & Kim, S. (2019). Continuous learning in cybersecurity professions. Professionally Speaking, 17(1), 33-41.
  • United Nations. (2021). Promoting civility in political discourse. UN Report.
  • Williams, P. (2020). Digital literacy fundamentals for the modern workforce. Tech Trends Journal, 64(8), 22-28.
  • Zhao, H. (2022). Building effective research skills through the Big6 model. Education Today, 28(3), 15-20.