Need help? We are here

There are often two primary challenges when researching a problem: an overabundance of articles that result from the search process

There are often two primary challenges when researching a problem: an overabundance of articles that result from the search process, or very few articles that result from the search process. Search strategies involve specific keywords so that your problem is the central focus of the articles that you find. The Walden University Library has helpful materials for how to search for your sources. The librarians are also available to answer your questions about finding the articles that you need. Since the Capstone Project is a research paper, nearly all of your sources should be peer-reviewed articles.
One simple way to research peer-reviewed articles is to check this box when creating a search in the Walden University Library. For this Discussion you will explain some of the challenges or strategies that you used in your search for scholarly articles.
To prepare:
Review the Learning Resources regarding critically analyzing and evaluating sources.
Begin to identify mostly current peer-reviewed journal articles.
By Day 4
Post a description of your efforts to identify relevant scholarly articles about your Capstone problem; explain the challenges that you encountered in your search process. Also explain what resources, tips, or organizational advice you have for others with this process.
Be sure to support your
postings and responses
with specific references to the Learning Resources and identify current relevant literature to support your work.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Linux Implementation Proposal: Client Response Memo Hide Assignment InformationTurnitinThis assignment will be submitted to Turnitin.Instructions Faster Computing was impressed with

Linux Implementation Proposal: Client Response MemoHide Assignment InformationTurnitin®This assignment will be submitted to Turnitin®.InstructionsFaster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:(12.3.2: Describe the implementation of

Learn About creating good password security. An IT Security consultant has made three primary recommendations regarding passwords: Prohibit guessable passwords

Learn About creating good password security.An IT Security consultant has made three primary recommendations regarding passwords:Prohibit guessable passwordssuch as common names, real words, numbers onlyrequire special characters and a mix of caps, lower case and numbers in passwordsReauthenticate before changing passwordsuser must enter old pwbefore creating new oneMake authenticators unforgeabledo

Locatetwo U.S. Supreme Court cases that discuss violent crimes and various types of criminal defenses. https:www.supremecourt.govsearchcenter.aspx Writea 700

Locatetwo U.S. Supreme Court cases that discuss violent crimes and various types of criminal defenses.https://www.supremecourt.gov/search_center.aspxWritea 700- to 1,050-word case analysis in which you identify and examine the types of criminal defenses that were used. Include the following:Explain the nature and types of defenses used in the cases. What evidence was