The purpose of a thesis or dissertation is to develop an argument. One of the key components of an Argument is a Claim.

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

The purpose of a thesis or dissertation is to develop an argument. One of the key components of an Argument is a Claim.

Post by answerhappygod »

The purpose of a thesis or dissertation is to develop anargument. One of the key components of an Argument is a Claim.Therefore, in general paragraphs should focus on claims, themes orideas (i.e., claims-driven writing) and not on authors orreferences that you cite (i.e., author-driven writing). Which isthe following paragraphs is a good example of claims-drivenwriting: Select one:
a. “Recently Leonid (2019) wrote that hackers could snoop onWhatsApp, although it has an end-to-end encryption. If anyone canaccess your phone’s operating system they can read your messageswithout decryption. Leonid (2019) explains how companies such aslike Facebook use the end-to-end encryption as a marketing deviceto lull customers wary about cyber-surveillance into a false senseof security.”
b. “According to Straq (2019), Deputy Minister ofCommunications, Pinky Kekana stated that the RSA government workingon a long-term goal in addressing the shortage of skills ofcybersecurity in the country. When Kekana was address the CEO Forumfor cybersecurity in Johannesburg, she said that RSA will haveformal qualifications in cybersecurity ranging from diplomas topostgraduate degrees (Straq 2019)."
c. “The field of educational technology has been under fire forseveral decades for failing to interrogate its practice using soundresearch principles (Bigum and Rowan, 2015; Bromley, 1997; Graham,2011; Johnson, 2015; Kerr, 1989; Kirkwood and Price, 2013;Lankshear, 2003; Selwyn, 2000, 2014). Specifically, the field hasbeen accused of elevating practice over theory (Graham, 2011; Gunnand Steel, 2012; Oliver, 2013) through a conspicuous tendency tomistrust, or even avoid, theoretical approaches (Selwyn,2000).”
d. “According to Creswell (2014) three research methods could beutilized in a research namely qualitative, quantitative and themixed methods. A qualitative research method collects opinions andviews of participants in the form of words which are then processesto respond to the research objective (Creswell 2014). Aquantitative research collects numerical data which is rendered tomathematical manipulations to test theory (Creswell 2014). Themixed methods utilized both the quantitative and the qualitativemethods to provide an answer to the research questions (Creswell2014).”
e. “Cyber-attacks are a common cause for concern in manyorganisations, due to its constantly evolving nature that threatenscomputers or computer networks (Biju et al., 2019). There arenumerous hacking techniques that one needs to be aware of, whichmakes individuals and organisations more susceptible tocyber-security issues. When tackling these cyber-security issues,various preventative methods are necessary (Biju et al.,2019).”
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply