Assignment 4 Peer Review: Difference between revisions
No edit summary |
No edit summary |
||
Line 35: | Line 35: | ||
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf Internet infiltration to Nigeria: burden of cyber-crime to e-commerce] | Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf Internet infiltration to Nigeria: burden of cyber-crime to e-commerce] | ||
Onyema, this is a very interesting topic, but I would suggest for an academic paper you need to footnote in your paper information you have found from third party sources. Although you have original ideas, it gives your paper credibility to cite third party information you have used to develop the conclusions in your paper. [[[[User:Sjennings|sjennings]] 16:39, 5 May 2011 (UTC)]] |
Revision as of 11:39, 5 May 2011
If you'd like to receive or give feedback from/to other students on your rough drafts, please submit them here.
Brandon A. Ceranowicz Draft 2.2: http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0. BrandonAndrzej 16:18, 26 April 2011 (UTC)
Brandon A. Ceranowicz Draft 2.5: http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc Conclusion is live! Take a look. Theoretical framework still to come. BrandonAndrzej 23:14, 27 April 2011 (UTC)
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition's robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper's current format, a summary table comparing the basic aspects of the individual licenses would be useful. --SCL 18:07, 1 May 2011 (UTC)
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.BrandonAndrzej 01:25, 2 May 2011 (UTC)
Brandon A. Ceranowicz Draft 3.0: http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v3.0.doc Theoretical framework is up; barring any major errors, this should be the final draft of the long form version - now I have to condense it into 10 pages... suggestions very much appreciated!
Brandon A. Cernaowicz Final Draft (long version) http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses.doc This is the completed long version. Abridged version to follow shortly.
Brandon A. Ceranowicz Draft 1.0 (short version) http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28short%29_v1.0.doc This is a rough draft of the abridged version. The sourcing needs to be completely redone. (Also still a little long...)BrandonAndrzej 18:31, 3 May 2011 (UTC)
Onyema Ajuogu: Internet infiltration to Nigeria: burden of cyber-crime to e-commerce
Onyema, this is a very interesting topic, but I would suggest for an academic paper you need to footnote in your paper information you have found from third party sources. Although you have original ideas, it gives your paper credibility to cite third party information you have used to develop the conclusions in your paper. [[sjennings 16:39, 5 May 2011 (UTC)]]