Chapter 12: Technical Research

The Role of Technical Research in Engineering

Photo by Jason Leung on Unsplash

As an engineer in training, developing strong research skills is one of the most important steps you can take toward becoming an effective problem-solver. Engineering isn’t just about applying formulas. It’s also about investigating real-world challenges, exploring possible solutions, and making well-informed decisions based on evidence. To do this, you need to know how to gather reliable information, analyze data, synthesize findings, and come up with convincing recommendations based on your work.

 

Gathering Reliable Information 

Gathering reliable information ensures that your analysis is based on accurate, relevant, and up-to-date evidence—the foundation for decisions that withstand scrutiny. Consider the following tips as you prepare to gather sources:

Start with a clear research question. The first step is to clearly define the problem you’re trying to solve, and then clearly articulate this in a research question. The wording is extremely important because you use these words—along with their synonyms—to limit your search to the most relevant and useful sources. A poorly articulated research question will almost certainly lead to time lost on unrelated information.

Identify precise search terms: Once you have a clear research question, the next step is to identify the keywords that will help you find relevant information. Start by highlighting the main concepts in your research question, then list synonyms, related terms, and variations in spelling or phrasing. These search terms will form the foundation of your online searches and database queries.

Imagine that your research question is the following:

How does smartphone addiction impact the sleep quality and cognitive performance of university students?

This research question includes the following four key elements: (1) smartphone use, (2) sleep quality, (3) cognitive performance, and (4) engineering students.

Combine search terms: After selecting your keywords, you can refine your search by combining them with AND, OR, or NOT within the search field of the library catalogue or academic database.

  • AND narrows your results by retrieving only sources that include all the specified terms (e.g., aerodynamics AND wind tunnels).
  • OR broadens your results by including sources that contain any of the listed terms (e.g., unmanned aerial vehicles OR drones).
  • NOT excludes certain terms from your search results. Applying these functions in field searches—such as titles, abstracts, authors, or subject headings—can make your searches faster and more relevant.

Table 12.1 Combining Search Terms and Their Synonyms

keyword keyword synonym keyword synonym
Concept 1
AND/OR/NOT
Concept 2
AND/OR/NOT
Concept 3

Focusing on sources at the intersection of key concepts narrows search results, while using different combinations of terms helps you gather information most relevant to the themes you want to develop in your arguments.

Examples

Theme 1: smartphone use AND sleep quality AND engineering students
Theme 2: smartphone use AND cognitive performance AND engineering students

Use reliable and credible sources. Prioritize peer-reviewed journal articles, academic books, government reports, technical standards, and publications from professional engineering organizations (like IEEE or ASME). These sources are typically reviewed for accuracy and quality.

Search in academic databases. Use databases like IEEE Xplore, ScienceDirect, or others that are accessible through the university’s library portal. Sources from these platforms are more reliable than general web searches and give you access to high-quality technical and scientific work. Depending on your needs, you might also consider white papers, technical reports, or patents from engineering firms or government agencies. These can give insight into current technologies, gaps in the market, and practical applications. Case studies can be useful to explore how similar problems have been solved in real-world settings and to determine what has or hasn’t worked in the past.

Read abstracts to evaluate sources. While gathering materials for your research, you do not need to read every research paper in full right away. Instead, focus on the abstracts—brief summaries of purposes, methods, and key findings—to determine whether the purpose and scope of a study align with your research focus. This will save time and help you filter out less relevant works. For more information, refer to the section Understanding the Structure of Abstracts in this chapter.

Evaluate for bias and relevance. Ask yourself, “Who produced this source, and why? Is it objective? Is it directly related to the research problem?”

Stay current. Technology changes fast. As a general rule, try to use sources published within the last 5 years, especially if your research problem relates to emerging fields like AI, renewable energy, or aerospace.

Take organized notes and track your sources. Record citation details (e.g., in APA or IEEE format) as you go. This saves time later and reduces the risk of missing or incorrect citations in your final document. Record key points, technical data, and useful visuals. Keep track of where each piece of information came from—you’ll need this for citations to back up your work with evidence.
By following these tips, you’ll build a strong foundation of evidence that shows that you deeply understand the technical, practical, and social dimensions of the problem you’re trying to solve.

Note: A spreadsheet can be an invaluable tool for organizing and managing information from sources during the search—especially when working on complex problems or group projects. Use the column headings in the spreadsheet to record title, author, publication date, type of source (e.g., journal article, report, website), and where you found it. This helps you keep everything in one place and easily compare sources. You can also use columns to note important points from each source—such as main findings, useful data, relevant quotes, or technical methods. Use a tagging system to identify how each source meets your specific needs. For example, you could tag them as supporting or advising against the application of a specific technology.

Understanding the Structure of Abstracts

Abstracts provide a condensed version of a longer piece of writing, so they are useful when searching for relevant source materials. They share some key characteristics:

  • They are a concise summary of a specific type of work, often academic (a research paper or thesis).
  • They are brief, usually a single paragraph.
  • They focus on the purpose, method, findings, and conclusions of the work.
  • They prioritize the research question, thesis, and major findings.
  • They may include keywords to help with information retrieval.
  • They are objective and factual, without personal opinions.

Two Types of Abstracts

There are two types of abstracts: descriptive and informative.

Descriptive abstracts: These summarize a report’s structure but not its substance, including specific findings or recommendations. They resemble a paragraph-form table of contents, often mentioning the title, author, purpose, problem, and scope. They describe major topics but omit specific details. These abstracts are typically short, around 50 words.

Informative abstracts: They summarize the report’s substance, not just its structure. They condense key points, while removing extra details, examples, and numbers. They typically don’t include the title or author in the opening lines, as this information is already available in the document being summarized.

Most abstracts for research papers are informative, providing readers with a clear overview of the study’s purpose, methodology, and findings. Some abstracts also include a brief background before stating the purpose, as shown in the following example from [1].

Background: Existing research has demonstrated that depression is positively related to smartphone addiction, but the role of sleep has not been discussed thoroughly, especially among engineering undergraduates affected by the coronavirus disease 2019 pandemic.

Aim: To evaluate sleep as a mediator of the association between smartphone addiction and depression among engineering undergraduates.

Methods: Using a multistage stratified random sampling method, a cross-sectional survey was conducted among 692 engineering undergraduates from a top engineering university in China, and data were collected by self-reported electronic questionnaires. The data included demographic characteristics, such as age, gender, the Smartphone Addiction Scale-Short Version (SAS-SV), the 9-item Patient Health Questionnaire, and the Pittsburgh Sleep Quality Index. Pearson correlation and multiple linear regression analyses were used to examine the association between smartphone addiction and depression, while structural equation models were established to evaluate the possible mediating role of sleep.

Results: Based on the cutoffs of the SAS-SV, the rate of smartphone addiction was 63.58 percent, with 56.21 percent for women and 65.68 percent for men, among 692 engineering students. The prevalence of depression among students was 14.16 percent, with 17.65 percent for women, and 13.18 percent for men. Smartphone addiction was positively correlated with depression, and sleep played a significant mediating effect between the two, accounting for 42.22 percent of the total effect. In addition, sleep latency, sleep disturbances, and daytime dysfunction significantly mediated the relationship between depression and smartphone addiction. The mediating effect of sleep latency was 0.014 [P < 0.01; 95% confidence interval (CI): 0.006–0.027], the mediating effect of sleep disturbances was 0.022 (P < 0.01; 95%CI: 0.011–0.040), and the mediating effect of daytime dysfunction was 0.040 (P < 0.01; 95%CI: 0.024–0.059). The influence of sleep latency, sleep disturbances, and daytime dysfunction accounted for 18.42%, 28.95%, and 52.63% of the total mediating effect, respectively.

Conclusion: The results of the study suggest that reducing excessive smartphone use and improving sleep quality can help alleviate depression.

Keywords: Smartphone addiction, Depression, Pittsburgh Sleep Quality Index, Engineering students, COVID-19, Mediating effect

This is a well-written abstract because it enables readers to quickly and easily locate the information they need. While most abstracts do not use headings for each section, they should still include the essential elements: purpose, methods, results, and conclusion. A brief background may also be added if required by the journal format.

Summarizing and Paraphrasing Sources

When you read an abstract and find it relevant to your research focus, make sure to record it. Once all your sources are recorded and organized, the next step is to summarize and paraphrase them. Summarizing involves identifying the main ideas from your sources and presenting them in your own words. Don’t attempt to summarize all information in the sources. Abstracts can again be very useful because they already provide a condensed overview of an entire study, pointing to the most important points.

Generally, when reading an abstract, you might look for these three key elements:

  • The purpose of the study
  • The method used
  • The key findings

When summarizing a research article, paying particular attention to these three components may save you time. The purpose tells you why the study was conducted and whether it directly connects to your research question. The method helps you evaluate the quality and reliability of the research. The findings present results and conclusions that may support or challenge your argument.

Let’s apply this to an example. The following summary is based on information extracted from the abstract of [1]. Because the abstract is well-structured, it’s easy to find information you need for a summary. An initial attempt at summarizing might be as follows:

The aim of the study was to evaluate sleep as a mediator of the association between smartphone addiction and depression among engineering undergraduates. A cross-sectional survey was conducted among 692 engineering undergraduates from a top engineering university in China using self-reported electronic questionnaires. Smartphone addiction was positively correlated with depression, and sleep played a significant mediating effect between the two, accounting for 42.22 percent of the total effect. In addition, sleep latency, sleep disturbances, and daytime dysfunction significantly mediated the relationship between depression and smartphone addiction. The results suggest that reducing excessive smartphone use and improving sleep quality can help alleviate depression.

However, if you copy exact words from the source or its abstract without rephrasing them and providing proper credit, it is considered plagiarism. To avoid this, it is best to paraphrase. Paraphrasing goes beyond summarizing by restating specific information or ideas from a source in your own words while preserving the original meaning. This is especially valuable when incorporating technical details or specific data points into your research. The passage below provides a paraphrased version of the key ideas from the abstract.

[1] examined the mediating role of sleep in the relationship between smartphone addiction and depression among engineering undergraduates. Based on data collected through a cross-sectional survey of 692 students at a leading engineering university in China, the study identified a significant positive correlation between smartphone addiction and depressive symptoms. Notably, sleep was found to be a substantial mediating factor, accounting for 42.22% of the total effect. Key sleep-related components, including increased sleep latency, frequent disturbances, and daytime dysfunction, were reported to significantly mediate this relationship. These findings underscore the importance of improving sleep quality and reducing excessive smartphone use as potential strategies for mitigating depression in engineering student populations.

As you can see from this paragraph, good paraphrasing shows that you understand the source and allows you to integrate the information more smoothly into your writing.

Synthesizing Sources

Synthesizing sources involves combining information from multiple texts to develop new insights and strengthen your arguments. It is different from simply summarizing each source individually. The goal is to weave ideas together, showing how sources support your points and where they align or disagree. To make these relationships clear, use connectors such as “whereas,” “similarly,” “in contrast,” “however,” and “on the other hand.” The following example illustrates this process.

Research demonstrates that smartphone addiction significantly impacts sleep quality among university students, although the studies reveal different prevalence rates and focus on distinct health outcomes. [1] found smartphone addiction prevalence of 31.1% among health sciences students, whereas [2] reported substantially higher rates of 63.58% among engineering undergraduates. Similarly, both studies employed validated instruments lending credibility to their comparative findings. However, whereas [1] established a direct correlation between smartphone addiction and sleep quality (47.8% of students showing reduced sleep quality), [2] provided mechanistic insights by demonstrating sleep’s mediating role between smartphone addiction and depression. Specifically, [2] found that sleep disturbances accounted for 42.22% of the total effect. It linked smartphone addiction to depressive symptoms, with sleep latency, sleep disturbances, and daytime dysfunction contributing 18.42%, 28.95%, and 52.63% respectively to this mediating effect. In contrast, [1] emphasized broader biopsychosocial health implications without examining mental health outcomes. Collectively, these findings suggest that smartphone addiction not only directly impairs sleep quality across diverse student populations but also creates a pathway to mental health deterioration through sleep-mediated mechanisms.

[1] H. Ozkaya, M. Serdar, H. Acar, S. Pekgor, and S. Gunher Arıca, “Evaluation of the frequency/addiction of smartphone use and its effect on sleep quality in university students,” Annals of Medical Research, vol. 27, no. 2, pp. 657–663, 2020, doi: 10.5455/annalsmedres.2019.11.737.

[2] W.-J. Gao, Y. Hu, J.-L. Ji, and X.-Q. Liu, “Relationship between depression, smartphone addiction, and sleep among Chinese engineering students during the COVID-19 pandemic,” World Journal of Psychiatry, vol. 13, no. 9, pp. 1351–1364, Sep. 2023, doi: 10.5498/wjp.v13.i6.361.

By showing how different pieces of evidence work together, you can build a more complete picture of your research topic. By doing so, you may also strengthen your arguments and increase your credibility as a researcher.

Citing and Referencing Sources

In-text citations are references placed within your writing to identify the source of specific information drawn from external works. Even when summarizing or paraphrasing, it is essential to (1) include in-text citations and (2) list the sources in your reference section. Depending on the citation style, in-text citations may appear immediately before or after the idea, fact, statistic, image, or even single word taken from another source. The following examples illustrate this practice.

Several studies have confirmed the relationship between smartphone use and sleep quality [1], [2].

or

According to [1] and [2], excessive screen time significantly impacts sleep quality of university students.

In addition to providing in-text citations, you must include each source in a reference list at the end of your work. The reference list provides complete bibliographic details, allowing readers to locate and verify your sources. This two-part system ensures that proper credit is given to original authors and upholds the integrity of your research. To do this effectively, always track which ideas come from which sources, even when summarizing or paraphrasing. This not only guarantees accurate citation but also strengthens the credibility of your work by clearly distinguishing your ideas from those of others.

Writing Annotated Bibliographies

While a bibliography is a list of sources or works cited in a study, an annotated bibliography lists sources along with brief paragraphs that summarize and evaluate them. It explains the content of each source and how it contributes to your research. The process of crafting an annotated bibliography helps you better understand your materials and shows readers how each source supports your work.

Your annotation may include a summary, an evaluation, and a note on the source’s relevance to your research. Depending on your purposes, you might include one or all of these components.

To summarize, consider:

  • What is the purpose of the study?
  • What are the main arguments?

To evaluate, consider:

  • Is it a useful or credible source?
  • Is the information reliable and objective?

To assess relevance, consider:

  • How does it shape your argument?
  • How will you use it in your research project?

Let’s look at an example to see how these elements come together in a clear and helpful annotation:

[1] W.-J. Gao, Y. Hu, J.-L. Ji, and X.-Q. Liu, “Relationship between depression, smartphone addiction, and sleep among Chinese engineering students during the COVID-19 pandemic,” World Journal of Psychiatry, vol. 13, no. 9, pp. 1351–1364, Sep. 2023, doi: 10.5498/wjp.v13.i9.1351.

The main aim of [1] was to evaluate sleep as a mediating factor in the relationship between smartphone addiction and depression among engineering undergraduates during the COVID-19 pandemic. The authors conducted a cross-sectional survey with 692 students using validated tools, such as the Smartphone Addiction Scale–Short Version and the Pittsburgh Sleep Quality Index. Their analysis showed that smartphone addiction was positively correlated with depression, and sleep played a significant mediating role, accounting for 42.22% of the total effect. Specific factors, such as sleep latency, disturbances, and daytime dysfunction, contributed significantly to this relationship.

Since this study was conducted using a large sample and published in the peer-reviewed World Journal of Psychiatry, it is a credible and reliable source of information. The authors provided clear data and analysis that help explain how poor sleep links smartphone addiction to mental health outcomes.

This resource is helpful for my research project, which explores the impact of excessive smartphone use on sleep and cognitive performance among engineering students. The findings offer a valuable framework for examining sleep-related variables and support my study’s argument that addressing sleep issues can mitigate the broader consequences of digital overuse.

Writing a Review of Library Sources

Once you find relevant, non-biased, and current sources for your research question and categorize them according to their themes, the next step involves structuring the review. A well-structured review has four essential parts: title, introduction, discussion, and conclusion.

User-Related and Technology-Related Vulnerabilities in Smart Homes: A Review of Library Sources

Smart home technologies refer to internet connected devices used for managing and remotely controlling household functions, such as locks, lights, cameras, and thermostats. While these tools enhance convenience and efficiency, they also introduce cybersecurity risks. Many smart homes rely on networks, cloud services, and remote access, which can expose users to threats such as hacking and surveillance. As more households adopt these technologies, it becomes essential to understand their associated security challenges. This review examines common cybersecurity problems in smart homes, focusing on risks from user behavior and from technology.

User-Related Vulnerabilities in Smart Homes

Poor authentication practices remain one of the most identified weaknesses in smart-home environments. [1] found that many users leave default credentials unchanged or create overly simple passwords, making devices especially vulnerable to unauthorized access. [2] further observed that password reuse across multiple smart-home services is widespread, enabling a single compromised credential to open several attack paths. Their findings suggest that these everyday habits significantly reduce the overall security posture of smart homes. Together, the studies reveal that even when devices offer secure features, the failure to adopt strong authentication practices continues to create critical risks for users.

In addition to poor authentication practices, limited user awareness significantly contributes to security risks in smart homes. [2] reported that many households possess only a basic understanding of their devices security settings and rarely consult manufacturer guidance, leaving default configurations untouched.  [3] found that the anomaly detection tools bundled with many smart home systems remain on default settings because users rarely adjust them, which sharply limits the devices’ ability to recognise emerging attack patterns. [4] observed that users rarely monitor network traffic and often neglect built-in protections such as encryption or two-factor authentication, leaving their systems vulnerable to exploitation. Taken together, the evidence suggests that low digital knowledge is a pivotal yet often overlooked cause of smart-home insecurity.

Finally, smart home users often lack control over how third-party services access and manage their data, creating serious privacy and security risks. [2] found that many smart-home devices automatically share user information with external servers without offering clear consent options or opt-out mechanisms. [5] likewise observed that traffic routed through centralized hubs exposes user metadata to outside platforms with minimal transparency, leaving homeowners unaware of when and how their data are being accessed. This convergence in the literature points to user agency and data-flow transparency as missing pillars in today’s smart-home ecosystem.

Technology-Related Vulnerabilities in Smart Homes

While user behavior contributes to security issues, structural design choices in smart-home systems also create significant risks. [6] note that many platforms rely on centralized architectures in which a single cloud server or hub manages all device interactions. This setup introduces a single point of failure, meaning a successful attack on the central node could compromise the entire system. [7] further showed that dependence on external service providers for identity management and data routing limits user oversight and magnifies the impact of any cloud-side breach. This evidence underscores centralization as a pivotal factor that shapes both the visibility and resilience of smart-home ecosystems.

Smart-home security is frequently undermined by poor maintenance of device firmware, which can leave systems exposed to known threats. [8] revealed that many popular devices still rely on outdated, password only update procedures that transmit files without verifying their authenticity. In addition, [5] found that many commercial hubs lack secure, authenticated update channels, allowing attackers to block or replay critical patches. [4] further noted that homeowners often receive no meaningful alerts or lack the technical skills to apply fixes manually, prolonging device vulnerability. Collectively, the literature shows inconsistent firmware upkeep as a persistent gap that both increases the likelihood of unauthorized access and erodes user confidence in the reliability of smart-home technologies.

Absence of regulatory frameworks for smart-home cybersecurity is also a major concern. [6] pointed out that existing performance standards such as TS 621 for smart locks focus narrowly on physical robustness and leave cyber-specific attack vectors largely unaddressed. Assessing a broader spectrum of consumer IoT, [2] observed that national legislation is still fragmented, resulting in inconsistent requirements for encryption, vulnerability disclosure, and data-handling practices across manufacturers. Echoing this gap from an emerging-economy perspective, [4] noted that low-cost devices often bypass certification entirely, entering the market without any compliance audit. Clearly, the current regulatory patchwork allows insecure products to proliferate, leaving end-users to absorb the residual cyber-risk.

Conclusion

This review examined cybersecurity risks in smart home environments, focusing on vulnerabilities resulting from both user behavior and system design. The findings reveal three main user-related vulnerabilities—weak authentication practices, limited cybersecurity awareness, and poor control of third-party data access—and four system-level vulnerabilities—centralized architectures, unpatched firmware, insecure communication protocols, and lack of regulatory frameworks. While current research provides important insights into these challenges, a significant gap remains in understanding how these risks develop and interact over extended periods in everyday home settings. Future research should include real-world studies that evaluate decentralized security models, automated firmware update systems, and emerging regulatory standards to strengthen smart home resilience and user trust.

References

[1] Y. Zhang, P. Malacaria, G. Loukas, and E. Panaousis, “CROSS: A framework for cyber risk optimisation in smart homes,” Computers & Security, vol. 130, p. 103250, Jul. 2023, doi: 10.1016/j.cose.2023.103250.

[2] D. Buil-Gil et al., “The digital harms of smart home devices: A systematic literature review,” Computers in Human Behavior, vol. 145, p. 107770, Aug. 2023, doi: 10.1016/j.chb.2023.107770.

[3] J. I. Iturbe-Araya and H. Rifà-Pous, “Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization,” Int. J. Inf. Secur., vol. 24, no. 1, p. 45, Feb. 2025, doi: 10.1007/s10207-024-00961-6.

[4] R. Sivapriyan, S. V. Sushmitha, K. Pooja, and N. Sakshi. “Analysis of Security Challenges and Issues in IoT Enabled Smart Homes,” in 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bangalore, India: IEEE, Dec.2021, pp. 1-6. doi: 10.1109/CSITSS54238.2021.9683324

[5] O. Setayeshfar et al., “Privacy invasion via smart-home hub in personal area networks,” Pervasive and Mobile Computing, vol. 85, p. 101675, Sep. 2022, doi: 10.1016/j.pmcj.2022.101675.

[6] A. Allen, A. Mylonas, S. Vidalis, and D. Gritzalis, “Smart homes under siege: Assessing the robustness of physical security against wireless network attacks,” Computers & Security, vol. 139, p. 103687, Apr. 2024, doi: 10.1016/j.cose.2023.103687.

[7] X. Xu, Y. Guo, and Y. Guo, “Fog-enabled private blockchain-based identity authentication scheme for smart home,” Computer Communications, vol. 205, pp. 58–68, May 2023, doi: 10.1016/j.comcom.2023.04.005.

[8] A. Huszti, S. Kovács, and N. Oláh, “Scalable, password-based and threshold authentication for smart homes,” Int. J. Inf. Secur., vol. 21, no. 4, pp. 707–723, Aug. 2022, doi: 10.1007/s10207-022-00578-7.

This work was authored by Dhruv Dipakkumar Patel, Summer 2025, and is included here with permission. Citation: D. D. Patel, User- and Technology-Driven Vulnerabilities in Smart Homes: A Review of Library Sources, unpublished student work, Concordia University, Summer 2025.

Informative Titles

The title serves as your reader’s first impression and establishes the foundation for their understanding. An effective title clearly identifies the focus of your report while reflecting the core topic you are investigating. A vague, too general, too detailed, too informal, or unprofessional title may confuse the reader or fail to clearly communicate the focus and purpose of your report. Let’s read the following titles to see what to avoid:

Poor Example: Technology in Engineering 

This title is too broad and vague. It doesn’t indicate what kind of technology, what area of engineering, or what aspect is being reviewed.

Poor Example: A Review of the Use of Deep Learning-Based Predictive Maintenance Algorithms for Fault Detection in Electric Motor Bearings in Aerospace Systems Operating at High Altitudes

This title is overly long and specific. It overwhelms the reader and makes it difficult to grasp the focus quickly.

Poor Example: How Cool AI Tools Can Help Engineers

Informal language like “cool” undermines the credibility of the paper and doesn’t reflect an academic tone.

Poor Example: A Literature Review on Biomedical Implants (when the paper is actually about AI in mechanical engineering)

This title misrepresents the content. Titles must accurately reflect the scope and focus of the review. Therefore, you might consider crafting a title that is brief yet precise. This offers readers immediate insight into what your review will explore.

Good Example: The Role of Artificial Intelligence in Improving Structural Health Monitoring: A Review of Library Sources

This title immediately conveys the topic, target population, and document type to the reader.

The Introduction

The introduction sets the stage for your entire review and shows readers how you will analyze the topic. It works best when you clearly explain the problem you’re researching, define any important terms your readers might not know, and state the purpose of your report.

A strong introduction defines the main topic or problem and explains its significance. You can also give readers a brief overview of how your discussion will be organized so that they know what to expect. Including a clear statement of purpose helps readers follow your analysis and understand the goals of your review.

The Discussion

The discussion forms the analytical heart of your review, where your critical thinking and synthesis skills become most evident. In this section, you organize and synthesize your sources based on how they help explain or solve the problem you’re researching. Group similar studies or findings together so your readers can see how each contributes to your understanding of the topic. For example, in the review titled User-Related and Technology-Related Vulnerabilities in Smart Homes: A Review of Library Sources, the sources are organized under two main themes: user-related vulnerabilities and technology-related vulnerabilities in smart homes.

When developing your arguments, it can be helpful to organize your writing into paragraphs to keep your ideas focused. Ideally, each paragraph should cover just one main point. You might also find it useful to further group the sources within each paragraph. Once your sources are organized under main headings (such as user-related vulnerabilities and technology-related vulnerabilities in smart homes, as in the example), you can discuss each point in its own paragraph for clarity. To illustrate, in the example review, the first paragraph under User-Related Vulnerabilities in Smart Homes focuses on poor authentication practices, the second on limited user awareness, and the third on lack of control over third-party data risks. Similarly, under Technology-Related Vulnerabilities in Smart Homes the first paragraph focuses on poor structural design choices in smart‑home systems, the second on poor maintenance of device firmware, and the third on absence of regulatory frameworks for smart‑home cybersecurity.

A good way to begin each paragraph is with a topic sentence that clearly states the main idea or point of argument. This sentence usually connects to how your sources contribute to understanding the research problem. Think of it as a mini-summary that guides the reader on what to expect. For instance, if your paragraph is about poor structural design choices in smart-home systems, you could start with, “Structural design choices in smart-home systems also create significant risks.” This sets the focus, and the rest of the paragraph should provide evidence from your sources to support that idea.

Once you have introduced your topic, the next step involves supporting your main idea with evidence from multiple sources through effective synthesis. This process requires more than simply presenting basic factual information to inform the reader or providing summaries of what each study found. Instead, you weave together findings from different sources to build a compelling argument that supports your claim. Effective synthesis demonstrates how studies relate to one another and to your research problem, highlighting areas of agreement, disagreement, or complementarity.

Poor example: Smart homes face many security problems related to authentication. Users often set weak passwords or leave default credentials unchanged. Sometimes, people also reuse the same passwords across different accounts. These practices create risks for smart-home systems. Strong authentication is important to keep devices safe.

The paragraph is weak because it simply lists facts without supporting a clear argument. No evidence or studies are provided, just general information. It lacks synthesis, which makes it a disconnected summary rather than a meaningful discussion.

Poor example: [1] studied authentication in smart-home devices and found that users often failed to change default passwords. Their research highlighted that weak passwords allowed unauthorized access to systems. [2] examined password practices in smart-home environments and reported that users reused credentials across platforms.

The paragraph is weak because it simply lists study details without connecting the findings or explaining their significance. There’s no analysis or synthesis of how these dimensions interact or how they support the main idea of the paragraph.

Poor example: Poor authentication practices remain one of the most commonly identified weaknesses in smart‑home environments. [1] showed that many users rely on default or simple passwords. [2] reported that password reuse is common across smart-home services. These studies indicate that authentication is a problem for smart-home devices.

The paragraph is also weak because it merely summarizes each study individually without drawing any meaningful connections between them. It lacks deeper analysis, synthesis, and insight into how the studies relate to one another or contribute to a broader argument. Instead of building toward a clear conclusion, it ends with a vague generalization that fails to support a focused claim.

Good example:  Poor authentication practices remain one of the most commonly identified weaknesses in smart‑home environments. [1] found that many users leave default credentials unchanged or create overly simple passwords, making devices especially vulnerable to unauthorized access. [2] further observed that password reuse across multiple smart‑home services is widespread, enabling a single compromised credential to open several attack paths. Their findings suggest that these everyday habits significantly reduce the overall security posture of smart homes. Together, the studies reveal that even when devices offer secure features, the failure to adopt strong authentication practices continues to create critical risks for users.

This is a better example because it starts with a clear topic sentence, uses evidence from multiple studies, and shows how their findings connect. Instead of just listing results, it explains what they mean together: that weak authentication habits remain a critical vulnerability in smart homes.

Remember: when supporting your arguments with evidence, synthesis means moving beyond individual summaries of sources. Instead, critically evaluate how each source contributes to your overall argument. Look for points of alignment and divergence, and consider what these patterns reveal about your research problem. Rather than treating each study as an isolated finding, show how the collective evidence builds a fuller understanding of your topic.

Notice how the good example paragraph demonstrates this approach. It starts with a clear topic sentence that highlights the main issue—poor authentication practices in smart homes. From there, it weaves together evidence from two studies, showing how everyday habits like leaving default passwords or reusing them across accounts can open the door to serious security risks. Instead of just listing what each study found, the paragraph connects the findings to show the bigger picture: weak authentication consistently undermines smart-home security. It also explains why this matters, pointing out that even strong device features can’t protect users if their behavior leaves systems exposed. In the end, the paragraph doesn’t just summarize research; it uses the evidence to build a strong argument about why authentication remains such a critical vulnerability.

The Conclusion

The conclusion summarizes the key points of your literature review without introducing new arguments or ideas. Start by paraphrasing your introduction’s purpose statement, rephrasing it to reflect what the review has accomplished.  This reminds readers of your original goals and signals your intent to wrap up your key arguments. If your introduction examined common cybersecurity problems in smart homes, focusing on risks from user behavior and from technology, your conclusion might state,This review examined cybersecurity risks in smart home environments, focusing on vulnerabilities resulting from both user behavior and system design.”

Next, summarize the key themes and patterns that emerged from your source synthesis. Consider what the collective evidence reveals about your research problem and how studies work together to build understanding.

Finally, identify any unanswered questions that future research should address. Point out areas where literature remains incomplete or contradictory. You might also suggest directions for future research or recommend actions for practitioners.

Key Takeaways

Even if you don’t conduct academic research, you will often spend days or weeks on applied research—gathering information to solve real-world problems or support engineering decisions. In this process, it is essential to gather reliable and credible sources and use them to back up your arguments with solid evidence. You can organize your work by

  • categorizing sources according to their type and relevance;
  • summarizing and paraphrasing to capture key points accurately in your own words;
  • synthesizing sources to show connections and patterns; and
  • citing and referencing to give proper credit and maintain academic integrity.

Once you have gathered, organized, and analyzed your research materials, you can move on to writing a review of sources. Your review may include the following:

  • Title—Use a precise and informative title.
  • Introduction—Explain the problem and why it needs to be addressed.
  • Discussion—Organize and synthesize your sources to show how they help explain or solve the problem.
  • Conclusion—Summarize the key points without introducing new arguments or ideas.

 

Practice Task

Your engineering design team is preparing an innovation proposal for your company. Before you can design a solution, you need a solid understanding of the problem you’re addressing. The project manager has asked each member of the team to prepare a Review of Library Sources. This report will help your group establish the technical and contextual background for your project, identify gaps in existing knowledge, and resolve any conflicting findings from prior work.

To prepare this review, you will explore and evaluate sources from

  • Academic journals
  • Trade magazines
  • Books, handbooks, and encyclopedias
  • Websites
  • Other relevant resources

Your task is to categorize these sources based on their contributions to understanding the problem your proposal attempts to solve. Beyond summarizing prior work, you must take an evaluative stance. You should

  • Link each source to your research problem.
  • Assess how well each source contributes to understanding that problem.
  • Identify gaps, unknowns, or conflicts in the body of knowledge.

The finished report should

  • Be 750–1000 words in length.
  • Include at least eight sources in IEEE format.

Consider structuring your report as follows.

Title
  • Use a title that clearly identifies the focus of the report on library research. (Be brief, but precise.)
Introduction
  • Establish context for the problem you are researching.
  • Define key terms (if necessary).
  • Include a clear statement of purpose that establishes the scope and goals of the report.
  • Provide a “road map” indicating the order in which you approach ideas in the body of the report.
Body
  • Categorize your sources according to the contribution they make to understanding the problem.
  • Develop your arguments in paragraph form.
  • Present and elaborate on one main idea per paragraph.
  • Tie the content of sources that you review to the scope and focus established in the introduction. (i.e., Establish why given sources are relevant to understanding the problem.)
  • Identify gaps/unknowns/conflicts in the body of knowledge.
  • Use transitions to signal the progression of ideas.
  • (Optional) Include diagrams, charts, or images—properly referenced—to help explain key points.
Conclusion
  • Restate the key findings from the review.
  • Suggest directions for future research (based on sources reviewed) or recommendations for action.
  • Do not introduce new ideas in the conclusion.
  • References
  • Provide at least eight references in IEEE format.

References

[1] W.-J. Gao, Y. Hu, J.-L. Ji, and X.-Q. Liu, “Relationship between depression, smartphone addiction, and sleep among Chinese engineering students during the COVID-19 pandemic,” World J Psychiatry, vol. 13, no. 6, pp. 361–375, Jun. 2023, doi: 10.5498/wjp.v13.i6.361.

 

License

Share This Book