{"id":296,"date":"2025-09-03T14:41:09","date_gmt":"2025-09-03T18:41:09","guid":{"rendered":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/?post_type=chapter&#038;p=296"},"modified":"2026-02-20T18:26:40","modified_gmt":"2026-02-20T23:26:40","slug":"chapter-12-technical-research","status":"publish","type":"chapter","link":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/chapter\/chapter-12-technical-research\/","title":{"raw":"Chapter 12: Technical Research","rendered":"Chapter 12: Technical Research"},"content":{"raw":"<div class=\"menu-table\"><span class=\"menu-table-title\">\u00a0Chapter Contents<\/span><a class=\"menu-table-panel\" href=\"#section-a\">The Role of Technical Research in Engineering<\/a><a class=\"menu-table-panel\" href=\"#section-1\">Gathering Reliable Information<\/a><a class=\"menu-table-panel\" href=\"#section-2\">Understanding the Structure of Abstracts<\/a><a class=\"menu-table-panel\" href=\"#section-3\">Summarizing and Paraphrasing Sources<\/a><a class=\"menu-table-panel\" href=\"#section-4\">Synthesizing Sources<\/a><a class=\"menu-table-panel\" href=\"#section-5\">Citing and Referencing Sources<\/a><a class=\"menu-table-panel\" href=\"#section-6\">Writing Annotated Bibliographies<\/a><a class=\"menu-table-panel\" href=\"#section-7\">Writing a Review of Library Sources<\/a><a class=\"menu-table-panel\" href=\"#section-8\">Key Takeaways<\/a><a class=\"menu-table-panel\" href=\"#section-9\">Practice Task<\/a><a class=\"menu-table-panel\" href=\"#section-10\">References<\/a><\/div>\r\n<h1 id=\"section-a\"><span style=\"color: #664a25\"><strong>The Role of Technical Research in Engineering<\/strong><\/span><\/h1>\r\n[caption id=\"attachment_1039\" align=\"alignleft\" width=\"243\"]<img class=\"wp-image-1039\" src=\"http:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-content\/uploads\/sites\/72\/2026\/01\/PHOTOB1-3.jpg\" alt=\"\" width=\"243\" height=\"315\" \/> Photo by <a href=\"https:\/\/unsplash.com\/@ninjason\">Jason Leung<\/a> on <a href=\"https:\/\/unsplash.com\/photos\/a-library-aisle-with-bookshelves-and-sunlight-through-window-xmeRBPunJR8\">Unsplash<\/a>[\/caption]\r\n<p style=\"font-weight: 400\">As an engineer in training, developing strong research skills is one of the most important steps you can take toward becoming an effective problem-solver. Engineering isn\u2019t just about applying formulas. It\u2019s also about investigating real-world challenges, exploring possible solutions, and making well-informed decisions based on evidence. To do this, you need to know how to gather reliable information, analyze data, synthesize findings, and come up with convincing recommendations based on your work.<\/p>\r\n&nbsp;\r\n<h1 id=\"section-1\" class=\"p3\"><span style=\"color: #664a25\"><b>Gathering Reliable Information\u00a0<\/b><\/span><\/h1>\r\n<p class=\"p1\">Gathering reliable information ensures that your analysis is based on accurate, relevant, and up-to-date evidence\u2014the foundation for decisions that withstand scrutiny. Consider the following tips as you prepare to gather sources:<\/p>\r\n<p class=\"p1\"><b>Start with a clear research question.<\/b> The first step is to clearly define the problem you\u2019re trying to solve, and then clearly articulate this in a research question. The wording is extremely important because you use these words\u2014along with their synonyms\u2014to limit your search to the most relevant and useful sources. A poorly articulated research question will almost certainly lead to time lost on unrelated information.<\/p>\r\n<p class=\"p1\"><b>Identify precise search terms:<\/b> Once you have a clear research question, the next step is to identify the keywords that will help you find relevant information. Start by highlighting the main concepts in your research question, then list synonyms, related terms, and variations in spelling or phrasing. These search terms will form the foundation of your online searches and database queries.<\/p>\r\n<p class=\"p1\">Imagine that your research question is the following:<\/p>\r\n\r\n<div class=\"textbox\">\r\n<p class=\"p1\">How does smartphone addiction impact the sleep quality and cognitive performance of university students?<\/p>\r\n\r\n<\/div>\r\n<p class=\"p1\">This research question includes the following four key elements: (1) smartphone use, (2) sleep quality, (3) cognitive performance, and (4) engineering students.<\/p>\r\n<p class=\"p1\"><b>Combine search terms:<\/b> After selecting your keywords, you can refine your search by combining them with AND, OR, or NOT within the search field of the library catalogue or academic database.<\/p>\r\n\r\n<ul>\r\n \t<li>AND narrows your results by retrieving only sources that include all the specified terms (e.g., aerodynamics AND wind tunnels).<\/li>\r\n \t<li>OR broadens your results by including sources that contain any of the listed terms (e.g., unmanned aerial vehicles OR drones).<\/li>\r\n \t<li>NOT excludes certain terms from your search results. Applying these functions in field searches\u2014such as titles, abstracts, authors, or subject headings\u2014can make your searches faster and more relevant.<\/li>\r\n<\/ul>\r\n<p class=\"p1\" style=\"font-size: 0.9em\"><span style=\"color: #ff6600\">Table 12.1<\/span> Combining Search Terms and Their Synonyms<\/p>\r\n\r\n<table style=\"width: 100%;border-collapse: collapse;border: 1px solid #ccc;font-family: sans-serif\">\r\n<thead>\r\n<tr style=\"background-color: #f2f2f2\">\r\n<th style=\"padding: 12px;border-bottom: 2px solid #ccc;border-right: 1px solid #ccc;width: 25%\"><\/th>\r\n<th style=\"padding: 12px;text-align: center;border-bottom: 2px solid #ccc;border-right: 1px solid #ccc\">keyword<\/th>\r\n<th style=\"padding: 12px;text-align: center;border-bottom: 2px solid #ccc;border-right: 1px solid #ccc\">keyword synonym<\/th>\r\n<th style=\"padding: 12px;text-align: center;border-bottom: 2px solid #ccc\">keyword synonym<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\">Concept 1<\/td>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc\"><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"padding: 8px 12px;border-bottom: 1px solid #ccc;background-color: #ffffff;font-size: 0.9em;color: #666\" colspan=\"4\">AND\/OR\/NOT<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\">Concept 2<\/td>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc\"><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"padding: 8px 12px;border-bottom: 1px solid #ccc;background-color: #ffffff;font-size: 0.9em;color: #666\" colspan=\"4\">AND\/OR\/NOT<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\">Concept 3<\/td>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\r\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc\"><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p class=\"p1\">Focusing on sources at the intersection of key concepts narrows search results, while using different combinations of terms helps you gather information most relevant to the themes you want to develop in your arguments.<\/p>\r\n\r\n<div class=\"textbox\">\r\n<p class=\"p1\"><b>Examples<\/b><\/p>\r\n<p class=\"p1\">Theme 1: smartphone use AND sleep quality AND engineering students\r\nTheme 2: smartphone use AND cognitive performance AND engineering students<\/p>\r\n\r\n<\/div>\r\n<p class=\"p1\"><b>Use reliable and credible sources.<\/b> Prioritize peer-reviewed journal articles, academic books, government reports, technical standards, and publications from professional engineering organizations (like IEEE or ASME). These sources are typically reviewed for accuracy and quality.<\/p>\r\n<p class=\"p1\"><b>Search in academic databases.<\/b> Use databases like IEEE Xplore, ScienceDirect, or others that are accessible through the university\u2019s library portal. Sources from these platforms are more reliable than general web searches and give you access to high-quality technical and scientific work. Depending on your needs, you might also consider white papers, technical reports, or patents from engineering firms or government agencies. These can give insight into current technologies, gaps in the market, and practical applications. Case studies can be useful to explore how similar problems have been solved in real-world settings and to determine what has or hasn\u2019t worked in the past.<\/p>\r\n<p class=\"p1\"><b>Read abstracts to evaluate sources.<\/b> While gathering materials for your research, you do not need to read every research paper in full right away. Instead, focus on the abstracts\u2014brief summaries of purposes, methods, and key findings\u2014to determine whether the purpose and scope of a study align with your research focus. This will save time and help you filter out less relevant works. For more information, refer to the section <a href=\"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/chapter\/chapter-12-technical-research\/#section-2\"><em> Understanding the Structure of Abstracts<\/em><\/a> in this chapter.<\/p>\r\n<p class=\"p1\"><b>Evaluate for bias and relevance.<\/b> Ask yourself, \u201cWho produced this source, and why? Is it objective? Is it directly related to the research problem?\u201d<\/p>\r\n<p class=\"p1\"><b>Stay current.<\/b> Technology changes fast. As a general rule, try to use sources published within the last 5 years, especially if your research problem relates to emerging fields like AI, renewable energy, or aerospace.<\/p>\r\n<p class=\"p1\"><b>Take organized notes and track your sources.<\/b> Record citation details (e.g., in APA or IEEE format) as you go. This saves time later and reduces the risk of missing or incorrect citations in your final document. Record key points, technical data, and useful visuals. Keep track of where each piece of information came from\u2014you\u2019ll need this for citations to back up your work with evidence.\r\nBy following these tips, you\u2019ll build a strong foundation of evidence that shows that you deeply understand the technical, practical, and social dimensions of the problem you're trying to solve.<\/p>\r\n<p class=\"p1\"><b>Note:<\/b> A spreadsheet can be an invaluable tool for organizing and managing information from sources during the search\u2014especially when working on complex problems or group projects. Use the column headings in the spreadsheet to record title, author, publication date, type of source (e.g., journal article, report, website), and where you found it. This helps you keep everything in one place and easily compare sources. You can also use columns to note important points from each source\u2014such as main findings, useful data, relevant quotes, or technical methods. Use a tagging system to identify how each source meets your specific needs. For example, you could tag them as supporting or advising against the application of a specific technology.<\/p>\r\n\r\n<h1 id=\"section-2\"><span style=\"color: #664a25\"><strong>Understanding the Structure of Abstracts<\/strong><\/span><\/h1>\r\n<p class=\"p1\">Abstracts provide a condensed version of a longer piece of writing, so they are useful when searching for relevant source materials. They share some key characteristics:<\/p>\r\n\r\n<ul>\r\n \t<li>They are a concise summary of a specific type of work, often academic (a research paper or thesis).<\/li>\r\n \t<li>They are brief, usually a single paragraph.<\/li>\r\n \t<li>They focus on the purpose, method, findings, and conclusions of the work.<\/li>\r\n \t<li>They prioritize the research question, thesis, and major findings.<\/li>\r\n \t<li>They may include keywords to help with information retrieval.<\/li>\r\n \t<li>They are objective and factual, without personal opinions.<\/li>\r\n<\/ul>\r\n<h2><strong>Two Types of Abstracts<\/strong><\/h2>\r\n<p class=\"p1\">There are two types of abstracts: descriptive and informative.<\/p>\r\n<p class=\"p1\"><b>Descriptive abstracts:<\/b> These summarize a report's structure but not its substance, including specific findings or recommendations. They resemble a paragraph-form table of contents, often mentioning the title, author, purpose, problem, and scope. They describe major topics but omit specific details. These abstracts are typically short, around 50 words. <span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorBlue SCXW96927425 BCX8\"><span class=\"TextRun SCXW96927425 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun TrackChangeHoverSelectHighlightBlue SCXW96927425 BCX8\">For example, the following abstract from <span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorBlue SCXW40544586 BCX8\"><span class=\"TextRun SCXW40544586 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun TrackChangeHoverSelectHighlightBlue SCXW40544586 BCX8\">the article \"<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorBlue SCXW40544586 BCX8\"><span class=\"TextRun SCXW40544586 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest TrackChangeHoverSelectHighlightBlue SCXW40544586 BCX8\">Affect and Cognition\" <a href=\"#ref-21\">[1]<\/a> <\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorBlue SCXW40544586 BCX8\"><span class=\"TextRun SCXW40544586 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun CommentHighlightRest TrackChangeHoverSelectHighlightBlue SCXW40544586 BCX8\">\u00a0<\/span><\/span><\/span><\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorBlue SCXW96927425 BCX8\"><span class=\"TextRun SCXW96927425 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun CommentHighlightPipeRest TrackChangeHoverSelectHighlightBlue SCXW96927425 BCX8\">illustrates a descriptive abstract, as it outlines the topic, purpose, and scope without presenting specific findings.<\/span><\/span><\/span><span class=\"EOP TrackedChange TrackChangeHoverSelectHighlightBlue SCXW96927425 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true}\">\u00a0<\/span><\/p>\r\n\r\n<div class=\"textbox\">\r\n<p class=\"p1\"><b><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">ABSTRACT\u2014<\/span><\/span><\/span><\/b><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">One of the greatest puzzles of human nature\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">concerns the poorly understood interplay between\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">affect\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">and cognition\u2014the rational and emotional ways of dealing\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">with<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">\u00a0the social world around us.\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW234870132 BCX8\">Affect<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">\u00a0is a ubiquitous and\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">powerful phenomenon in our lives, yet research on human\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">affectivity has been neglected until quite recently. This\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">article reviews traditional and contemporary approaches\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">to this issue, and recent theoretical and empirical work\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">exploring<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">\u00a0the links between affect and cognition is considered. The major achievements and shortcomings of this\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">now-thriving research area are discussed, and the\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW234870132 BCX8\">future <\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW234870132 BCX8\">prospects<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\"> of psychological research on human affectivity\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">are considered.<\/span><\/span><\/span><\/p>\r\n\r\n<\/div>\r\n<p class=\"p1\"><b>Informative abstracts:<\/b> They summarize the report's substance, not just its structure. They condense key points, while removing extra details, examples, and numbers. They typically don't include the title or author in the opening lines, as this information is already available in the document being summarized.<\/p>\r\n<p class=\"p1\">Most abstracts for research papers are informative, providing readers with a clear overview of the study\u2019s purpose, methodology, and findings. Some abstracts also include a brief background before stating the purpose, as shown in the following example from <a href=\"#ref-22\">[2]<\/a>.<\/p>\r\n\r\n<div class=\"textbox\">\r\n<p class=\"p1\"><b>Background:<\/b> Existing research has demonstrated that depression is positively related to smartphone addiction, but the role of sleep has not been discussed thoroughly, especially among engineering undergraduates affected by the coronavirus disease 2019 pandemic.<\/p>\r\n<p class=\"p1\"><b>Aim:<\/b> To evaluate sleep as a mediator of the association between smartphone addiction and depression among engineering undergraduates.<\/p>\r\n<p class=\"p1\"><b>Methods:<\/b> Using a multistage stratified random sampling method, a cross-sectional survey was conducted among 692 engineering undergraduates from a top engineering university in China, and data were collected by self-reported electronic questionnaires. The data included demographic characteristics, such as age, gender, the Smartphone Addiction Scale-Short Version (SAS-SV), the 9-item Patient Health Questionnaire, and the Pittsburgh Sleep Quality Index. Pearson correlation and multiple linear regression analyses were used to examine the association between smartphone addiction and depression, while structural equation models were established to evaluate the possible mediating role of sleep.<\/p>\r\n<p class=\"p1\"><b>Results:<\/b> Based on the cutoffs of the SAS-SV, the rate of smartphone addiction was 63.58 percent, with 56.21 percent for women and 65.68 percent for men, among 692 engineering students. The prevalence of depression among students was 14.16 percent, with 17.65 percent for women, and 13.18 percent for men. Smartphone addiction was positively correlated with depression, and sleep played a significant mediating effect between the two, accounting for 42.22 percent of the total effect. In addition, sleep latency, sleep disturbances, and daytime dysfunction significantly mediated the relationship between depression and smartphone addiction. The mediating effect of sleep latency was 0.014 [P &lt; 0.01; 95% confidence interval (CI): 0.006\u20130.027], the mediating effect of sleep disturbances was 0.022 (P &lt; 0.01; 95%CI: 0.011\u20130.040), and the mediating effect of daytime dysfunction was 0.040 (P &lt; 0.01; 95%CI: 0.024\u20130.059). The influence of sleep latency, sleep disturbances, and daytime dysfunction accounted for 18.42%, 28.95%, and 52.63% of the total mediating effect, respectively.<\/p>\r\n<p class=\"p1\"><b>Conclusion:<\/b> The results of the study suggest that reducing excessive smartphone use and improving sleep quality can help alleviate depression.<\/p>\r\n<p class=\"p1\"><b>Keywords:<\/b> Smartphone addiction, Depression, Pittsburgh Sleep Quality Index, Engineering students, COVID-19, Mediating effect<\/p>\r\n\r\n<\/div>\r\n<p class=\"p1\">This is a well-written abstract because it enables readers to quickly and easily locate the information they need. While most abstracts do not use headings for each section, they should still include the essential elements: purpose, methods, results, and conclusion. A brief background may also be added if required by the journal format.<\/p>\r\n\r\n<h1 id=\"section-3\"><span style=\"color: #664a25\"><strong>Summarizing and Paraphrasing Sources<\/strong><\/span><\/h1>\r\n<p class=\"p1\">When you read an abstract and find it relevant to your research focus, make sure to record it. Once all your sources are recorded and organized, the next step is to summarize and paraphrase them. Summarizing involves identifying the main ideas from your sources and presenting them in your own words. Don\u2019t attempt to summarize all information in the sources. Abstracts can again be very useful because they already provide a condensed overview of an entire study, pointing to the most important points.<\/p>\r\n<p class=\"p1\">Generally, when reading an abstract, you might look for these three key elements:<\/p>\r\n\r\n<ul>\r\n \t<li>The purpose of the study<\/li>\r\n \t<li>The method used<\/li>\r\n \t<li>The key findings<\/li>\r\n<\/ul>\r\n<p class=\"p1\">When summarizing a research article, paying particular attention to these three components may save you time. The purpose tells you why the study was conducted and whether it directly connects to your research question. The method helps you evaluate the quality and reliability of the research. The findings present results and conclusions that may support or challenge your argument.<\/p>\r\n<p class=\"p1\">Let\u2019s apply this to an example. The following summary is based on information extracted from the abstract of <a href=\"#ref-21\">[1]<\/a>. Because the abstract is well-structured, it\u2019s easy to find information you need for a summary. An initial attempt at summarizing might be as follows:<\/p>\r\n\r\n<div class=\"textbox\">\r\n<p class=\"p1\">The aim of the study was to evaluate sleep as a mediator of the association between smartphone addiction and depression among engineering undergraduates. A cross-sectional survey was conducted among 692 engineering undergraduates from a top engineering university in China using self-reported electronic questionnaires. Smartphone addiction was positively correlated with depression, and sleep played a significant mediating effect between the two, accounting for 42.22 percent of the total effect. In addition, sleep latency, sleep disturbances, and daytime dysfunction significantly mediated the relationship between depression and smartphone addiction. The results suggest that reducing excessive smartphone use and improving sleep quality can help alleviate depression.<\/p>\r\n\r\n<\/div>\r\n<p class=\"p1\">However, if you copy exact words from the source or its abstract without rephrasing them and providing proper credit, it is considered plagiarism. To avoid this, it is best to paraphrase. Paraphrasing goes beyond summarizing by restating specific information or ideas from a source in your own words while preserving the original meaning. This is especially valuable when incorporating technical details or specific data points into your research. The passage below provides a paraphrased version of the key ideas from the abstract.<\/p>\r\n\r\n<div class=\"textbox\">\r\n<p class=\"p1\"><a href=\"#ref-21\">[1]<\/a> examined the mediating role of sleep in the relationship between smartphone addiction and depression among engineering undergraduates. Based on data collected through a cross-sectional survey of 692 students at a leading engineering university in China, the study identified a significant positive correlation between smartphone addiction and depressive symptoms. Notably, sleep was found to be a substantial mediating factor, accounting for 42.22% of the total effect. Key sleep-related components, including increased sleep latency, frequent disturbances, and daytime dysfunction, were reported to significantly mediate this relationship. These findings underscore the importance of improving sleep quality and reducing excessive smartphone use as potential strategies for mitigating depression in engineering student populations.<\/p>\r\n\r\n<\/div>\r\n<p class=\"p1\">As you can see from this paragraph, good paraphrasing shows that you understand the source and allows you to integrate the information more smoothly into your writing.<\/p>\r\n\r\n<h1 id=\"section-4\"><span style=\"color: #664a25\"><strong>Synthesizing Sources<\/strong><\/span><\/h1>\r\n<p class=\"p1\">Synthesizing sources involves combining information from multiple texts to develop new insights and strengthen your arguments. It is different from simply summarizing each source individually. The goal is to weave ideas together, showing how sources support your points and where they align or disagree. To make these relationships clear, use connectors such as \u201cwhereas,\u201d \u201csimilarly,\u201d \u201cin contrast,\u201d \u201chowever,\u201d and \u201con the other hand.\u201d The following example illustrates this process.<\/p>\r\n\r\n<div class=\"textbox\">\r\n<p class=\"p1\">Research demonstrates that smartphone addiction significantly impacts sleep quality among university students, although the studies reveal different prevalence rates and focus on distinct health outcomes. <a href=\"#ref-11\">[1]<\/a> found smartphone addiction prevalence of 31.1% among health sciences students, <span style=\"text-decoration: underline\">whereas<\/span> <a href=\"#ref-12\">[2]<\/a> reported substantially higher rates of 63.58% among engineering undergraduates. Similarly, <span style=\"text-decoration: underline\">both<\/span> studies employed validated instruments lending credibility to their comparative findings. However, <span style=\"text-decoration: underline\">whereas<\/span> <a href=\"#ref-11\">[1]<\/a> established a direct correlation between smartphone addiction and sleep quality (47.8% of students showing reduced sleep quality), <a href=\"#ref-12\">[2]<\/a> provided mechanistic insights by demonstrating sleep's mediating role between smartphone addiction and depression. Specifically, <a href=\"#ref-12\">[2]<\/a> found that sleep disturbances accounted for 42.22% of the total effect. It linked smartphone addiction to depressive symptoms, with sleep latency, sleep disturbances, and daytime dysfunction contributing 18.42%, 28.95%, and 52.63% respectively to this mediating effect. <span style=\"text-decoration: underline\">In contrast<\/span>, <a href=\"#ref-11\">[1]<\/a> emphasized broader biopsychosocial health implications without examining mental health outcomes. <span style=\"text-decoration: underline\">Collectively<\/span>, these findings suggest that smartphone addiction not only directly impairs sleep quality across diverse student populations but also creates a pathway to mental health deterioration through sleep-mediated mechanisms.<\/p>\r\n\r\n<div style=\"font-weight: 400\">\r\n<p id=\"ref-11\" class=\"p1\">[1] H.\u00a0Ozkaya, M. Serdar, H. Acar, S.\u00a0Pekgor, and S.\u00a0Gunher\u00a0Ar\u0131ca, \u201cEvaluation of the frequency\/addiction of smartphone use and its effect on sleep quality in university students,\u201d\u00a0Annals of Medical Research, vol. 27, no. 2, pp. 657\u2013663, 2020,\u00a0doi:\u00a0<a href=\"https:\/\/www.researchgate.net\/publication\/342587537_Evaluation_of_the_frequencyaddiction_of_smartphone_use_and_its_effect_on_sleep_quality_in_university_students\" target=\"_blank\" rel=\"noopener\">10.5455\/annalsmedres.2019.11.737<\/a>.<\/p>\r\n\r\n<\/div>\r\n<div style=\"font-weight: 400\">\r\n<p id=\"ref-12\" class=\"p1\">[2] W.-J. Gao, Y. Hu, J.-L. Ji, and X.-Q. Liu, \"Relationship between depression, smartphone addiction, and sleep among Chinese engineering students during the COVID-19 pandemic,\"\u00a0World Journal of Psychiatry,\u00a0vol. 13, no. 9, pp. 1351\u20131364, Sep. 2023,\u00a0doi:\u00a0<a href=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC10294134\/\" target=\"_blank\" rel=\"noopener\">10.5498\/wjp.v13.i6.361.<\/a><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<p class=\"p1\">By showing how different pieces of evidence work together, you can build a more complete picture of your research topic. By doing so, you may also strengthen your arguments and increase your credibility as a researcher.<\/p>\r\n\r\n<h1 id=\"section-5\"><span style=\"color: #664a25\"><strong>Citing and Referencing Sources<\/strong><\/span><\/h1>\r\n<p class=\"p1\">In-text citations are references placed within your writing to identify the source of specific information drawn from external works. Even when summarizing or paraphrasing, it is essential to (1) include in-text citations and (2) list the sources in your reference section. Depending on the citation style, in-text citations may appear immediately before or after the idea, fact, statistic, image, or even single word taken from another source. The following examples illustrate this practice.<\/p>\r\n\r\n<div class=\"textbox\">\r\n<p class=\"p1\">Several studies have confirmed the relationship between smartphone use and sleep quality <a href=\"#ref-11\">[1]<\/a>, <a href=\"#ref-12\">[2]<\/a>.<\/p>\r\n\r\n<\/div>\r\n<p class=\"p1\">or<\/p>\r\n\r\n<div class=\"textbox\">\r\n<p class=\"p1\">According to <a href=\"#ref-11\">[1]<\/a> and <a href=\"#ref-12\">[2]<\/a>, excessive screen time significantly impacts sleep quality of university students.<\/p>\r\n\r\n<\/div>\r\n<p class=\"p1\">In addition to providing in-text citations, you must include each source in a reference list at the end of your work. The reference list provides complete bibliographic details, allowing readers to locate and verify your sources. This two-part system ensures that proper credit is given to original authors and upholds the integrity of your research. To do this effectively, always track which ideas come from which sources, even when summarizing or paraphrasing. This not only guarantees accurate citation but also strengthens the credibility of your work by clearly distinguishing your ideas from those of others.<\/p>\r\n\r\n<h1 id=\"section-6\"><span style=\"color: #664a25\"><strong>Writing Annotated Bibliographies<\/strong><\/span><\/h1>\r\n<p class=\"p1\">While a bibliography is a list of sources or works cited in a study, an annotated bibliography lists sources along with brief paragraphs that summarize and evaluate them. It explains the content of each source and how it contributes to your research. The process of crafting an annotated bibliography helps you better understand your materials and shows readers how each source supports your work.<\/p>\r\n<p class=\"p1\">Your annotation may include a summary, an evaluation, and a note on the source\u2019s relevance to your research. Depending on your purposes, you might include one or all of these components.<\/p>\r\n<p class=\"p1\">To summarize, consider:<\/p>\r\n\r\n<ul>\r\n \t<li>What is the purpose of the study?<\/li>\r\n \t<li>What are the main arguments?<\/li>\r\n<\/ul>\r\n<p class=\"p1\">To evaluate, consider:<\/p>\r\n\r\n<ul>\r\n \t<li>Is it a useful or credible source?<\/li>\r\n \t<li>Is the information reliable and objective?<\/li>\r\n<\/ul>\r\n<p class=\"p1\">To assess relevance, consider:<\/p>\r\n\r\n<ul>\r\n \t<li>How does it shape your argument?<\/li>\r\n \t<li>How will you use it in your research project?<\/li>\r\n<\/ul>\r\n<p class=\"p1\">Let\u2019s look at an example to see how these elements come together in a clear and helpful annotation:<\/p>\r\n\r\n<div class=\"textbox\">\r\n<p id=\"ref-41\" class=\"p1\">[1] W.-J. Gao, Y. Hu, J.-L. Ji, and X.-Q. Liu, \"Relationship between depression, smartphone addiction, and sleep among Chinese engineering students during the COVID-19 pandemic,\" <em>World Journal of Psychiatry<\/em>, vol. 13, no. 9, pp. 1351\u20131364, Sep. 2023, doi: 10.5498\/wjp.v13.i9.1351.<\/p>\r\n<p class=\"p1\">The main aim of <a href=\"#ref-41\">[1]<\/a> was to evaluate sleep as a mediating factor in the relationship between smartphone addiction and depression among engineering undergraduates during the COVID-19 pandemic. The authors conducted a cross-sectional survey with 692 students using validated tools, such as the Smartphone Addiction Scale\u2013Short Version and the Pittsburgh Sleep Quality Index. Their analysis showed that smartphone addiction was positively correlated with depression, and sleep played a significant mediating role, accounting for 42.22% of the total effect. Specific factors, such as sleep latency, disturbances, and daytime dysfunction, contributed significantly to this relationship.<\/p>\r\n<p class=\"p1\">Since this study was conducted using a large sample and published in the peer-reviewed <em>World Journal of Psychiatry<\/em>, it is a credible and reliable source of information. The authors provided clear data and analysis that help explain how poor sleep links smartphone addiction to mental health outcomes.<\/p>\r\n<p class=\"p1\">This resource is helpful for my research project, which explores the impact of excessive smartphone use on sleep and cognitive performance among engineering students. The findings offer a valuable framework for examining sleep-related variables and support my study\u2019s argument that addressing sleep issues can mitigate the broader consequences of digital overuse.<\/p>\r\n\r\n<\/div>\r\n<h1 id=\"section-7\"><span style=\"color: #664a25\"><strong>Writing a Review of Library Sources<\/strong><\/span><\/h1>\r\n<p class=\"p1\">Once you find relevant, non-biased, and current sources for your research question and categorize them according to their themes, the next step involves structuring the review. A well-structured review has four essential parts: title, introduction, discussion, and conclusion.<\/p>\r\n\r\n<div class=\"textbox\">\r\n<h1 style=\"margin-top: 0 !important;padding-top: 0\">User-Related and Technology-Related Vulnerabilities in Smart Homes: A Review of Library Sources<\/h1>\r\n<p class=\"p1\">Smart home technologies refer to internet connected devices used for managing and remotely controlling household functions, such as locks, lights, cameras, and thermostats. While these tools enhance convenience and efficiency, they also introduce cybersecurity risks. Many smart homes rely on networks, cloud services, and remote access, which can expose users to threats such as hacking and surveillance. As more households adopt these technologies, it becomes essential to understand their associated security challenges. This review examines common cybersecurity problems in smart homes, focusing on risks from user behavior and from technology.<\/p>\r\n\r\n<h2>User-Related Vulnerabilities in Smart Homes<\/h2>\r\n<p class=\"p1\">Poor authentication practices remain one of the most identified weaknesses in smart-home environments. <a href=\"#ref-1\">[1]<\/a> found that many users leave default credentials unchanged or create overly simple passwords, making devices especially vulnerable to unauthorized access. <a href=\"#ref-2\">[2]<\/a> further observed that password reuse across multiple smart-home services is widespread, enabling a single compromised credential to open several attack paths. Their findings suggest that these everyday habits significantly reduce the overall security posture of smart homes. Together, the studies reveal that even when devices offer secure features, the failure to adopt strong authentication practices continues to create critical risks for users.<\/p>\r\n<p class=\"p1\">In addition to poor authentication practices, limited user awareness significantly contributes to security risks in smart homes. <a href=\"#ref-2\">[2]<\/a> reported that many households possess only a basic understanding of their devices security settings and rarely consult manufacturer guidance, leaving default configurations untouched. <a href=\"#ref-3\">\u00a0[3]<\/a> found that the anomaly detection tools bundled with many smart home systems remain on default settings because users rarely adjust them, which sharply limits the devices' ability to recognise emerging attack patterns. <a href=\"#ref-4\">[4]<\/a> observed that users rarely monitor network traffic and often neglect built-in protections such as encryption or two-factor authentication, leaving their systems vulnerable to exploitation. Taken together, the evidence suggests that low digital knowledge is a pivotal yet often overlooked cause of smart-home insecurity.<\/p>\r\n<p class=\"p1\">Finally, smart home users often lack control over how third-party services access and manage their data, creating serious privacy and security risks. <a href=\"#ref-2\">[2]<\/a> found that many smart-home devices automatically share user information with external servers without offering clear consent options or opt-out mechanisms. <a href=\"#ref-5\">[5]<\/a> likewise observed that traffic routed through centralized hubs exposes user metadata to outside platforms with minimal transparency, leaving homeowners unaware of when and how their data are being accessed. This convergence in the literature points to user agency and data-flow transparency as missing pillars in today\u2019s smart-home ecosystem.<\/p>\r\n\r\n<h2>Technology-Related Vulnerabilities in Smart Homes<\/h2>\r\n<p class=\"p1\">While user behavior contributes to security issues, structural design choices in smart-home systems also create significant risks. <a href=\"#ref-6\">[6]<\/a> note that many platforms rely on centralized architectures in which a single cloud server or hub manages all device interactions. This setup introduces a single point of failure, meaning a successful attack on the central node could compromise the entire system. <a href=\"#ref-7\">[7]<\/a> further showed that dependence on external service providers for identity management and data routing limits user oversight and magnifies the impact of any cloud-side breach. This evidence underscores centralization as a pivotal factor that shapes both the visibility and resilience of smart-home ecosystems.<\/p>\r\n<p class=\"p1\">Smart-home security is frequently undermined by poor maintenance of device firmware, which can leave systems exposed to known threats. <a href=\"#ref-8\">[8]<\/a> revealed that many popular devices still rely on outdated, password only update procedures that transmit files without verifying their authenticity. In addition, <a href=\"#ref-5\">[5]<\/a> found that many commercial hubs lack secure, authenticated update channels, allowing attackers to block or replay critical patches. <a href=\"#ref-4\">[4]<\/a> further noted that homeowners often receive no meaningful alerts or lack the technical skills to apply fixes manually, prolonging device vulnerability. Collectively, the literature shows inconsistent firmware upkeep as a persistent gap that both increases the likelihood of unauthorized access and erodes user confidence in the reliability of smart-home technologies.<\/p>\r\n<p class=\"p1\">Absence of regulatory frameworks for smart-home cybersecurity is also a major concern. <a href=\"#ref-6\">[6]<\/a> pointed out that existing performance standards such as TS 621 for smart locks focus narrowly on physical robustness and leave cyber-specific attack vectors largely unaddressed. Assessing a broader spectrum of consumer IoT, <a href=\"#ref-2\">[2]<\/a> observed that national legislation is still fragmented, resulting in inconsistent requirements for encryption, vulnerability disclosure, and data-handling practices across manufacturers. Echoing this gap from an emerging-economy perspective, <a href=\"#ref-4\">[4]<\/a> noted that low-cost devices often bypass certification entirely, entering the market without any compliance audit. Clearly, the current regulatory patchwork allows insecure products to proliferate, leaving end-users to absorb the residual cyber-risk.<\/p>\r\n\r\n<h2>Conclusion<\/h2>\r\n<p class=\"p1\">This review examined cybersecurity risks in smart home environments, focusing on vulnerabilities resulting from both user behavior and system design. The findings reveal three main user-related vulnerabilities\u2014weak authentication practices, limited cybersecurity awareness, and poor control of third-party data access\u2014and four system-level vulnerabilities\u2014centralized architectures, unpatched firmware, insecure communication protocols, and lack of regulatory frameworks. While current research provides important insights into these challenges, a significant gap remains in understanding how these risks develop and interact over extended periods in everyday home settings. Future research should include real-world studies that evaluate decentralized security models, automated firmware update systems, and emerging regulatory standards to strengthen smart home resilience and user trust.<\/p>\r\n\r\n<h2>References<\/h2>\r\n<p id=\"ref-1\" class=\"p1\">[1] Y. Zhang, P. Malacaria, G. Loukas, and E. Panaousis, \u201cCROSS: A framework for cyber risk optimisation in smart homes,\u201d<em> Computers &amp; Security<\/em>, vol. 130, p. 103250, Jul. 2023, doi: 10.1016\/j.cose.2023.103250.<\/p>\r\n<p id=\"ref-2\" class=\"p1\">[2] D. Buil-Gil et al., \u201cThe digital harms of smart home devices: A systematic literature review,\u201d <em>Computers in Human Behavior<\/em>, vol. 145, p. 107770, Aug. 2023, doi: 10.1016\/j.chb.2023.107770.<\/p>\r\n<p id=\"ref-3\" class=\"p1\">[3] J. I. Iturbe-Araya and H. Rif\u00e0-Pous, \u201cEnhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization,\u201d<em> Int. J. Inf. Secur<\/em>., vol. 24, no. 1, p. 45, Feb. 2025, doi: 10.1007\/s10207-024-00961-6.<\/p>\r\n<p id=\"ref-4\" class=\"p1\">[4] R. Sivapriyan, S. V. Sushmitha, K. Pooja, and N. Sakshi. \u201cAnalysis of Security Challenges and Issues in IoT Enabled Smart Homes,\u201d in 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bangalore, India: IEEE, Dec.2021, pp. 1-6. doi: 10.1109\/CSITSS54238.2021.9683324<\/p>\r\n<p id=\"ref-5\" class=\"p1\">[5] O. Setayeshfar et al., \u201cPrivacy invasion via smart-home hub in personal area networks,\u201d <em>Pervasive and Mobile Computing<\/em>, vol. 85, p. 101675, Sep. 2022, doi: 10.1016\/j.pmcj.2022.101675.<\/p>\r\n<p id=\"ref-6\" class=\"p1\">[6] A. Allen, A. Mylonas, S. Vidalis, and D. Gritzalis, \u201cSmart homes under siege: Assessing the robustness of physical security against wireless network attacks,\u201d <em>Computers &amp; Security<\/em>, vol. 139, p. 103687, Apr. 2024, doi: 10.1016\/j.cose.2023.103687.<\/p>\r\n<p id=\"ref-7\" class=\"p1\">[7] X. Xu, Y. Guo, and Y. Guo, \u201cFog-enabled private blockchain-based identity authentication scheme for smart home,\u201d <em>Computer Communications<\/em>, vol. 205, pp. 58\u201368, May 2023, doi: 10.1016\/j.comcom.2023.04.005.<\/p>\r\n<p id=\"ref-8\" class=\"p1\">[8] A. Huszti, S. Kov\u00e1cs, and N. Ol\u00e1h, \u201cScalable, password-based and threshold authentication for smart homes,\u201d <em>Int. J. Inf. Secur<\/em>., vol. 21, no. 4, pp. 707\u2013723, Aug. 2022, doi: 10.1007\/s10207-022-00578-7.<\/p>\r\n<p class=\"p1\">This work was authored by Dhruv Dipakkumar Patel, Summer 2025, and is included here with permission. Citation: D. D. Patel, <em>User- and Technology-Driven Vulnerabilities in Smart Homes: A Review of Library Sources<\/em>, unpublished student work, Concordia University, Summer 2025.<\/p>\r\n\r\n<\/div>\r\n<h2><b>Informative Titles<\/b><\/h2>\r\n<p class=\"p1\">The title serves as your reader's first impression and establishes the foundation for their understanding. An effective title clearly identifies the focus of your report while reflecting the core topic you are investigating. A vague, too general, too detailed, too informal, or unprofessional title may confuse the reader or fail to clearly communicate the focus and purpose of your report. Let's read the following titles to see what to avoid:<\/p>\r\n\r\n<div class=\"textbox\">\r\n\r\n<strong><span class=\"TextRun SCXW58917821 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW58917821 BCX8\">Poor Example:<\/span><\/span><\/strong><span class=\"TextRun SCXW58917821 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW58917821 BCX8\"> Technology in Engineering<\/span><\/span><span class=\"EOP SCXW58917821 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span>\r\n\r\n<\/div>\r\nThis title is too broad and vague. It doesn\u2019t indicate what kind of technology, what area of engineering, or what aspect is being reviewed.\r\n<div class=\"textbox\">\r\n\r\n<strong>Poor Example:<\/strong> A Review of the Use of Deep Learning-Based Predictive Maintenance Algorithms for Fault Detection in Electric Motor Bearings in Aerospace Systems Operating at High Altitudes\r\n\r\n<\/div>\r\nThis title is overly long and specific. It overwhelms the reader and makes it difficult to grasp the focus quickly.\r\n<div class=\"textbox\">\r\n\r\n<strong>Poor Example:<\/strong> How Cool AI Tools Can Help Engineers\r\n\r\n<\/div>\r\nInformal language like \"cool\" undermines the credibility of the paper and doesn\u2019t reflect an academic tone.\r\n<div class=\"textbox\">\r\n\r\n<strong>Poor Example:<\/strong> A Literature Review on Biomedical Implants (when the paper is actually about AI in mechanical engineering)\r\n\r\n<\/div>\r\nThis title misrepresents the content. Titles must accurately reflect the scope and focus of the review. Therefore, you might consider crafting a title that is brief yet precise. This offers readers immediate insight into what your review will explore.\r\n<div class=\"textbox\">\r\n\r\n<strong>Good Example:<\/strong> The Role of Artificial Intelligence in Improving Structural Health Monitoring: A Review of Library Sources\r\n\r\n<\/div>\r\nThis title immediately conveys the topic, target population, and document type to the reader.\r\n<h2>The Introduction<\/h2>\r\nThe introduction sets the stage for your entire review and shows readers how you will analyze the topic. It works best when you clearly explain the problem you\u2019re researching, define any important terms your readers might not know, and state the purpose of your report.\r\n\r\nA strong introduction defines the main topic or problem and explains its significance. You can also give readers a brief overview of how your discussion will be organized so that they know what to expect. Including a clear statement of purpose helps readers follow your analysis and understand the goals of your review.\r\n<h2>The Discussion<\/h2>\r\nThe discussion forms the analytical heart of your review, where your critical thinking and synthesis skills become most evident. In this section, you organize and synthesize your sources based on how they help explain or solve the problem you\u2019re researching. Group similar studies or findings together so your readers can see how each contributes to your understanding of the topic. For example, in the review titled <em>User-Related and Technology-Related Vulnerabilities in Smart Homes: A Review of Library Sources<\/em>, the sources are organized under two main themes: user-related vulnerabilities and technology-related vulnerabilities in smart homes.\r\n\r\nWhen developing your arguments, it can be helpful to organize your writing into paragraphs to keep your ideas focused. Ideally, each paragraph should cover just one main point. You might also find it useful to further group the sources within each paragraph. Once your sources are organized under main headings (such as user-related vulnerabilities and technology-related vulnerabilities in smart homes, as in the example), you can discuss each point in its own paragraph for clarity. To illustrate, in the example review, the first paragraph under<em> User-Related Vulnerabilities<\/em> <em>in Smart Homes<\/em> focuses on poor authentication practices, the second on limited user awareness, and the third on lack of control over third-party data risks. Similarly, under <em>Technology-Related Vulnerabilities in Smart Homes<\/em> the first paragraph focuses on poor structural design choices in smart\u2011home systems, the second on poor maintenance of device firmware, and the third on absence of regulatory frameworks for smart\u2011home cybersecurity.\r\n\r\nA good way to begin each paragraph is with a topic sentence that clearly states the main idea or point of argument. This sentence usually connects to how your sources contribute to understanding the research problem. Think of it as a mini-summary that guides the reader on what to expect. For instance, if your paragraph is about poor structural design choices in smart-home systems, you could start with, \u201cStructural design choices in smart-home systems also create significant risks.\u201d This sets the focus, and the rest of the paragraph should provide evidence from your sources to support that idea.\r\n\r\nOnce you have introduced your topic, the next step involves supporting your main idea with evidence from multiple sources through effective synthesis. This process requires more than simply presenting basic factual information to inform the reader or providing summaries of what each study found. Instead, you weave together findings from different sources to build a compelling argument that supports your claim. Effective synthesis demonstrates how studies relate to one another and to your research problem, highlighting areas of agreement, disagreement, or complementarity.\r\n<div class=\"textbox\">\r\n\r\n<strong>Poor example:<\/strong> Smart homes face many security problems related to authentication. Users often set weak passwords or leave default credentials unchanged. Sometimes, people also reuse the same passwords across different accounts. These practices create risks for smart-home systems. Strong authentication is important to keep devices safe.\r\n\r\n<\/div>\r\nThe paragraph is weak because it simply lists facts without supporting a clear argument. No evidence or studies are provided, just general information. It lacks synthesis, which makes it a disconnected summary rather than a meaningful discussion.\r\n<div class=\"textbox\">\r\n\r\n<strong>Poor example:<\/strong> <a href=\"#ref-1\">[1]<\/a> studied authentication in smart-home devices and found that users often failed to change default passwords. Their research highlighted that weak passwords allowed unauthorized access to systems. <a href=\"#ref-2\">[2]<\/a> examined password practices in smart-home environments and reported that users reused credentials across platforms.\r\n\r\n<\/div>\r\nThe paragraph is weak because it simply lists study details without connecting the findings or explaining their significance. There\u2019s no analysis or synthesis of how these dimensions interact or how they support the main idea of the paragraph.\r\n<div class=\"textbox\">\r\n\r\n<strong>Poor example:<\/strong> Poor authentication practices remain one of the most commonly identified weaknesses in smart\u2011home environments. <a href=\"#ref-1\">[1]<\/a> showed that many users rely on default or simple passwords. <a href=\"#ref-2\">[2]<\/a> reported that password reuse is common across smart-home services. These studies indicate that authentication is a problem for smart-home devices.\r\n\r\n<\/div>\r\nThe paragraph is also weak because it merely summarizes each study individually without drawing any meaningful connections between them. It lacks deeper analysis, synthesis, and insight into how the studies relate to one another or contribute to a broader argument. Instead of building toward a clear conclusion, it ends with a vague generalization that fails to support a focused claim.\r\n<div class=\"textbox\">\r\n\r\n<strong>Good example:\u00a0<\/strong> Poor authentication practices remain one of the most commonly identified weaknesses in smart\u2011home environments. <a href=\"#ref-1\">[1]<\/a> found that many users leave default credentials unchanged or create overly simple passwords, making devices especially vulnerable to unauthorized access. <a href=\"#ref-2\">[2]<\/a> further observed that password reuse across multiple smart\u2011home services is widespread, enabling a single compromised credential to open several attack paths. Their findings suggest that these everyday habits significantly reduce the overall security posture of smart homes. Together, the studies reveal that even when devices offer secure features, the failure to adopt strong authentication practices continues to create critical risks for users.\r\n\r\n<\/div>\r\nThis is a better example because it starts with a clear topic sentence, uses evidence from multiple studies, and shows how their findings connect. Instead of just listing results, it explains what they mean together: that weak authentication habits remain a critical vulnerability in smart homes.\r\n\r\nRemember: when supporting your arguments with evidence, synthesis means moving beyond individual summaries of sources. Instead, critically evaluate how each source contributes to your overall argument. Look for points of alignment and divergence, and consider what these patterns reveal about your research problem. Rather than treating each study as an isolated finding, show how the collective evidence builds a fuller understanding of your topic.\r\n\r\nNotice how the good example paragraph demonstrates this approach. It starts with a clear topic sentence that highlights the main issue\u2014<em>poor authentication practices in smart homes<\/em>. From there, it weaves together evidence from two studies, showing how everyday habits like leaving default passwords or reusing them across accounts can open the door to serious security risks. Instead of just listing what each study found, the paragraph connects the findings to show the bigger picture:<em> weak authentication consistently undermines smart-home security<\/em>. It also explains why this matters, pointing out that even strong device features can\u2019t protect users if their behavior leaves systems exposed. In the end, the paragraph doesn\u2019t just summarize research; it uses the evidence to build a strong argument about why authentication remains such a critical vulnerability.\r\n<h2>The Conclusion<\/h2>\r\n<span class=\"TextRun SCXW251504136 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW251504136 BCX8\">The c<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">onclusion summarizes the key <\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">points of yo<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">ur literature review without introducing new arguments or ideas. Start by paraphrasing your introduction's purpose statement<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">, rephrasing it to reflect what the review has accomplished. \u00a0<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">This reminds readers of your original goals and signals your intent to wrap up your key arguments.<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">\u00a0<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">If your introduction examined <\/span><\/span><span class=\"TextRun SCXW251504136 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW251504136 BCX8\">common cybersecurity problems in smart homes, focusing on risks from user behavior and from technology<\/span><\/span><span class=\"TextRun SCXW251504136 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW251504136 BCX8\">,<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\"> your conclusion might <\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">state,<\/span> \"<\/span><span class=\"TextRun SCXW251504136 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW251504136 BCX8\">This review examined cybersecurity risks in smart home environments, focusing on vulnerabilities resulting from both user behavior and system design.\"<\/span><\/span>\r\n\r\nNext, summarize the key themes and patterns that emerged from your source synthesis. Consider what the collective evidence reveals about your research problem and how studies work together to build understanding.\r\n\r\nFinally, identify any unanswered questions that future research should address. Point out areas where literature remains incomplete or contradictory. You might also suggest directions for future research or recommend actions for practitioners.\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<h2 id=\"section-8\" class=\"textbox__title\">Key Takeaways<\/h2>\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\n<img class=\"wp-image-1418 alignright\" src=\"http:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-content\/uploads\/sites\/72\/2025\/09\/media_checklist__1_-removebg-preview-smallsize.png\" alt=\"\" width=\"105\" height=\"105\" \/>\r\n<p class=\"p1\">Even if you don't conduct academic research, you will often spend days or weeks on applied research\u2014gathering information to solve real-world problems or support engineering decisions. In this process, it is essential to gather reliable and credible sources and use them to back up your arguments with solid evidence. <span style=\"font-size: 1em\">You can organize your work by<\/span><\/p>\r\n\r\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\r\n \t<li>categorizing sources according to their type and relevance;<\/li>\r\n \t<li>summarizing and paraphrasing to capture key points accurately in your own words;<\/li>\r\n \t<li>synthesizing sources to show connections and patterns; and<\/li>\r\n \t<li>citing and referencing to give proper credit and maintain academic integrity.<\/li>\r\n<\/ul>\r\nOnce you have gathered, organized, and analyzed your research materials, you can move on to writing a review of sources. Your review may include the following:\r\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\r\n \t<li><strong>Title<\/strong>\u2014Use a precise and informative title.<\/li>\r\n \t<li><strong>Introduction<\/strong>\u2014Explain the problem and why it needs to be addressed.<\/li>\r\n \t<li><strong>Discussion<\/strong>\u2014Organize and synthesize your sources to show how they help explain or solve the problem.<\/li>\r\n \t<li><strong>Conclusion<\/strong>\u2014Summarize the key points without introducing new arguments or ideas.<\/li>\r\n<\/ul>\r\n&nbsp;\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox textbox--exercises\"><header class=\"textbox__header\">\r\n<h2 id=\"section-9\" class=\"textbox__title\">Practice Task<\/h2>\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\n<img class=\"size-full wp-image-1476 alignright\" src=\"http:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-content\/uploads\/sites\/72\/2025\/09\/output-onlinepngtools609x609.png\" width=\"90\" height=\"90\" \/>Your engineering design team is preparing an innovation proposal for your company. Before you can design a solution, you need a solid understanding of the problem you\u2019re addressing. The project manager has asked each member of the team to prepare a<em> Review of Library Sources<\/em>. This report will help your group establish the technical and contextual background for your project, identify gaps in existing knowledge, and resolve any conflicting findings from prior work.\r\n\r\nTo prepare this review, you will explore and evaluate sources from\r\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\r\n \t<li>Academic journals<\/li>\r\n \t<li>Trade magazines<\/li>\r\n \t<li>Books, handbooks, and encyclopedias<\/li>\r\n \t<li>Websites<\/li>\r\n \t<li>Other relevant resources<\/li>\r\n<\/ul>\r\nYour task is to categorize these sources based on their contributions to understanding the problem your proposal attempts to solve. Beyond summarizing prior work, you must take an evaluative stance. You should\r\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\r\n \t<li>Link each source to your research problem.<\/li>\r\n \t<li>Assess how well each source contributes to understanding that problem.<\/li>\r\n \t<li>Identify gaps, unknowns, or conflicts in the body of knowledge.<\/li>\r\n<\/ul>\r\nThe finished report should\r\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\r\n \t<li>Be 750\u20131000 words in length.<\/li>\r\n \t<li>Include at least eight sources in IEEE format.<\/li>\r\n<\/ul>\r\nConsider structuring your report as follows.\r\n<h5><strong>Title<\/strong><\/h5>\r\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\r\n \t<li>Use a title that clearly identifies the focus of the report on library research. (Be brief, but precise.)<\/li>\r\n<\/ul>\r\n<h5><strong>Introduction<\/strong><\/h5>\r\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\r\n \t<li>Establish context for the problem you are researching.<\/li>\r\n \t<li>Define key terms (if necessary).<\/li>\r\n \t<li>Include a clear statement of purpose that establishes the scope and goals of the report.<\/li>\r\n \t<li>Provide a \u201croad map\u201d indicating the order in which you approach ideas in the body of the report.<\/li>\r\n<\/ul>\r\n<h5><strong>Body<\/strong><\/h5>\r\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\r\n \t<li>Categorize your sources according to the contribution they make to understanding the problem.<\/li>\r\n \t<li>Develop your arguments in paragraph form.<\/li>\r\n \t<li>Present and elaborate on one main idea per paragraph.<\/li>\r\n \t<li>Tie the content of sources that you review to the scope and focus established in the introduction. (i.e., Establish why given sources are relevant to understanding the problem.)<\/li>\r\n \t<li>Identify gaps\/unknowns\/conflicts in the body of knowledge.<\/li>\r\n \t<li>Use transitions to signal the progression of ideas.<\/li>\r\n \t<li>(Optional) Include diagrams, charts, or images\u2014properly referenced\u2014to help explain key points.<\/li>\r\n<\/ul>\r\n<h5><strong>Conclusion<\/strong><\/h5>\r\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\r\n \t<li>Restate the key findings from the review.<\/li>\r\n \t<li>Suggest directions for future research (based on sources reviewed) or recommendations for action.<\/li>\r\n \t<li>Do not introduce new ideas in the conclusion.<\/li>\r\n \t<li>References<\/li>\r\n \t<li>Provide at least eight references in IEEE format.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<h2 id=\"section-10\" class=\"textbox__title\">References<\/h2>\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<p id=\"ref-21\" class=\"p1\">[1] J. P. Forgas, \u201cAffect and Cognition,\u201d <em>Perspect Psychol Sci<\/em>, vol. 3, no. 2, pp. 94\u2013101, Mar. 2008, doi: <a href=\"http:\/\/10.1111\/j.1745-6916.2008.00067.x\">10.1111\/j.1745-6916.2008.00067.x<\/a>.<\/p>\r\n<p id=\"ref-22\" class=\"p1\">[2] W.-J. Gao, Y. Hu, J.-L. Ji, and X.-Q. Liu, \u201cRelationship between depression, smartphone addiction, and sleep among Chinese engineering students during the COVID-19 pandemic,\u201d <em>World J Psychiatry<\/em>, vol. 13, no. 6, pp. 361\u2013375, Jun. 2023, doi: <a href=\"https:\/\/www.wjgnet.com\/2220-3206\/full\/v13\/i6\/361.htm?appgw_azwaf_jsc=eM4YQfbrdgMqgaChGlLy7cTjKN19xV502o1RDcwZnWF4naqyYFFpWpRhslowHelq5XQAeX_UsO0MEMPKhSMYk6zUHFyoFi4enuPVQzokyUZ0s-L2kKaZc876DO4ZUMmKb_91rC8gsCk3JubDER7PQPQWj8ddemhpl2A1dU6iIcCPqLmfuh8LsV_gNgUQyGYQ9hs4CBFTu4r4aXyE75wbS5-Rk81Ve05I-2sA4-spfT4pVL0FRGQj0hwlL0FfRcwVoFm7YWAUyb6Gfm_lSdazhy0Kfo4sfmkFxr811MfC8YBGH0u0EdWpi2CsUXJt6BqEWFgw8zziiQFgYKCO3FUTAg\">10.5498\/wjp.v13.i6.361.<\/a><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n&nbsp;","rendered":"<div class=\"menu-table\"><span class=\"menu-table-title\">\u00a0Chapter Contents<\/span><a class=\"menu-table-panel\" href=\"#section-a\">The Role of Technical Research in Engineering<\/a><a class=\"menu-table-panel\" href=\"#section-1\">Gathering Reliable Information<\/a><a class=\"menu-table-panel\" href=\"#section-2\">Understanding the Structure of Abstracts<\/a><a class=\"menu-table-panel\" href=\"#section-3\">Summarizing and Paraphrasing Sources<\/a><a class=\"menu-table-panel\" href=\"#section-4\">Synthesizing Sources<\/a><a class=\"menu-table-panel\" href=\"#section-5\">Citing and Referencing Sources<\/a><a class=\"menu-table-panel\" href=\"#section-6\">Writing Annotated Bibliographies<\/a><a class=\"menu-table-panel\" href=\"#section-7\">Writing a Review of Library Sources<\/a><a class=\"menu-table-panel\" href=\"#section-8\">Key Takeaways<\/a><a class=\"menu-table-panel\" href=\"#section-9\">Practice Task<\/a><a class=\"menu-table-panel\" href=\"#section-10\">References<\/a><\/div>\n<h1 id=\"section-a\"><span style=\"color: #664a25\"><strong>The Role of Technical Research in Engineering<\/strong><\/span><\/h1>\n<figure id=\"attachment_1039\" aria-describedby=\"caption-attachment-1039\" style=\"width: 243px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1039\" src=\"http:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-content\/uploads\/sites\/72\/2026\/01\/PHOTOB1-3.jpg\" alt=\"\" width=\"243\" height=\"315\" \/><figcaption id=\"caption-attachment-1039\" class=\"wp-caption-text\">Photo by <a href=\"https:\/\/unsplash.com\/@ninjason\">Jason Leung<\/a> on <a href=\"https:\/\/unsplash.com\/photos\/a-library-aisle-with-bookshelves-and-sunlight-through-window-xmeRBPunJR8\">Unsplash<\/a><\/figcaption><\/figure>\n<p style=\"font-weight: 400\">As an engineer in training, developing strong research skills is one of the most important steps you can take toward becoming an effective problem-solver. Engineering isn\u2019t just about applying formulas. It\u2019s also about investigating real-world challenges, exploring possible solutions, and making well-informed decisions based on evidence. To do this, you need to know how to gather reliable information, analyze data, synthesize findings, and come up with convincing recommendations based on your work.<\/p>\n<p>&nbsp;<\/p>\n<h1 id=\"section-1\" class=\"p3\"><span style=\"color: #664a25\"><b>Gathering Reliable Information\u00a0<\/b><\/span><\/h1>\n<p class=\"p1\">Gathering reliable information ensures that your analysis is based on accurate, relevant, and up-to-date evidence\u2014the foundation for decisions that withstand scrutiny. Consider the following tips as you prepare to gather sources:<\/p>\n<p class=\"p1\"><b>Start with a clear research question.<\/b> The first step is to clearly define the problem you\u2019re trying to solve, and then clearly articulate this in a research question. The wording is extremely important because you use these words\u2014along with their synonyms\u2014to limit your search to the most relevant and useful sources. A poorly articulated research question will almost certainly lead to time lost on unrelated information.<\/p>\n<p class=\"p1\"><b>Identify precise search terms:<\/b> Once you have a clear research question, the next step is to identify the keywords that will help you find relevant information. Start by highlighting the main concepts in your research question, then list synonyms, related terms, and variations in spelling or phrasing. These search terms will form the foundation of your online searches and database queries.<\/p>\n<p class=\"p1\">Imagine that your research question is the following:<\/p>\n<div class=\"textbox\">\n<p class=\"p1\">How does smartphone addiction impact the sleep quality and cognitive performance of university students?<\/p>\n<\/div>\n<p class=\"p1\">This research question includes the following four key elements: (1) smartphone use, (2) sleep quality, (3) cognitive performance, and (4) engineering students.<\/p>\n<p class=\"p1\"><b>Combine search terms:<\/b> After selecting your keywords, you can refine your search by combining them with AND, OR, or NOT within the search field of the library catalogue or academic database.<\/p>\n<ul>\n<li>AND narrows your results by retrieving only sources that include all the specified terms (e.g., aerodynamics AND wind tunnels).<\/li>\n<li>OR broadens your results by including sources that contain any of the listed terms (e.g., unmanned aerial vehicles OR drones).<\/li>\n<li>NOT excludes certain terms from your search results. Applying these functions in field searches\u2014such as titles, abstracts, authors, or subject headings\u2014can make your searches faster and more relevant.<\/li>\n<\/ul>\n<p class=\"p1\" style=\"font-size: 0.9em\"><span style=\"color: #ff6600\">Table 12.1<\/span> Combining Search Terms and Their Synonyms<\/p>\n<table style=\"width: 100%;border-collapse: collapse;border: 1px solid #ccc;font-family: sans-serif\">\n<thead>\n<tr style=\"background-color: #f2f2f2\">\n<th style=\"padding: 12px;border-bottom: 2px solid #ccc;border-right: 1px solid #ccc;width: 25%\"><\/th>\n<th style=\"padding: 12px;text-align: center;border-bottom: 2px solid #ccc;border-right: 1px solid #ccc\">keyword<\/th>\n<th style=\"padding: 12px;text-align: center;border-bottom: 2px solid #ccc;border-right: 1px solid #ccc\">keyword synonym<\/th>\n<th style=\"padding: 12px;text-align: center;border-bottom: 2px solid #ccc\">keyword synonym<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\">Concept 1<\/td>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc\"><\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 8px 12px;border-bottom: 1px solid #ccc;background-color: #ffffff;font-size: 0.9em;color: #666\" colspan=\"4\">AND\/OR\/NOT<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\">Concept 2<\/td>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc\"><\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 8px 12px;border-bottom: 1px solid #ccc;background-color: #ffffff;font-size: 0.9em;color: #666\" colspan=\"4\">AND\/OR\/NOT<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\">Concept 3<\/td>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc;border-right: 1px solid #ccc\"><\/td>\n<td style=\"padding: 12px;border-bottom: 1px solid #ccc\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"p1\">Focusing on sources at the intersection of key concepts narrows search results, while using different combinations of terms helps you gather information most relevant to the themes you want to develop in your arguments.<\/p>\n<div class=\"textbox\">\n<p class=\"p1\"><b>Examples<\/b><\/p>\n<p class=\"p1\">Theme 1: smartphone use AND sleep quality AND engineering students<br \/>\nTheme 2: smartphone use AND cognitive performance AND engineering students<\/p>\n<\/div>\n<p class=\"p1\"><b>Use reliable and credible sources.<\/b> Prioritize peer-reviewed journal articles, academic books, government reports, technical standards, and publications from professional engineering organizations (like IEEE or ASME). These sources are typically reviewed for accuracy and quality.<\/p>\n<p class=\"p1\"><b>Search in academic databases.<\/b> Use databases like IEEE Xplore, ScienceDirect, or others that are accessible through the university\u2019s library portal. Sources from these platforms are more reliable than general web searches and give you access to high-quality technical and scientific work. Depending on your needs, you might also consider white papers, technical reports, or patents from engineering firms or government agencies. These can give insight into current technologies, gaps in the market, and practical applications. Case studies can be useful to explore how similar problems have been solved in real-world settings and to determine what has or hasn\u2019t worked in the past.<\/p>\n<p class=\"p1\"><b>Read abstracts to evaluate sources.<\/b> While gathering materials for your research, you do not need to read every research paper in full right away. Instead, focus on the abstracts\u2014brief summaries of purposes, methods, and key findings\u2014to determine whether the purpose and scope of a study align with your research focus. This will save time and help you filter out less relevant works. For more information, refer to the section <a href=\"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/chapter\/chapter-12-technical-research\/#section-2\"><em> Understanding the Structure of Abstracts<\/em><\/a> in this chapter.<\/p>\n<p class=\"p1\"><b>Evaluate for bias and relevance.<\/b> Ask yourself, \u201cWho produced this source, and why? Is it objective? Is it directly related to the research problem?\u201d<\/p>\n<p class=\"p1\"><b>Stay current.<\/b> Technology changes fast. As a general rule, try to use sources published within the last 5 years, especially if your research problem relates to emerging fields like AI, renewable energy, or aerospace.<\/p>\n<p class=\"p1\"><b>Take organized notes and track your sources.<\/b> Record citation details (e.g., in APA or IEEE format) as you go. This saves time later and reduces the risk of missing or incorrect citations in your final document. Record key points, technical data, and useful visuals. Keep track of where each piece of information came from\u2014you\u2019ll need this for citations to back up your work with evidence.<br \/>\nBy following these tips, you\u2019ll build a strong foundation of evidence that shows that you deeply understand the technical, practical, and social dimensions of the problem you&#8217;re trying to solve.<\/p>\n<p class=\"p1\"><b>Note:<\/b> A spreadsheet can be an invaluable tool for organizing and managing information from sources during the search\u2014especially when working on complex problems or group projects. Use the column headings in the spreadsheet to record title, author, publication date, type of source (e.g., journal article, report, website), and where you found it. This helps you keep everything in one place and easily compare sources. You can also use columns to note important points from each source\u2014such as main findings, useful data, relevant quotes, or technical methods. Use a tagging system to identify how each source meets your specific needs. For example, you could tag them as supporting or advising against the application of a specific technology.<\/p>\n<h1 id=\"section-2\"><span style=\"color: #664a25\"><strong>Understanding the Structure of Abstracts<\/strong><\/span><\/h1>\n<p class=\"p1\">Abstracts provide a condensed version of a longer piece of writing, so they are useful when searching for relevant source materials. They share some key characteristics:<\/p>\n<ul>\n<li>They are a concise summary of a specific type of work, often academic (a research paper or thesis).<\/li>\n<li>They are brief, usually a single paragraph.<\/li>\n<li>They focus on the purpose, method, findings, and conclusions of the work.<\/li>\n<li>They prioritize the research question, thesis, and major findings.<\/li>\n<li>They may include keywords to help with information retrieval.<\/li>\n<li>They are objective and factual, without personal opinions.<\/li>\n<\/ul>\n<h2><strong>Two Types of Abstracts<\/strong><\/h2>\n<p class=\"p1\">There are two types of abstracts: descriptive and informative.<\/p>\n<p class=\"p1\"><b>Descriptive abstracts:<\/b> These summarize a report&#8217;s structure but not its substance, including specific findings or recommendations. They resemble a paragraph-form table of contents, often mentioning the title, author, purpose, problem, and scope. They describe major topics but omit specific details. These abstracts are typically short, around 50 words. <span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorBlue SCXW96927425 BCX8\"><span class=\"TextRun SCXW96927425 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun TrackChangeHoverSelectHighlightBlue SCXW96927425 BCX8\">For example, the following abstract from <span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorBlue SCXW40544586 BCX8\"><span class=\"TextRun SCXW40544586 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun TrackChangeHoverSelectHighlightBlue SCXW40544586 BCX8\">the article &#8220;<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorBlue SCXW40544586 BCX8\"><span class=\"TextRun SCXW40544586 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest TrackChangeHoverSelectHighlightBlue SCXW40544586 BCX8\">Affect and Cognition&#8221; <a href=\"#ref-21\">[1]<\/a> <\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorBlue SCXW40544586 BCX8\"><span class=\"TextRun SCXW40544586 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun CommentHighlightRest TrackChangeHoverSelectHighlightBlue SCXW40544586 BCX8\">\u00a0<\/span><\/span><\/span><\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorBlue SCXW96927425 BCX8\"><span class=\"TextRun SCXW96927425 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun CommentHighlightPipeRest TrackChangeHoverSelectHighlightBlue SCXW96927425 BCX8\">illustrates a descriptive abstract, as it outlines the topic, purpose, and scope without presenting specific findings.<\/span><\/span><\/span><span class=\"EOP TrackedChange TrackChangeHoverSelectHighlightBlue SCXW96927425 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true}\">\u00a0<\/span><\/p>\n<div class=\"textbox\">\n<p class=\"p1\"><b><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">ABSTRACT\u2014<\/span><\/span><\/span><\/b><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">One of the greatest puzzles of human nature\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">concerns the poorly understood interplay between\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">affect\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">and cognition\u2014the rational and emotional ways of dealing\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">with<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">\u00a0the social world around us.\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW234870132 BCX8\">Affect<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">\u00a0is a ubiquitous and\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">powerful phenomenon in our lives, yet research on human\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">affectivity has been neglected until quite recently. This\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">article reviews traditional and contemporary approaches\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">to this issue, and recent theoretical and empirical work\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">exploring<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">\u00a0the links between affect and cognition is considered. The major achievements and shortcomings of this\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">now-thriving research area are discussed, and the\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW234870132 BCX8\">future <\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW234870132 BCX8\">prospects<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\"> of psychological research on human affectivity\u00a0<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW234870132 BCX8\"><span class=\"TextRun SCXW234870132 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW234870132 BCX8\">are considered.<\/span><\/span><\/span><\/p>\n<\/div>\n<p class=\"p1\"><b>Informative abstracts:<\/b> They summarize the report&#8217;s substance, not just its structure. They condense key points, while removing extra details, examples, and numbers. They typically don&#8217;t include the title or author in the opening lines, as this information is already available in the document being summarized.<\/p>\n<p class=\"p1\">Most abstracts for research papers are informative, providing readers with a clear overview of the study\u2019s purpose, methodology, and findings. Some abstracts also include a brief background before stating the purpose, as shown in the following example from <a href=\"#ref-22\">[2]<\/a>.<\/p>\n<div class=\"textbox\">\n<p class=\"p1\"><b>Background:<\/b> Existing research has demonstrated that depression is positively related to smartphone addiction, but the role of sleep has not been discussed thoroughly, especially among engineering undergraduates affected by the coronavirus disease 2019 pandemic.<\/p>\n<p class=\"p1\"><b>Aim:<\/b> To evaluate sleep as a mediator of the association between smartphone addiction and depression among engineering undergraduates.<\/p>\n<p class=\"p1\"><b>Methods:<\/b> Using a multistage stratified random sampling method, a cross-sectional survey was conducted among 692 engineering undergraduates from a top engineering university in China, and data were collected by self-reported electronic questionnaires. The data included demographic characteristics, such as age, gender, the Smartphone Addiction Scale-Short Version (SAS-SV), the 9-item Patient Health Questionnaire, and the Pittsburgh Sleep Quality Index. Pearson correlation and multiple linear regression analyses were used to examine the association between smartphone addiction and depression, while structural equation models were established to evaluate the possible mediating role of sleep.<\/p>\n<p class=\"p1\"><b>Results:<\/b> Based on the cutoffs of the SAS-SV, the rate of smartphone addiction was 63.58 percent, with 56.21 percent for women and 65.68 percent for men, among 692 engineering students. The prevalence of depression among students was 14.16 percent, with 17.65 percent for women, and 13.18 percent for men. Smartphone addiction was positively correlated with depression, and sleep played a significant mediating effect between the two, accounting for 42.22 percent of the total effect. In addition, sleep latency, sleep disturbances, and daytime dysfunction significantly mediated the relationship between depression and smartphone addiction. The mediating effect of sleep latency was 0.014 [P &lt; 0.01; 95% confidence interval (CI): 0.006\u20130.027], the mediating effect of sleep disturbances was 0.022 (P &lt; 0.01; 95%CI: 0.011\u20130.040), and the mediating effect of daytime dysfunction was 0.040 (P &lt; 0.01; 95%CI: 0.024\u20130.059). The influence of sleep latency, sleep disturbances, and daytime dysfunction accounted for 18.42%, 28.95%, and 52.63% of the total mediating effect, respectively.<\/p>\n<p class=\"p1\"><b>Conclusion:<\/b> The results of the study suggest that reducing excessive smartphone use and improving sleep quality can help alleviate depression.<\/p>\n<p class=\"p1\"><b>Keywords:<\/b> Smartphone addiction, Depression, Pittsburgh Sleep Quality Index, Engineering students, COVID-19, Mediating effect<\/p>\n<\/div>\n<p class=\"p1\">This is a well-written abstract because it enables readers to quickly and easily locate the information they need. While most abstracts do not use headings for each section, they should still include the essential elements: purpose, methods, results, and conclusion. A brief background may also be added if required by the journal format.<\/p>\n<h1 id=\"section-3\"><span style=\"color: #664a25\"><strong>Summarizing and Paraphrasing Sources<\/strong><\/span><\/h1>\n<p class=\"p1\">When you read an abstract and find it relevant to your research focus, make sure to record it. Once all your sources are recorded and organized, the next step is to summarize and paraphrase them. Summarizing involves identifying the main ideas from your sources and presenting them in your own words. Don\u2019t attempt to summarize all information in the sources. Abstracts can again be very useful because they already provide a condensed overview of an entire study, pointing to the most important points.<\/p>\n<p class=\"p1\">Generally, when reading an abstract, you might look for these three key elements:<\/p>\n<ul>\n<li>The purpose of the study<\/li>\n<li>The method used<\/li>\n<li>The key findings<\/li>\n<\/ul>\n<p class=\"p1\">When summarizing a research article, paying particular attention to these three components may save you time. The purpose tells you why the study was conducted and whether it directly connects to your research question. The method helps you evaluate the quality and reliability of the research. The findings present results and conclusions that may support or challenge your argument.<\/p>\n<p class=\"p1\">Let\u2019s apply this to an example. The following summary is based on information extracted from the abstract of <a href=\"#ref-21\">[1]<\/a>. Because the abstract is well-structured, it\u2019s easy to find information you need for a summary. An initial attempt at summarizing might be as follows:<\/p>\n<div class=\"textbox\">\n<p class=\"p1\">The aim of the study was to evaluate sleep as a mediator of the association between smartphone addiction and depression among engineering undergraduates. A cross-sectional survey was conducted among 692 engineering undergraduates from a top engineering university in China using self-reported electronic questionnaires. Smartphone addiction was positively correlated with depression, and sleep played a significant mediating effect between the two, accounting for 42.22 percent of the total effect. In addition, sleep latency, sleep disturbances, and daytime dysfunction significantly mediated the relationship between depression and smartphone addiction. The results suggest that reducing excessive smartphone use and improving sleep quality can help alleviate depression.<\/p>\n<\/div>\n<p class=\"p1\">However, if you copy exact words from the source or its abstract without rephrasing them and providing proper credit, it is considered plagiarism. To avoid this, it is best to paraphrase. Paraphrasing goes beyond summarizing by restating specific information or ideas from a source in your own words while preserving the original meaning. This is especially valuable when incorporating technical details or specific data points into your research. The passage below provides a paraphrased version of the key ideas from the abstract.<\/p>\n<div class=\"textbox\">\n<p class=\"p1\"><a href=\"#ref-21\">[1]<\/a> examined the mediating role of sleep in the relationship between smartphone addiction and depression among engineering undergraduates. Based on data collected through a cross-sectional survey of 692 students at a leading engineering university in China, the study identified a significant positive correlation between smartphone addiction and depressive symptoms. Notably, sleep was found to be a substantial mediating factor, accounting for 42.22% of the total effect. Key sleep-related components, including increased sleep latency, frequent disturbances, and daytime dysfunction, were reported to significantly mediate this relationship. These findings underscore the importance of improving sleep quality and reducing excessive smartphone use as potential strategies for mitigating depression in engineering student populations.<\/p>\n<\/div>\n<p class=\"p1\">As you can see from this paragraph, good paraphrasing shows that you understand the source and allows you to integrate the information more smoothly into your writing.<\/p>\n<h1 id=\"section-4\"><span style=\"color: #664a25\"><strong>Synthesizing Sources<\/strong><\/span><\/h1>\n<p class=\"p1\">Synthesizing sources involves combining information from multiple texts to develop new insights and strengthen your arguments. It is different from simply summarizing each source individually. The goal is to weave ideas together, showing how sources support your points and where they align or disagree. To make these relationships clear, use connectors such as \u201cwhereas,\u201d \u201csimilarly,\u201d \u201cin contrast,\u201d \u201chowever,\u201d and \u201con the other hand.\u201d The following example illustrates this process.<\/p>\n<div class=\"textbox\">\n<p class=\"p1\">Research demonstrates that smartphone addiction significantly impacts sleep quality among university students, although the studies reveal different prevalence rates and focus on distinct health outcomes. <a href=\"#ref-11\">[1]<\/a> found smartphone addiction prevalence of 31.1% among health sciences students, <span style=\"text-decoration: underline\">whereas<\/span> <a href=\"#ref-12\">[2]<\/a> reported substantially higher rates of 63.58% among engineering undergraduates. Similarly, <span style=\"text-decoration: underline\">both<\/span> studies employed validated instruments lending credibility to their comparative findings. However, <span style=\"text-decoration: underline\">whereas<\/span> <a href=\"#ref-11\">[1]<\/a> established a direct correlation between smartphone addiction and sleep quality (47.8% of students showing reduced sleep quality), <a href=\"#ref-12\">[2]<\/a> provided mechanistic insights by demonstrating sleep&#8217;s mediating role between smartphone addiction and depression. Specifically, <a href=\"#ref-12\">[2]<\/a> found that sleep disturbances accounted for 42.22% of the total effect. It linked smartphone addiction to depressive symptoms, with sleep latency, sleep disturbances, and daytime dysfunction contributing 18.42%, 28.95%, and 52.63% respectively to this mediating effect. <span style=\"text-decoration: underline\">In contrast<\/span>, <a href=\"#ref-11\">[1]<\/a> emphasized broader biopsychosocial health implications without examining mental health outcomes. <span style=\"text-decoration: underline\">Collectively<\/span>, these findings suggest that smartphone addiction not only directly impairs sleep quality across diverse student populations but also creates a pathway to mental health deterioration through sleep-mediated mechanisms.<\/p>\n<div style=\"font-weight: 400\">\n<p id=\"ref-11\" class=\"p1\">[1] H.\u00a0Ozkaya, M. Serdar, H. Acar, S.\u00a0Pekgor, and S.\u00a0Gunher\u00a0Ar\u0131ca, \u201cEvaluation of the frequency\/addiction of smartphone use and its effect on sleep quality in university students,\u201d\u00a0Annals of Medical Research, vol. 27, no. 2, pp. 657\u2013663, 2020,\u00a0doi:\u00a0<a href=\"https:\/\/www.researchgate.net\/publication\/342587537_Evaluation_of_the_frequencyaddiction_of_smartphone_use_and_its_effect_on_sleep_quality_in_university_students\" target=\"_blank\" rel=\"noopener\">10.5455\/annalsmedres.2019.11.737<\/a>.<\/p>\n<\/div>\n<div style=\"font-weight: 400\">\n<p id=\"ref-12\" class=\"p1\">[2] W.-J. Gao, Y. Hu, J.-L. Ji, and X.-Q. Liu, &#8220;Relationship between depression, smartphone addiction, and sleep among Chinese engineering students during the COVID-19 pandemic,&#8221;\u00a0World Journal of Psychiatry,\u00a0vol. 13, no. 9, pp. 1351\u20131364, Sep. 2023,\u00a0doi:\u00a0<a href=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC10294134\/\" target=\"_blank\" rel=\"noopener\">10.5498\/wjp.v13.i6.361.<\/a><\/p>\n<\/div>\n<\/div>\n<p class=\"p1\">By showing how different pieces of evidence work together, you can build a more complete picture of your research topic. By doing so, you may also strengthen your arguments and increase your credibility as a researcher.<\/p>\n<h1 id=\"section-5\"><span style=\"color: #664a25\"><strong>Citing and Referencing Sources<\/strong><\/span><\/h1>\n<p class=\"p1\">In-text citations are references placed within your writing to identify the source of specific information drawn from external works. Even when summarizing or paraphrasing, it is essential to (1) include in-text citations and (2) list the sources in your reference section. Depending on the citation style, in-text citations may appear immediately before or after the idea, fact, statistic, image, or even single word taken from another source. The following examples illustrate this practice.<\/p>\n<div class=\"textbox\">\n<p class=\"p1\">Several studies have confirmed the relationship between smartphone use and sleep quality <a href=\"#ref-11\">[1]<\/a>, <a href=\"#ref-12\">[2]<\/a>.<\/p>\n<\/div>\n<p class=\"p1\">or<\/p>\n<div class=\"textbox\">\n<p class=\"p1\">According to <a href=\"#ref-11\">[1]<\/a> and <a href=\"#ref-12\">[2]<\/a>, excessive screen time significantly impacts sleep quality of university students.<\/p>\n<\/div>\n<p class=\"p1\">In addition to providing in-text citations, you must include each source in a reference list at the end of your work. The reference list provides complete bibliographic details, allowing readers to locate and verify your sources. This two-part system ensures that proper credit is given to original authors and upholds the integrity of your research. To do this effectively, always track which ideas come from which sources, even when summarizing or paraphrasing. This not only guarantees accurate citation but also strengthens the credibility of your work by clearly distinguishing your ideas from those of others.<\/p>\n<h1 id=\"section-6\"><span style=\"color: #664a25\"><strong>Writing Annotated Bibliographies<\/strong><\/span><\/h1>\n<p class=\"p1\">While a bibliography is a list of sources or works cited in a study, an annotated bibliography lists sources along with brief paragraphs that summarize and evaluate them. It explains the content of each source and how it contributes to your research. The process of crafting an annotated bibliography helps you better understand your materials and shows readers how each source supports your work.<\/p>\n<p class=\"p1\">Your annotation may include a summary, an evaluation, and a note on the source\u2019s relevance to your research. Depending on your purposes, you might include one or all of these components.<\/p>\n<p class=\"p1\">To summarize, consider:<\/p>\n<ul>\n<li>What is the purpose of the study?<\/li>\n<li>What are the main arguments?<\/li>\n<\/ul>\n<p class=\"p1\">To evaluate, consider:<\/p>\n<ul>\n<li>Is it a useful or credible source?<\/li>\n<li>Is the information reliable and objective?<\/li>\n<\/ul>\n<p class=\"p1\">To assess relevance, consider:<\/p>\n<ul>\n<li>How does it shape your argument?<\/li>\n<li>How will you use it in your research project?<\/li>\n<\/ul>\n<p class=\"p1\">Let\u2019s look at an example to see how these elements come together in a clear and helpful annotation:<\/p>\n<div class=\"textbox\">\n<p id=\"ref-41\" class=\"p1\">[1] W.-J. Gao, Y. Hu, J.-L. Ji, and X.-Q. Liu, &#8220;Relationship between depression, smartphone addiction, and sleep among Chinese engineering students during the COVID-19 pandemic,&#8221; <em>World Journal of Psychiatry<\/em>, vol. 13, no. 9, pp. 1351\u20131364, Sep. 2023, doi: 10.5498\/wjp.v13.i9.1351.<\/p>\n<p class=\"p1\">The main aim of <a href=\"#ref-41\">[1]<\/a> was to evaluate sleep as a mediating factor in the relationship between smartphone addiction and depression among engineering undergraduates during the COVID-19 pandemic. The authors conducted a cross-sectional survey with 692 students using validated tools, such as the Smartphone Addiction Scale\u2013Short Version and the Pittsburgh Sleep Quality Index. Their analysis showed that smartphone addiction was positively correlated with depression, and sleep played a significant mediating role, accounting for 42.22% of the total effect. Specific factors, such as sleep latency, disturbances, and daytime dysfunction, contributed significantly to this relationship.<\/p>\n<p class=\"p1\">Since this study was conducted using a large sample and published in the peer-reviewed <em>World Journal of Psychiatry<\/em>, it is a credible and reliable source of information. The authors provided clear data and analysis that help explain how poor sleep links smartphone addiction to mental health outcomes.<\/p>\n<p class=\"p1\">This resource is helpful for my research project, which explores the impact of excessive smartphone use on sleep and cognitive performance among engineering students. The findings offer a valuable framework for examining sleep-related variables and support my study\u2019s argument that addressing sleep issues can mitigate the broader consequences of digital overuse.<\/p>\n<\/div>\n<h1 id=\"section-7\"><span style=\"color: #664a25\"><strong>Writing a Review of Library Sources<\/strong><\/span><\/h1>\n<p class=\"p1\">Once you find relevant, non-biased, and current sources for your research question and categorize them according to their themes, the next step involves structuring the review. A well-structured review has four essential parts: title, introduction, discussion, and conclusion.<\/p>\n<div class=\"textbox\">\n<h1 style=\"margin-top: 0 !important;padding-top: 0\">User-Related and Technology-Related Vulnerabilities in Smart Homes: A Review of Library Sources<\/h1>\n<p class=\"p1\">Smart home technologies refer to internet connected devices used for managing and remotely controlling household functions, such as locks, lights, cameras, and thermostats. While these tools enhance convenience and efficiency, they also introduce cybersecurity risks. Many smart homes rely on networks, cloud services, and remote access, which can expose users to threats such as hacking and surveillance. As more households adopt these technologies, it becomes essential to understand their associated security challenges. This review examines common cybersecurity problems in smart homes, focusing on risks from user behavior and from technology.<\/p>\n<h2>User-Related Vulnerabilities in Smart Homes<\/h2>\n<p class=\"p1\">Poor authentication practices remain one of the most identified weaknesses in smart-home environments. <a href=\"#ref-1\">[1]<\/a> found that many users leave default credentials unchanged or create overly simple passwords, making devices especially vulnerable to unauthorized access. <a href=\"#ref-2\">[2]<\/a> further observed that password reuse across multiple smart-home services is widespread, enabling a single compromised credential to open several attack paths. Their findings suggest that these everyday habits significantly reduce the overall security posture of smart homes. Together, the studies reveal that even when devices offer secure features, the failure to adopt strong authentication practices continues to create critical risks for users.<\/p>\n<p class=\"p1\">In addition to poor authentication practices, limited user awareness significantly contributes to security risks in smart homes. <a href=\"#ref-2\">[2]<\/a> reported that many households possess only a basic understanding of their devices security settings and rarely consult manufacturer guidance, leaving default configurations untouched. <a href=\"#ref-3\">\u00a0[3]<\/a> found that the anomaly detection tools bundled with many smart home systems remain on default settings because users rarely adjust them, which sharply limits the devices&#8217; ability to recognise emerging attack patterns. <a href=\"#ref-4\">[4]<\/a> observed that users rarely monitor network traffic and often neglect built-in protections such as encryption or two-factor authentication, leaving their systems vulnerable to exploitation. Taken together, the evidence suggests that low digital knowledge is a pivotal yet often overlooked cause of smart-home insecurity.<\/p>\n<p class=\"p1\">Finally, smart home users often lack control over how third-party services access and manage their data, creating serious privacy and security risks. <a href=\"#ref-2\">[2]<\/a> found that many smart-home devices automatically share user information with external servers without offering clear consent options or opt-out mechanisms. <a href=\"#ref-5\">[5]<\/a> likewise observed that traffic routed through centralized hubs exposes user metadata to outside platforms with minimal transparency, leaving homeowners unaware of when and how their data are being accessed. This convergence in the literature points to user agency and data-flow transparency as missing pillars in today\u2019s smart-home ecosystem.<\/p>\n<h2>Technology-Related Vulnerabilities in Smart Homes<\/h2>\n<p class=\"p1\">While user behavior contributes to security issues, structural design choices in smart-home systems also create significant risks. <a href=\"#ref-6\">[6]<\/a> note that many platforms rely on centralized architectures in which a single cloud server or hub manages all device interactions. This setup introduces a single point of failure, meaning a successful attack on the central node could compromise the entire system. <a href=\"#ref-7\">[7]<\/a> further showed that dependence on external service providers for identity management and data routing limits user oversight and magnifies the impact of any cloud-side breach. This evidence underscores centralization as a pivotal factor that shapes both the visibility and resilience of smart-home ecosystems.<\/p>\n<p class=\"p1\">Smart-home security is frequently undermined by poor maintenance of device firmware, which can leave systems exposed to known threats. <a href=\"#ref-8\">[8]<\/a> revealed that many popular devices still rely on outdated, password only update procedures that transmit files without verifying their authenticity. In addition, <a href=\"#ref-5\">[5]<\/a> found that many commercial hubs lack secure, authenticated update channels, allowing attackers to block or replay critical patches. <a href=\"#ref-4\">[4]<\/a> further noted that homeowners often receive no meaningful alerts or lack the technical skills to apply fixes manually, prolonging device vulnerability. Collectively, the literature shows inconsistent firmware upkeep as a persistent gap that both increases the likelihood of unauthorized access and erodes user confidence in the reliability of smart-home technologies.<\/p>\n<p class=\"p1\">Absence of regulatory frameworks for smart-home cybersecurity is also a major concern. <a href=\"#ref-6\">[6]<\/a> pointed out that existing performance standards such as TS 621 for smart locks focus narrowly on physical robustness and leave cyber-specific attack vectors largely unaddressed. Assessing a broader spectrum of consumer IoT, <a href=\"#ref-2\">[2]<\/a> observed that national legislation is still fragmented, resulting in inconsistent requirements for encryption, vulnerability disclosure, and data-handling practices across manufacturers. Echoing this gap from an emerging-economy perspective, <a href=\"#ref-4\">[4]<\/a> noted that low-cost devices often bypass certification entirely, entering the market without any compliance audit. Clearly, the current regulatory patchwork allows insecure products to proliferate, leaving end-users to absorb the residual cyber-risk.<\/p>\n<h2>Conclusion<\/h2>\n<p class=\"p1\">This review examined cybersecurity risks in smart home environments, focusing on vulnerabilities resulting from both user behavior and system design. The findings reveal three main user-related vulnerabilities\u2014weak authentication practices, limited cybersecurity awareness, and poor control of third-party data access\u2014and four system-level vulnerabilities\u2014centralized architectures, unpatched firmware, insecure communication protocols, and lack of regulatory frameworks. While current research provides important insights into these challenges, a significant gap remains in understanding how these risks develop and interact over extended periods in everyday home settings. Future research should include real-world studies that evaluate decentralized security models, automated firmware update systems, and emerging regulatory standards to strengthen smart home resilience and user trust.<\/p>\n<h2>References<\/h2>\n<p id=\"ref-1\" class=\"p1\">[1] Y. Zhang, P. Malacaria, G. Loukas, and E. Panaousis, \u201cCROSS: A framework for cyber risk optimisation in smart homes,\u201d<em> Computers &amp; Security<\/em>, vol. 130, p. 103250, Jul. 2023, doi: 10.1016\/j.cose.2023.103250.<\/p>\n<p id=\"ref-2\" class=\"p1\">[2] D. Buil-Gil et al., \u201cThe digital harms of smart home devices: A systematic literature review,\u201d <em>Computers in Human Behavior<\/em>, vol. 145, p. 107770, Aug. 2023, doi: 10.1016\/j.chb.2023.107770.<\/p>\n<p id=\"ref-3\" class=\"p1\">[3] J. I. Iturbe-Araya and H. Rif\u00e0-Pous, \u201cEnhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization,\u201d<em> Int. J. Inf. Secur<\/em>., vol. 24, no. 1, p. 45, Feb. 2025, doi: 10.1007\/s10207-024-00961-6.<\/p>\n<p id=\"ref-4\" class=\"p1\">[4] R. Sivapriyan, S. V. Sushmitha, K. Pooja, and N. Sakshi. \u201cAnalysis of Security Challenges and Issues in IoT Enabled Smart Homes,\u201d in 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bangalore, India: IEEE, Dec.2021, pp. 1-6. doi: 10.1109\/CSITSS54238.2021.9683324<\/p>\n<p id=\"ref-5\" class=\"p1\">[5] O. Setayeshfar et al., \u201cPrivacy invasion via smart-home hub in personal area networks,\u201d <em>Pervasive and Mobile Computing<\/em>, vol. 85, p. 101675, Sep. 2022, doi: 10.1016\/j.pmcj.2022.101675.<\/p>\n<p id=\"ref-6\" class=\"p1\">[6] A. Allen, A. Mylonas, S. Vidalis, and D. Gritzalis, \u201cSmart homes under siege: Assessing the robustness of physical security against wireless network attacks,\u201d <em>Computers &amp; Security<\/em>, vol. 139, p. 103687, Apr. 2024, doi: 10.1016\/j.cose.2023.103687.<\/p>\n<p id=\"ref-7\" class=\"p1\">[7] X. Xu, Y. Guo, and Y. Guo, \u201cFog-enabled private blockchain-based identity authentication scheme for smart home,\u201d <em>Computer Communications<\/em>, vol. 205, pp. 58\u201368, May 2023, doi: 10.1016\/j.comcom.2023.04.005.<\/p>\n<p id=\"ref-8\" class=\"p1\">[8] A. Huszti, S. Kov\u00e1cs, and N. Ol\u00e1h, \u201cScalable, password-based and threshold authentication for smart homes,\u201d <em>Int. J. Inf. Secur<\/em>., vol. 21, no. 4, pp. 707\u2013723, Aug. 2022, doi: 10.1007\/s10207-022-00578-7.<\/p>\n<p class=\"p1\">This work was authored by Dhruv Dipakkumar Patel, Summer 2025, and is included here with permission. Citation: D. D. Patel, <em>User- and Technology-Driven Vulnerabilities in Smart Homes: A Review of Library Sources<\/em>, unpublished student work, Concordia University, Summer 2025.<\/p>\n<\/div>\n<h2><b>Informative Titles<\/b><\/h2>\n<p class=\"p1\">The title serves as your reader&#8217;s first impression and establishes the foundation for their understanding. An effective title clearly identifies the focus of your report while reflecting the core topic you are investigating. A vague, too general, too detailed, too informal, or unprofessional title may confuse the reader or fail to clearly communicate the focus and purpose of your report. Let&#8217;s read the following titles to see what to avoid:<\/p>\n<div class=\"textbox\">\n<p><strong><span class=\"TextRun SCXW58917821 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW58917821 BCX8\">Poor Example:<\/span><\/span><\/strong><span class=\"TextRun SCXW58917821 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW58917821 BCX8\"> Technology in Engineering<\/span><\/span><span class=\"EOP SCXW58917821 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<\/div>\n<p>This title is too broad and vague. It doesn\u2019t indicate what kind of technology, what area of engineering, or what aspect is being reviewed.<\/p>\n<div class=\"textbox\">\n<p><strong>Poor Example:<\/strong> A Review of the Use of Deep Learning-Based Predictive Maintenance Algorithms for Fault Detection in Electric Motor Bearings in Aerospace Systems Operating at High Altitudes<\/p>\n<\/div>\n<p>This title is overly long and specific. It overwhelms the reader and makes it difficult to grasp the focus quickly.<\/p>\n<div class=\"textbox\">\n<p><strong>Poor Example:<\/strong> How Cool AI Tools Can Help Engineers<\/p>\n<\/div>\n<p>Informal language like &#8220;cool&#8221; undermines the credibility of the paper and doesn\u2019t reflect an academic tone.<\/p>\n<div class=\"textbox\">\n<p><strong>Poor Example:<\/strong> A Literature Review on Biomedical Implants (when the paper is actually about AI in mechanical engineering)<\/p>\n<\/div>\n<p>This title misrepresents the content. Titles must accurately reflect the scope and focus of the review. Therefore, you might consider crafting a title that is brief yet precise. This offers readers immediate insight into what your review will explore.<\/p>\n<div class=\"textbox\">\n<p><strong>Good Example:<\/strong> The Role of Artificial Intelligence in Improving Structural Health Monitoring: A Review of Library Sources<\/p>\n<\/div>\n<p>This title immediately conveys the topic, target population, and document type to the reader.<\/p>\n<h2>The Introduction<\/h2>\n<p>The introduction sets the stage for your entire review and shows readers how you will analyze the topic. It works best when you clearly explain the problem you\u2019re researching, define any important terms your readers might not know, and state the purpose of your report.<\/p>\n<p>A strong introduction defines the main topic or problem and explains its significance. You can also give readers a brief overview of how your discussion will be organized so that they know what to expect. Including a clear statement of purpose helps readers follow your analysis and understand the goals of your review.<\/p>\n<h2>The Discussion<\/h2>\n<p>The discussion forms the analytical heart of your review, where your critical thinking and synthesis skills become most evident. In this section, you organize and synthesize your sources based on how they help explain or solve the problem you\u2019re researching. Group similar studies or findings together so your readers can see how each contributes to your understanding of the topic. For example, in the review titled <em>User-Related and Technology-Related Vulnerabilities in Smart Homes: A Review of Library Sources<\/em>, the sources are organized under two main themes: user-related vulnerabilities and technology-related vulnerabilities in smart homes.<\/p>\n<p>When developing your arguments, it can be helpful to organize your writing into paragraphs to keep your ideas focused. Ideally, each paragraph should cover just one main point. You might also find it useful to further group the sources within each paragraph. Once your sources are organized under main headings (such as user-related vulnerabilities and technology-related vulnerabilities in smart homes, as in the example), you can discuss each point in its own paragraph for clarity. To illustrate, in the example review, the first paragraph under<em> User-Related Vulnerabilities<\/em> <em>in Smart Homes<\/em> focuses on poor authentication practices, the second on limited user awareness, and the third on lack of control over third-party data risks. Similarly, under <em>Technology-Related Vulnerabilities in Smart Homes<\/em> the first paragraph focuses on poor structural design choices in smart\u2011home systems, the second on poor maintenance of device firmware, and the third on absence of regulatory frameworks for smart\u2011home cybersecurity.<\/p>\n<p>A good way to begin each paragraph is with a topic sentence that clearly states the main idea or point of argument. This sentence usually connects to how your sources contribute to understanding the research problem. Think of it as a mini-summary that guides the reader on what to expect. For instance, if your paragraph is about poor structural design choices in smart-home systems, you could start with, \u201cStructural design choices in smart-home systems also create significant risks.\u201d This sets the focus, and the rest of the paragraph should provide evidence from your sources to support that idea.<\/p>\n<p>Once you have introduced your topic, the next step involves supporting your main idea with evidence from multiple sources through effective synthesis. This process requires more than simply presenting basic factual information to inform the reader or providing summaries of what each study found. Instead, you weave together findings from different sources to build a compelling argument that supports your claim. Effective synthesis demonstrates how studies relate to one another and to your research problem, highlighting areas of agreement, disagreement, or complementarity.<\/p>\n<div class=\"textbox\">\n<p><strong>Poor example:<\/strong> Smart homes face many security problems related to authentication. Users often set weak passwords or leave default credentials unchanged. Sometimes, people also reuse the same passwords across different accounts. These practices create risks for smart-home systems. Strong authentication is important to keep devices safe.<\/p>\n<\/div>\n<p>The paragraph is weak because it simply lists facts without supporting a clear argument. No evidence or studies are provided, just general information. It lacks synthesis, which makes it a disconnected summary rather than a meaningful discussion.<\/p>\n<div class=\"textbox\">\n<p><strong>Poor example:<\/strong> <a href=\"#ref-1\">[1]<\/a> studied authentication in smart-home devices and found that users often failed to change default passwords. Their research highlighted that weak passwords allowed unauthorized access to systems. <a href=\"#ref-2\">[2]<\/a> examined password practices in smart-home environments and reported that users reused credentials across platforms.<\/p>\n<\/div>\n<p>The paragraph is weak because it simply lists study details without connecting the findings or explaining their significance. There\u2019s no analysis or synthesis of how these dimensions interact or how they support the main idea of the paragraph.<\/p>\n<div class=\"textbox\">\n<p><strong>Poor example:<\/strong> Poor authentication practices remain one of the most commonly identified weaknesses in smart\u2011home environments. <a href=\"#ref-1\">[1]<\/a> showed that many users rely on default or simple passwords. <a href=\"#ref-2\">[2]<\/a> reported that password reuse is common across smart-home services. These studies indicate that authentication is a problem for smart-home devices.<\/p>\n<\/div>\n<p>The paragraph is also weak because it merely summarizes each study individually without drawing any meaningful connections between them. It lacks deeper analysis, synthesis, and insight into how the studies relate to one another or contribute to a broader argument. Instead of building toward a clear conclusion, it ends with a vague generalization that fails to support a focused claim.<\/p>\n<div class=\"textbox\">\n<p><strong>Good example:\u00a0<\/strong> Poor authentication practices remain one of the most commonly identified weaknesses in smart\u2011home environments. <a href=\"#ref-1\">[1]<\/a> found that many users leave default credentials unchanged or create overly simple passwords, making devices especially vulnerable to unauthorized access. <a href=\"#ref-2\">[2]<\/a> further observed that password reuse across multiple smart\u2011home services is widespread, enabling a single compromised credential to open several attack paths. Their findings suggest that these everyday habits significantly reduce the overall security posture of smart homes. Together, the studies reveal that even when devices offer secure features, the failure to adopt strong authentication practices continues to create critical risks for users.<\/p>\n<\/div>\n<p>This is a better example because it starts with a clear topic sentence, uses evidence from multiple studies, and shows how their findings connect. Instead of just listing results, it explains what they mean together: that weak authentication habits remain a critical vulnerability in smart homes.<\/p>\n<p>Remember: when supporting your arguments with evidence, synthesis means moving beyond individual summaries of sources. Instead, critically evaluate how each source contributes to your overall argument. Look for points of alignment and divergence, and consider what these patterns reveal about your research problem. Rather than treating each study as an isolated finding, show how the collective evidence builds a fuller understanding of your topic.<\/p>\n<p>Notice how the good example paragraph demonstrates this approach. It starts with a clear topic sentence that highlights the main issue\u2014<em>poor authentication practices in smart homes<\/em>. From there, it weaves together evidence from two studies, showing how everyday habits like leaving default passwords or reusing them across accounts can open the door to serious security risks. Instead of just listing what each study found, the paragraph connects the findings to show the bigger picture:<em> weak authentication consistently undermines smart-home security<\/em>. It also explains why this matters, pointing out that even strong device features can\u2019t protect users if their behavior leaves systems exposed. In the end, the paragraph doesn\u2019t just summarize research; it uses the evidence to build a strong argument about why authentication remains such a critical vulnerability.<\/p>\n<h2>The Conclusion<\/h2>\n<p><span class=\"TextRun SCXW251504136 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW251504136 BCX8\">The c<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">onclusion summarizes the key <\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">points of yo<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">ur literature review without introducing new arguments or ideas. Start by paraphrasing your introduction&#8217;s purpose statement<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">, rephrasing it to reflect what the review has accomplished. \u00a0<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">This reminds readers of your original goals and signals your intent to wrap up your key arguments.<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">\u00a0<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">If your introduction examined <\/span><\/span><span class=\"TextRun SCXW251504136 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW251504136 BCX8\">common cybersecurity problems in smart homes, focusing on risks from user behavior and from technology<\/span><\/span><span class=\"TextRun SCXW251504136 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW251504136 BCX8\">,<\/span><span class=\"NormalTextRun SCXW251504136 BCX8\"> your conclusion might <\/span><span class=\"NormalTextRun SCXW251504136 BCX8\">state,<\/span> &#8220;<\/span><span class=\"TextRun SCXW251504136 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW251504136 BCX8\">This review examined cybersecurity risks in smart home environments, focusing on vulnerabilities resulting from both user behavior and system design.&#8221;<\/span><\/span><\/p>\n<p>Next, summarize the key themes and patterns that emerged from your source synthesis. Consider what the collective evidence reveals about your research problem and how studies work together to build understanding.<\/p>\n<p>Finally, identify any unanswered questions that future research should address. Point out areas where literature remains incomplete or contradictory. You might also suggest directions for future research or recommend actions for practitioners.<\/p>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<h2 id=\"section-8\" class=\"textbox__title\">Key Takeaways<\/h2>\n<\/header>\n<div class=\"textbox__content\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1418 alignright\" src=\"http:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-content\/uploads\/sites\/72\/2025\/09\/media_checklist__1_-removebg-preview-smallsize.png\" alt=\"\" width=\"105\" height=\"105\" \/><\/p>\n<p class=\"p1\">Even if you don&#8217;t conduct academic research, you will often spend days or weeks on applied research\u2014gathering information to solve real-world problems or support engineering decisions. In this process, it is essential to gather reliable and credible sources and use them to back up your arguments with solid evidence. <span style=\"font-size: 1em\">You can organize your work by<\/span><\/p>\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\n<li>categorizing sources according to their type and relevance;<\/li>\n<li>summarizing and paraphrasing to capture key points accurately in your own words;<\/li>\n<li>synthesizing sources to show connections and patterns; and<\/li>\n<li>citing and referencing to give proper credit and maintain academic integrity.<\/li>\n<\/ul>\n<p>Once you have gathered, organized, and analyzed your research materials, you can move on to writing a review of sources. Your review may include the following:<\/p>\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\n<li><strong>Title<\/strong>\u2014Use a precise and informative title.<\/li>\n<li><strong>Introduction<\/strong>\u2014Explain the problem and why it needs to be addressed.<\/li>\n<li><strong>Discussion<\/strong>\u2014Organize and synthesize your sources to show how they help explain or solve the problem.<\/li>\n<li><strong>Conclusion<\/strong>\u2014Summarize the key points without introducing new arguments or ideas.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div class=\"textbox textbox--exercises\">\n<header class=\"textbox__header\">\n<h2 id=\"section-9\" class=\"textbox__title\">Practice Task<\/h2>\n<\/header>\n<div class=\"textbox__content\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1476 alignright\" src=\"http:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-content\/uploads\/sites\/72\/2025\/09\/output-onlinepngtools609x609.png\" width=\"90\" height=\"90\" alt=\"image\" \/>Your engineering design team is preparing an innovation proposal for your company. Before you can design a solution, you need a solid understanding of the problem you\u2019re addressing. The project manager has asked each member of the team to prepare a<em> Review of Library Sources<\/em>. This report will help your group establish the technical and contextual background for your project, identify gaps in existing knowledge, and resolve any conflicting findings from prior work.<\/p>\n<p>To prepare this review, you will explore and evaluate sources from<\/p>\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\n<li>Academic journals<\/li>\n<li>Trade magazines<\/li>\n<li>Books, handbooks, and encyclopedias<\/li>\n<li>Websites<\/li>\n<li>Other relevant resources<\/li>\n<\/ul>\n<p>Your task is to categorize these sources based on their contributions to understanding the problem your proposal attempts to solve. Beyond summarizing prior work, you must take an evaluative stance. You should<\/p>\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\n<li>Link each source to your research problem.<\/li>\n<li>Assess how well each source contributes to understanding that problem.<\/li>\n<li>Identify gaps, unknowns, or conflicts in the body of knowledge.<\/li>\n<\/ul>\n<p>The finished report should<\/p>\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\n<li>Be 750\u20131000 words in length.<\/li>\n<li>Include at least eight sources in IEEE format.<\/li>\n<\/ul>\n<p>Consider structuring your report as follows.<\/p>\n<h5><strong>Title<\/strong><\/h5>\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\n<li>Use a title that clearly identifies the focus of the report on library research. (Be brief, but precise.)<\/li>\n<\/ul>\n<h5><strong>Introduction<\/strong><\/h5>\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\n<li>Establish context for the problem you are researching.<\/li>\n<li>Define key terms (if necessary).<\/li>\n<li>Include a clear statement of purpose that establishes the scope and goals of the report.<\/li>\n<li>Provide a \u201croad map\u201d indicating the order in which you approach ideas in the body of the report.<\/li>\n<\/ul>\n<h5><strong>Body<\/strong><\/h5>\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\n<li>Categorize your sources according to the contribution they make to understanding the problem.<\/li>\n<li>Develop your arguments in paragraph form.<\/li>\n<li>Present and elaborate on one main idea per paragraph.<\/li>\n<li>Tie the content of sources that you review to the scope and focus established in the introduction. (i.e., Establish why given sources are relevant to understanding the problem.)<\/li>\n<li>Identify gaps\/unknowns\/conflicts in the body of knowledge.<\/li>\n<li>Use transitions to signal the progression of ideas.<\/li>\n<li>(Optional) Include diagrams, charts, or images\u2014properly referenced\u2014to help explain key points.<\/li>\n<\/ul>\n<h5><strong>Conclusion<\/strong><\/h5>\n<ul style=\"padding-left: 12px !important;margin-left: 0 !important\">\n<li>Restate the key findings from the review.<\/li>\n<li>Suggest directions for future research (based on sources reviewed) or recommendations for action.<\/li>\n<li>Do not introduce new ideas in the conclusion.<\/li>\n<li>References<\/li>\n<li>Provide at least eight references in IEEE format.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<h2 id=\"section-10\" class=\"textbox__title\">References<\/h2>\n<\/header>\n<div class=\"textbox__content\">\n<p id=\"ref-21\" class=\"p1\">[1] J. P. Forgas, \u201cAffect and Cognition,\u201d <em>Perspect Psychol Sci<\/em>, vol. 3, no. 2, pp. 94\u2013101, Mar. 2008, doi: <a href=\"http:\/\/10.1111\/j.1745-6916.2008.00067.x\">10.1111\/j.1745-6916.2008.00067.x<\/a>.<\/p>\n<p id=\"ref-22\" class=\"p1\">[2] W.-J. Gao, Y. Hu, J.-L. Ji, and X.-Q. Liu, \u201cRelationship between depression, smartphone addiction, and sleep among Chinese engineering students during the COVID-19 pandemic,\u201d <em>World J Psychiatry<\/em>, vol. 13, no. 6, pp. 361\u2013375, Jun. 2023, doi: <a href=\"https:\/\/www.wjgnet.com\/2220-3206\/full\/v13\/i6\/361.htm?appgw_azwaf_jsc=eM4YQfbrdgMqgaChGlLy7cTjKN19xV502o1RDcwZnWF4naqyYFFpWpRhslowHelq5XQAeX_UsO0MEMPKhSMYk6zUHFyoFi4enuPVQzokyUZ0s-L2kKaZc876DO4ZUMmKb_91rC8gsCk3JubDER7PQPQWj8ddemhpl2A1dU6iIcCPqLmfuh8LsV_gNgUQyGYQ9hs4CBFTu4r4aXyE75wbS5-Rk81Ve05I-2sA4-spfT4pVL0FRGQj0hwlL0FfRcwVoFm7YWAUyb6Gfm_lSdazhy0Kfo4sfmkFxr811MfC8YBGH0u0EdWpi2CsUXJt6BqEWFgw8zziiQFgYKCO3FUTAg\">10.5498\/wjp.v13.i6.361.<\/a><\/p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"author":98,"menu_order":12,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-296","chapter","type-chapter","status-publish","hentry"],"part":188,"_links":{"self":[{"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/pressbooks\/v2\/chapters\/296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/wp\/v2\/users\/98"}],"version-history":[{"count":97,"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/pressbooks\/v2\/chapters\/296\/revisions"}],"predecessor-version":[{"id":1506,"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/pressbooks\/v2\/chapters\/296\/revisions\/1506"}],"part":[{"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/pressbooks\/v2\/parts\/188"}],"metadata":[{"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/pressbooks\/v2\/chapters\/296\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/pressbooks\/v2\/chapter-type?post=296"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/wp\/v2\/contributor?post=296"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbooks.concordia.ca\/practical-guide-to-technical-writing\/wp-json\/wp\/v2\/license?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}