3 1 Project One: Writing Plan First Name Last Name School Professor



Project One: Writing Plan

First Name Last Name



November 13, 2022


This study addresses the need to reframe cybersecurity regulations. It will establish a background overview concerning the fueled debate on why the private sector hypothetically has equities guided by cybersecurity laws and regulations guiding market competition and commercial liability. An argument related to the significant topic aimed to address is that a focus on private-public collaboration can change the narratives on cybersecurity mandates and initiatives to support Generation Z from being a target. In contrast, the public sector continues to become a victim of cybercrimes.


Research has illustrated that Generation Z (Gen Z) is more likely to make risky decisions and is more likely to be influenced by peers. Essentially, Gen Z is pursued as a generation raised during the internet and social media era and is one of the most tech-savvy generations. Despite the generation being aware of cybersecurity and the aligned risks, for example, hacking and phishing frauds, most of their actions do not align with awareness – for instance, they post vital and confidential information insights that are security threats to themselves or their workspace.

Challenges to support Argument

One of the significant challenges to support the thesis entails understanding the correlation between Gen Z’s development and cybersecurity behaviors through the interdisciplinary concept. It reflects that to support the argument, the study will gather additional information concerning the risk-taking behaviors of Gen Z online and the impact of these attributes on cybercrimes and incidents. Therefore, the main issues are on identifying how best to approach the topic or themes – for example, it can be approached through three different conceptual frameworks (a) Generation Z risk attitude and behavior norms, (b) cybersecurity awareness perspectives, or (c) integration of the risk of attitude and behavior with cybersecurity awareness perspective.


The study’s goal is to utilize option C (an integration of the risk of attitude and behavior with a cybersecurity awareness perspective) to understand Generation Z’s activities in public networks and compare them with the same activities in private networks. Understand the gaps between the two and create a conceptual framework confirming that private-public collaboration can change the narrative on cybersecurity mandates and initiatives since they promote cybersecurity awareness.

Supporting Points

Innovation is one of the primary drivers of digital development technology development, which entails generating up-to-date ideas, concepts, products, or laws. Innovation in the digital technology sector entails promoting an open and free consumer market and, in the case of a gap between itself and human development, a reluctant innovation that can be in the form of digital systems to address cybersecurity issues (Maffey et al., 2015).

The internet is used for diverse objectives, for example, (a) social use – socializing with others, (b) instrumental use – online banking, and (c) informational use – searching for entertainment and information (Hulur & Macdonald, 2020). Based on socioemotional goals and objectives, each age utilizes digitized technology differently; for example, older adults use it for social objectives, generation X and Y use it for information goals, and generation Z for emotional use – making them expose their vulnerability by posting critical information about them that can be used to harm them (Hulur & Macdonald, 2020).

Digitization is fast evolving; for example, mobile technology is integrated with electronic patient records and care networks in the care industry, which is critical in tracing patients’ movements between different care facilities in real-time (Beaulieu & Bentahar, 2021). It provides a map of how to manage Generation Z cyberspace activities.

Key Points

The study will rely upon three different peer-reviewed sources. Georgina M. and her co-authors conducted the first peer review. The source will be critical since it addresses digital technology in conservation. It reflects that despite the significance of the threats that have emerged, if both private and public institution channels their focus to advancing understanding of and promoting interaction with the natural world, then Generation Z behavior attitude and behavior toward digitized technology can be managed to limit cybersecurity platforms. The second source is that of Hulur G. and Macdonald B., where data gathered from older adults’ use of digital technology establish a comparative analysis to that of Generation Z. It is a source that outlines to understand Gen Z’s risk attitude and behavior and why they are targets of the current cybercrime activities and how best to promote cybersecurity awareness to limit such incidences. The third peer review source is composed by Beaulieu and Bentahar – they provide examples of how digitized technology application has grown and developed the healthcare industry. The idea is to borrow the conceptual framework since it entails public and private collaboration and use it to establish cybersecurity awareness among Gen Z.

Integrating Evidence into the Essay

This study will use evidence based on a transparent and effective concept within a paragraph. Its integration will involve four phases – (a) introduce the evidence and source, (b) state the evidence, (3) illustrate the primary message being emphasized through the evidence, and (4) link the evidence to the topic sentence and thesis of the essay. While each paragraph will start with a topic statement, followed by a detailed illustration of the topic sentence, the evidence will follow.


I received positive feedback from my lecturer, meaning I was on the right track. The feedback made me engage in additional research and consultation on how best to maintain if not strengthen my essay writing preparation. My concept was accepted, and I was highly motivated and confident throughout this assessment.

Unfortunately, apart from changing how to construct my paragraph (topic sentence, illustration of topic sentence, evidence, explanation of evidence, and linking evidence to the thesis), I followed the guides to compose this paper to ensure that all the needs were met.


Beaulieu, M., & Bentahar, O. (2021). Digitalization of the healthcare supply chain: A roadmap to generate benefits and effectively support healthcare delivery. Technological forecasting and social change, 167, 120717. DOI: 10.1016/j.techfore.2021.120717

Hulur, G., & Macdonald, B. (2020). Rethinking social relationships in old age: Digitalization and the social lives of older adults. American Psychologist, 75(4), 554. http://dx.doi.org.ezproxy.snhu.edu/10.1037/amp0000604 

Maffey, G., Homans, H., Banks, K., & Arts, K. (2015). Digital technology and human development: A charter for nature conservation. Ambio 44 (Suppl. 4). doi: 10.1007/s13280-015-0703-3.