It examines the strengths and weaknesses of what is presented as well as describing the applicability of the author's conclusions to the research being conducted.
For most of your annotated bibliographies, however, you will be writing analytical or critical annotations. Retrieved from editorial from the Economist describes the controversy surrounding video games and the effect they have on people who use them.
Although annotations can be descriptive, they also include distinctive features about an item.
Annotations can be evaluative and critical as we will see when we look at the two major types of annotations.
This article is distinctive in exploring the controversy surrounding video games from a generational standpoint and is written for a general audience. While it points out distinctive features about the item it does not analyze the author's conclusions.
Analytical or critical An analytical or critical annotation not only summarizes the material, it analyzes what is being said.It argues that there is no current clear definition and that in order for progress to be made in terms of regional stability and economic performance, there needs to be a clearer understanding of the region's security objectives.After examining current theory and definitions, the article uses the US and Asia as case studies to explore current thinking around security architecture in Asia.You have just been given an assignment to write an annotated bibliography.Before you begin, you need to know what exactly an annotated bibliography is and how to get started.The authors propose an alternative perspective using seven characteristics which refer broadly to design, function and structure.In general they argue that any Asian security architecture should be geographically defined, it should be unifying, designed from the "bottom-up" and focused not just on institutions and security. presents two participatory gaming tools that address the need for integrative approaches to coral reef management.The article gives a comprehensive and clear idea of the current understanding of security architecture in Asia and other regions, however the article was written in 2010 so the region has been influenced by more recent events. Sim Reef is a computer-based role play game designed at regional level.The seven point plan is useful for exploring a potential new way of understanding security architecture but the authors do not point out the limitations that these might have in terms of acceptance from key stakeholders. Tested in Mexico with policy makers and industry representatives, the model simulates coastal development trajectories and trade-offs between environmental, social and economic priorities.The student is conducting research for an essay with the question: "Using relevant theory, analyze the key components of 'security architecture' in East Asia." 36 (2010): 95-116.This article examines the definition of the term 'security architecture' particularly in the Asian context.