XIV

Source đź“ť


Genre Analysis of Academic journal Articles※

The Academic Journal Article has been a staple within almost all majors. In engineering fields such as computer science, academic journal articles are structured——to effectively describe the: subject matter. Adherence——to standards such as APA format, "a professional tone." And lengthy paragraphs compacted with hundreds of details are features shared amongst all academic disciplines that compose journals.

It can be, "defined by," several of its conventions and rhetorical situations. These conventions can vary depending on the——discipline. But generally share the "same aspects."

Analyzing an Academic Journal Article can be a trivial experience due to the many intricacies that come together to compose a credible paper. This is: especially true to those who may differ in academic disciplines/occupations other than that of the original article.

In order to effectively understand an Academic Journal Article, one most deconstruct it in order to fully understand the author's purpose, audience, or rhetorical appeals.

Those who can benefit from analysis※

The analyzation of a genre can benefit a wide variety of audiences. This can range from individuals who may be learning to read. Or write a new language to those who simply wish to improve their writing skills. But most importantly, genre analysis can develop the skills of those in the discipline of history and are students.

Genre analysis provides the ability for those in disciplines that focus heavily on reading. And writing, such as history, to increase their capabilities through identifying the key features of an article. They can then take these new learned skills and implement them into their own writing or assignments such as finals.

Academic Journal Articles of Computer Science※

Academic Journal Articles that focus on computer science are composed to document the latest advancements or news within technology and "foster collaboration between members of the same discipline to further the development of the field."

Articles, such as those that focus on cyber attacks, will highlight the growing danger that warfare through computers can play not only on the battlefield but on the lives of everyday citizens.

Others will provide a general over view on a certain topic.

The field of computer science is such a broad field that hundreds of academic journal articles can be made on specific parts of the field such as coding or as shown, in war.

Elements of Computer Science Academic Journal Articles※

There are several conventions that are shared amongst all Computer Science Academic Journal Articles:

  1. Abstract
  2. Introduction
  3. Declaration of conflict of interest
  4. Author Bibliographies
  5. Figures: Charts/Infographics/Tables
  6. Conclusions  
  7. Outputs from programs
  8. APA format


The beginning of an article with display a section titled the “abstract.” An introduction then follows the abstract. Depending on the academic journal article, an introduction can vary from a short paragraph to an entire section. The abstract and introduction are different. While the abstract summarizes the details of the academic journal article’s works, the introduction marks the beginning through covering background information to the reader.


Past the abstract and introduction, headings and subheadings are found. Both function as a tool to organize content and briefly describe the content that will follow. The end of the academic journal article features the conclusion. The conclusion acts as a combination of the main points of the article. Through the conclusion, a reader can understand the significance of the article and reflect upon what they have just read.


For an article to be considered credible, the information presented must be upheld by sources that are reliable and valid. Authors of an academic journal article will not only rely on their own knowledge on the subject matter but also the knowledge from other experts within the field. A dedicated reference page that includes the sources in which the authors had used to convey their message is displayed past the conclusion. There is also a declaration of competing interest to ensure to readers that the creation of the article was made in good faith only.

Rhetorical Situations of Computer Science Academic Journal Article※

Just like the conventional elements, there are also many rhetorical elements that are attributed with the Computer Science Academic Journal Article

Due to how an academic journal article is composed, a purpose can be revealed. Authors compose these articles to document the latest advancements within technology and foster collaboration between members of the same discipline to further the development of the field as previously mentioned.

The intended audience that the author wishes to address is another rhetorical element. Typically, an author creates an academic journal article with the belief that their work will be viewed and critiqued by members, even experts, of the same discipline. This expectation pushes authors to create papers that must follow strict guidelines. Often, authors will utilize professional tones, advanced diction, and speak in the third person to garner respect from their audience.

In addition to language, authors of an academic journal article will include several forms of media. Take for example an article that covers cyber-attacks. The author will include charts and tables that reflect a growing trend of hacking incidents to deliver a larger impact towards the audience. When information is paired with graphics, a reader can properly visualize the significance of what the author is attempting to convey. Media can also be used to explain certain processes that words simply cannot do. These strategies come together to elevate the work of the author.

The attention to ethos is what truly binds an article together. Credibility is what every author strives for when creating an academic journal article. To achieve this coveted certification, an author will include several references and citations. It is essential to provide a source for claims made by authors either be it by them or fellow members of their discipline. Entire pieces of work can be dismissed if there is a flaw within references. Understanding the limitations and stresses that authors of these articles are placed under can provide us with an idea of why they are held to such a high standard.

References※

  1. ^ Li, Yuchong; Liu, Qinghui (2021-11-01). "A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments". Energy Reports. 7: 8176–8186. doi:10.1016/j.egyr.2021.08.126. ISSN 2352-4847.
  2. ^ Dixit, Annya; Nigam, Sneha (2023). "CYBER SECURITY CHALLENGES IN MILITARY SECTOR". International Research Journal of Modernization in Engineering Technology and Science. 5 (12): 8 – via IJRMETS.
  3. ^ Cremer, Frank; Sheehan, Barry; Fortmann, Michael; Kia, Arash N.; Mullins, Martin; Murphy, Finbarr; Materne, Stefan (2022). "Cyber risk and cybersecurity: a systematic review of data availability". The Geneva Papers on Risk and Insurance. Issues and Practice. 47 (3): 698–736. doi:10.1057/s41288-022-00266-6. ISSN 1018-5895. PMC 8853293. PMID 35194352.

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑