diff --git a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
index 82403108c554d4801ce36e8d250967d289ab5b4f..df560ff815ebc6eb101ff9d3786d9052e3d50db0 100644
--- a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
+++ b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
@@ -1,7 +1,7 @@
-/*
-Two-Cyber-Threats-Model
+/* Model of Supply Chain with Two Cyber Threats
+
 Based on the "Baseline Supply Chain" model 
-created by Nathaniel Alden with help from Rachel Talkington 2020-07-05
+Created by Nathaniel Alden with help from Rachel Talkington 2020-07-05
 updated by Nathaniel Alden and Kristin Giammarco 2020-12-16
 modified by Margaret Palmieri, added outcomes
 modified by Margaret Palmieri, added risk and probability 
@@ -12,7 +12,21 @@ modified by Margaret Palmieri 2021-07-29, added Pipeline use case, updated globa
 modified by Kristin Giammarco 2021-08-01, revised global report model for two scenarios
 modified by Margaret Palmieri 2021-08-03, updated attributes and model notes
 curated for model collection by Kristin Giammarco and Pamela Dyer, 2021-09-20
-*/
+
+Purpose: 
+
+Description: 
+
+References:
+Palmieri, Margaret. "Assessing and Visualizing Supply Chain 
+Cyber Risk in Monterey Phoenix." NPS Master's Thesis, 
+Monterey, CA: September 2021.
+
+Search terms: 
+
+Instructions: 
+
+==========================================================*/
 
 SCHEMA Supply_Chain_with_Two_Cyber_Threats