- Database: Computer Source
Keyword: cyber security
Results: 4,498
Potential Article: Public–private partnerships in national cyber-security strategies
CARR, M. (2016). Public–private partnerships in national cyber-security strategies. International Affairs (London), 92(1), 43-62.
https://primotcna01.hosted.exlibrisgroup.com/permalink/f/t8k1f3/TN_cdi_proquest_journals_1755401695 - Database: Computer Source (EBSCOhost)
Keyword: cyber security prevention
Results: 11
Potential Goodwin, B. (2019). Firms turn to AI to fight cyber attackers. Computer Weekly, 6–8.
http://ezproxy.fhsu.edu:2048/login?url=https://search-ebscohost-com.ezproxy.fhsu.edu/login.aspx?direct=true&db=cph&AN=138020359&site=ehost-live&scope=site - Database: Computer Source (EBSCOhost)
Keyword: hackers and cyber security
Results: 2,200,106
Potential Article: Miller, K. L. (2017). What We Talk about When We Talk about “Reasonable Cybersecurity”: A Proactive and Adaptive Approach. Computer & Internet Lawyer, 34(3), 1–8.
http://ezproxy.fhsu.edu:2048/login?url=https://search-ebscohost-com.ezproxy.fhsu.edu/login.aspx?direct=true&db=cph&AN=121272196&site=ehost-live&scope=site - Database: Computer Science
Keyword: hackers viruses
Results: 108
Potential Article: Miles, J. B. (1993, June 7). PC security software: how to protect your valuable data from an invasion of hackers, viruses and spies. Government Computer News, 12(12), 65+. https://link.gale.com/apps/doc/A13970437/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=446ba819
https://link.gale.com/apps/doc/A13970437/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=446ba819
- Article: The third article I found was the most interesting to me. This article includes data security breaches by cyber hackers, how it was found, and repaired. Along with some information about the law regarding cyber security. I think it would be important to include about the state law when dealing with hackers and steps that they took with a security breach in America.