Diving Deeper into Databases — Cybersecurity Studies

Database 1: https://web-s-ebscohost-com.ezproxy.fhsu.edu/ehost/resultsadvanced?vid=2&sid=2a1a2735-5522-47b7-88e9-3ceb945aa3b4%40redis&bquery=security&bdata=JmRiPWNwaCZ0eXBlPTEmc2VhcmNoTW9kZT1TdGFuZGFyZCZzaXRlPWVob3N0LWxpdmUmc2NvcGU9c2l0ZQ%3d%3d

Database 2: https://go-gale-com.ezproxy.fhsu.edu/ps/start.do?     p=CDB&u=klnb_fhsuniv

 

Keywords: Cybersecurity, Networking, Computer

Database 1, Cybersecurity – 3,252 Results

Database 1, Networking – 22,123 Results

Database 1, Computer – 677,740 Results

Database 2, Cybersecurity – 200,000+

Database 2, Networking – 1,000,000+

Database 2, Computer – 2,000,000+

 

Results were mixed. Way too many results and too broad. I think it would be easy to find the information I need but I would have to refine the search further by deselecting certain source types and using more precise search terms.

 

Citations (Annotation is at the end, also formatting is wrong but I have no idea how to fix it using the blog tools)

Database 1, Cybersecurity

Zadeh, A., Jeyaraj, A., & Biros, D. (2020). Characterizing cybersecurity threats to organizations in support of risk mitigation decisions. e-Service Journal, 12(2), 1–34. https://doi.org/10.2979/eservicej.12.2.01

Database 1, Cybersecurity

Liu, C.-W., Huang, P., & Lucas, H. C. (2020). Centralized it decision making and cybersecurity breaches: Evidence from U.S. Higher Education Institutions. Journal of Management Information Systems, 37(3), 758–787. https://doi.org/10.1080/07421222.2020.1790190

Database 2, Cybersecurity

Alqahtani, M. A. (2022). Cybersecurity awareness based on software and E-mail security with statistical analysis. Computational Intelligence and Neuroscience, 2022, 1–12. https://doi.org/10.1155/2022/6775980

Database 2, Cybersecurity

Liu, C.-W., Huang, P., & Lucas, H. C. (2020). Centralized it decision making and cybersecurity breaches: Evidence from U.S. Higher Education Institutions. Journal of Management Information Systems, 37(3), 758–787. https://doi.org/10.1080/07421222.2020.1790190

 

ANNOTATION

Zadeh, A., Jeyaraj, A., & Biros, D. (2020). Characterizing cybersecurity threats to organizations in support of risk mitigation decisions. e-Service Journal, 12(2), 1–34. https://doi.org/10.2979/eservicej.12.2.01This article covers cybersecurity and the different threats that modern organizations face. Different types of organizations have different priorities in cybersecurity. All information in this entry was taken from e-Service Journal which belongs to Indiana University Press.

One thought on “Diving Deeper into Databases — Cybersecurity Studies

Leave a Reply

Your email address will not be published. Required fields are marked *