Search 1:
Database: Computer Source
- Boolean Terms: Breach or Scanning Tools
- Results: Using the Boolean search term led to 159 results. The filters I used were Peer-Reviewed Journals, publication date 1999 – 2022, and Full-Text Documents.
- Usefulness: The search generated numerous articles, though what I was trying to find was an article involving Network Penetration testing. However, I found the following article that explains the investments organizations make to improve their network security.
- Subject Terms:
(1) Investment policy.
(2) Internal security.
(3) Security systems.
(4) Security management.
(5) Computer network security.
(6) Multi-factor authentication.
Annotation:
Li, H., Yoo, S., & Kettinger, W. J. (2021). The Roles of IT Strategies and Security Investments in Reducing Organizational Security Breaches. Journal of Management Information Systems, 38(1), 222–245. https://doi-org.ezproxy.fhsu.edu/10.1080/07421222.2021.1870390
This article by Li, Yoo, and Kettinger(2021) is a detailed article about investments companies make to enhance the protection of their software. An interesting section is their “Understanding Offender Motivation: Hacker Behavior”(Li, Yoo, & Kettinger, 2021). This section about Hacker Behavior will contribute to my research proposal because it explains what hackers are looking for in a vulnerable network. The researchers used hypothesis testing for the study and concluded IT security investments decrease the chances of security breaches when the company’s digitalization is low. Overall, I think this research is a great find because the study explains potential internal security threats and gives feedback on the intention of hacking.

Search 2:
Database: Computer Science Collection
- Boolean Terms: Cyberattacks and Businesses
- Results: Using the Boolean search term led to 144 results. The filters I used were Peer-Reviewed Journals and Full-Text Documents.
- Usefulness: This search was successful. I found the following article in the annotation section, and it was about artificial intelligence being implemented into cyber-attack detection systems. This was something I was looking for earlier with the Networking Penetration testing and Vulnerability assessment concepts.
- Subject Terms:
(1) Data mining.
(2) Data Security.
(3) Algorithms.
(4) Machine learning.
(5) Detection equipment.
(6) Internet of things.
(7) Network security software.
(8) Cyberterrorism.
Annotation:
Alzahrani, M. S., & Alsaade, F. W. (2022). Computational Intelligence Approaches in Developing Cyberattack Detection System. Computational Intelligence and Neuroscience, 2022. https://link.gale.com/apps/doc/A698473871/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e2bf55f3
This article analyses machine learning and deep learning algorithms applied to detect cyber-intrusions from well-known databases. There are a few valuable concepts about machine learning algorithms that I can use for the idea of Network Penetration testing becoming automated for businesses to use to detect vulnerable areas in their systems. In the related studies section of the article, there are interesting details about IoT networks being more vulnerable than computing systems. I also thought the experiment the researchers performed was very interesting. Alzahrani and Alsaade (2022) considered 34 major cyber-attacks and normal packets to test the chosen machine learning algorithms for recognizing malicious attacks. Overall, the article is a detailed and statistical study that will give me feedback on software detection for malicious attacks.

Search 3:
Database: Computer Science Collection
- Boolean Terms: Browser Security or Cyber Awareness
- Results: Using the Boolean search term led to 120 results. The filters I used were Peer-Reviewed Journals and Full-Text Documents.
- Usefulness: This search was successful. The article I found is about cyber-security awareness that is similar yet different from the article I reviewed earlier this semester. Comparing and contrasting both articles can help my research proposal solidify any holes in my methodology.
- Subject Terms:
(1) Data security.
(2) Email.
(3) Cyberterrorism.
Annotation:
Alqahtani, M. A. (2022). Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience, 2022. https://link.gale.com/apps/doc/A698473867/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=494e0159
The article by Mohammed A. Alqahtani (2022) evaluates the level of cyber-security knowledge of students at Imam Abdulrahman Bin Faisal University in Dammam. The researchers used a variety of tests to determine their results as reliable. Partial reliable t-test, ANOVA, Pearson’s correlation test, and Kaiser -Meyer–Olkin (KMO) test were used in the research that caught my attention. Since the researchers in this study use questionnaires, I can evaluate their effectiveness and improve the methodology used in my proposed research. A recommendation that I may consider implementing in my research proposal is suggesting that institutions should have a context-based cyber-security awareness program as a core class.