Refining The Best Options

Search 1: 
  • Database Used: Academic Search Premier
  • Boolean Term: Cybersecurity and Hackers
  • Limiters: Full text & Published after 2010
  • Search Results: 115
  • Subject Terms from Interesting Study: COMPUTER password security, INTERNET security, KEYSTROKE timing authentication, COMPUTER security, JUST-in-time systems
  • Potential article: Jenkins, J. L., Grimes, M., Proudfoot, J. G., & Lowry, P. B. (2014). Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals. Information Technology for Development, 20(2), 196–213. https://doi-org.ezproxy.fhsu.edu/10.1080/02681102.2013.814040 

Annotation: This study talks about password reusing, using the same password for many accounts, how that is not good practice and how hackers can compromise your accounts. This article could provide a useful resource to help people not use the same password, and to make them more secure so hackers can not get into their accounts.

 

Search 2:
  • Database Used: EBSCO host
  • Boolean Term: Prevention, Hackers and Cybersecurity 
  • Limiters: Full text, and Published after 2000
  • Search Results: 43
  • Subject Terms from Interesting Study: Internet security, Computer hackers, Computer security, Computer networks, Fraud prevention, Databases
  • Potential article: Britt, Phillip. 2005. “Ethical Hackers: Testing the Security Waters.” Information Today 22 (4): 1–28. https://search-ebscohost-com.ezproxy.fhsu.edu/login.aspx?direct=true&db=eue&AN=502960281&site=ehost-live&scope=site 

Annotation: This article provides information on ethical hacking. Which is basically assistance on keeping companies network and customers databases safe from unwanted intrusions. They are hired Computer Specialists that will get into the system and see if there are security “holes” and fix them.

 

 

Search 3:
  • Database Used: Academic Onefile
  • Boolean Term: Cybersecurity, Solutions, and Threats 
  • Limiters: Full text & Published after 2012
  • Search Results: 34
  • Subject Terms from Interesting Study: Artificial Intelligence, Cybersecurity, Security, Intrusion Detection, Attacks, Threats, AI.
  • Potential article: Alrajhi, A. M. (2020). A Survey of Artificial Intelligence Techniques for Cybersecurity Improvement. International Journal of Cyber-Security and Digital Forensics, 9(1), 34+. https://link.gale.com/apps/doc/A652011405/AONE?u=klnb_fhsuniv&sid=bookmark-AONE&xid=c4f4d628 

Annotation: Cyber security has become even worse. Old techniques do not work anymore. This article gives reason behind development of cybersecurity skills in an innovative way and how artificial intelligence can be implied to improve many security systems 

About Kayla Mickey

Hi! My name is Kayla. I am 25 years old, and I live in PA. I work full time at a cable/internet/phone company as a social media specialist. I currently have an Associates degree in Specialized Technology as a Computer Tech. I am going for my Bachlors degree in Telecommunications and Networking.

Leave a Reply

Your email address will not be published. Required fields are marked *