Search 1:
- Database Used: Academic Search Premier
- Boolean Term: Cybersecurity and Hackers
- Limiters: Full text & Published after 2010
- Search Results: 115
- Subject Terms from Interesting Study: COMPUTER password security, INTERNET security, KEYSTROKE timing authentication, COMPUTER security, JUST-in-time systems
- Potential article: Jenkins, J. L., Grimes, M., Proudfoot, J. G., & Lowry, P. B. (2014). Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals. Information Technology for Development, 20(2), 196–213. https://doi-org.ezproxy.fhsu.edu/10.1080/02681102.2013.814040
Annotation: This study talks about password reusing, using the same password for many accounts, how that is not good practice and how hackers can compromise your accounts. This article could provide a useful resource to help people not use the same password, and to make them more secure so hackers can not get into their accounts.
Search 2:
- Database Used: EBSCO host
- Boolean Term: Prevention, Hackers and Cybersecurity
- Limiters: Full text, and Published after 2000
- Search Results: 43
- Subject Terms from Interesting Study: Internet security, Computer hackers, Computer security, Computer networks, Fraud prevention, Databases
- Potential article: Britt, Phillip. 2005. “Ethical Hackers: Testing the Security Waters.” Information Today 22 (4): 1–28. https://search-ebscohost-com.ezproxy.fhsu.edu/login.aspx?direct=true&db=eue&AN=502960281&site=ehost-live&scope=site
Annotation: This article provides information on ethical hacking. Which is basically assistance on keeping companies network and customers databases safe from unwanted intrusions. They are hired Computer Specialists that will get into the system and see if there are security “holes” and fix them.
Search 3:
- Database Used: Academic Onefile
- Boolean Term: Cybersecurity, Solutions, and Threats
- Limiters: Full text & Published after 2012
- Search Results: 34
- Subject Terms from Interesting Study: Artificial Intelligence, Cybersecurity, Security, Intrusion Detection, Attacks, Threats, AI.
- Potential article: Alrajhi, A. M. (2020). A Survey of Artificial Intelligence Techniques for Cybersecurity Improvement. International Journal of Cyber-Security and Digital Forensics, 9(1), 34+. https://link.gale.com/apps/doc/A652011405/AONE?u=klnb_fhsuniv&sid=bookmark-AONE&xid=c4f4d628
Annotation: Cyber security has become even worse. Old techniques do not work anymore. This article gives reason behind development of cybersecurity skills in an innovative way and how artificial intelligence can be implied to improve many security systems