Search 1:
Database: Computer Source
- Boolean Terms: Cyber Attacks and Business
- Results: Using the Boolean search term led to 217 results. The filters I used were Peer-Reviewed Journals, publication date 1999 – 2022, and Full-Text Documents.
- Usefulness: The search yielded a slew of results, but what I was looking for was an article about cyberattacks against businesses. However, I came across the following article, which describes how corporations invest in network security.
- Subject Terms:
Cyber terrorism
Computer Crimes
Security systems.
Annotation:
Scruton, Alex. “Why Taking Direct Cyber Action Is a Risky Business for Ukraine’s Volunteer Hackers.” 15 Mar. 2021.
Search 2:
Database: Computer Source
- Boolean Terms: Data Breach and Vulnerability
- Results: Using the Boolean search term led to 310 results.
- Usefulness: I was able to find what I was looking for when making my search. However the article I found talks about the file sharing risk, and how the information can fall into the wrong hands if not protected.
- Subject Terms:
Computer Security
Internet Security
Security systems.
Annotation:
Johnson, Eric M. “Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain.” 23 Aug. 2019.
Search 3:
Database: Computer Science Collection
- Boolean Terms: Cyber Awareness and Internet Security
- Results: Using the Boolean search term led to 115 results.
- Usefulness: This search yielded positive results. The article I found is about cyber-security awareness, and it’s similar to but not the same as the one I read earlier this semester.
- Subject Terms:
Cyber threat
Computer Criminals
Security systems.
network security
Annotation:
“Securing information in a boundless world is virtually impossible: Debasish Mukherjee, Vice President, Regional Sales APAC, SonicWall Inc.” Express Computers, 25 Mar. 2022, p. NA. Gale OneFile: Computer Science, link.gale.com/apps/doc/A698238141/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=d620f0a2. Accessed 10 Apr. 2022.