Detailed search queries for more refined results

Inactive_account_ID_249 / Pixabay

Upon a good deal though as to my primary research topic, I have decided that it would be prudent to fall back on my secondary research topic of “What do consumers understand about the steps required to secure their IoT devices?”

  • I searched the Computer Source database for the subject term “Consumer protection” AND “Cybersecurity” OR “Cyber security” as a basic terms. This produces 3,593 results
  • I then limited results to full articles and peer reviewed which brought the results total down to 163
  • The article “User preference of cyber security awareness delivery methods” in this query may prove useful in my research.
    • Subjects: (1) PERSONNEL management – Methodology, (2) DECEPTION, (3) DECISION making, (4) GAMES, (5) INTERNET, (6) MANAGEMENT, (7) MOTION pictures, (8) PERSONNEL management, (9) QUESTIONNAIRES, (10) RESEARCH funding, (11) TEACHING aids, (12) EMAIL, (13) DATA security
    • Abawajy, J. (2012). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237–248. https://doi.org/10.1080/0144929x.2012.708787
      This article highlights various cyber security attack methods that are focused on exploiting the human factor. It then evaluates the effectiveness of various security awareness delivery methods that could be used to improve a consumer’s awareness and behavior.

 

  • I searched the Computer Source database for the subject term “Internet of things” AND “Cybersecurity” OR “Cyber security” as a basic terms. This produces 3,613 results
  • I then limited results to full articles and peer reviewed which brought the results total down to 167
  • The article “A Survey of Cybersecurity Certification for the Internet of Things” from this query may prove useful in my research
    • Subjects: (1) INTERNET of things, (2) INTERNET security, (3) CERTIFICATION, (4) SCIENTIFIC community, (5) RISK assessment
    • Matheu, S. N., Hernández-Ramos, J. L., Skarmeta, A. F., & Baldini, G. (2021). A Survey of Cybersecurity Certification for the Internet of Things. ACM Computing Surveys, 53(6), 1–36. https://doi.org/10.1145/3410160
      This article explores the recent push to gain certified individuals in the cybersecurity space in terms of how it translates to enhances consumer protection. It then looks at those certification requirements as it pertains to consumer IoT devices in an effort to understand their application and if modifications are needed to focus security measures more towards these devices.

 

  • I searched the Computer Source database for the subject term “Encryption” AND “Cybersecurity” OR “Cyber security” as a basic terms. This produces 3,609 results
  • I then limited results to full articles and peer reviewed which brought the results total down to 164

About Mark Ray

I am a middle aged man trying to find my way in an increasingly complex world. Despite the ever-changing landscape of life, I commonly find myself projecting a stoic reminder to colleagues and classmates that you only get something out of it if you give back. Find humor in the common and purpose in adversity, then let the cards fall where they may.

Leave a Reply

Your email address will not be published. Required fields are marked *