
Upon a good deal though as to my primary research topic, I have decided that it would be prudent to fall back on my secondary research topic of “What do consumers understand about the steps required to secure their IoT devices?”
- I searched the Computer Source database for the subject term “Consumer protection” AND “Cybersecurity” OR “Cyber security” as a basic terms. This produces 3,593 results
- I then limited results to full articles and peer reviewed which brought the results total down to 163
- The article “User preference of cyber security awareness delivery methods” in this query may prove useful in my research.
- Subjects: (1) PERSONNEL management – Methodology, (2) DECEPTION, (3) DECISION making, (4) GAMES, (5) INTERNET, (6) MANAGEMENT, (7) MOTION pictures, (8) PERSONNEL management, (9) QUESTIONNAIRES, (10) RESEARCH funding, (11) TEACHING aids, (12) EMAIL, (13) DATA security
- Abawajy, J. (2012). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237–248. https://doi.org/10.1080/0144929x.2012.708787
This article highlights various cyber security attack methods that are focused on exploiting the human factor. It then evaluates the effectiveness of various security awareness delivery methods that could be used to improve a consumer’s awareness and behavior.
- I searched the Computer Source database for the subject term “Internet of things” AND “Cybersecurity” OR “Cyber security” as a basic terms. This produces 3,613 results
- I then limited results to full articles and peer reviewed which brought the results total down to 167
- The article “A Survey of Cybersecurity Certification for the Internet of Things” from this query may prove useful in my research
- Subjects: (1) INTERNET of things, (2) INTERNET security, (3) CERTIFICATION, (4) SCIENTIFIC community, (5) RISK assessment
- Matheu, S. N., Hernández-Ramos, J. L., Skarmeta, A. F., & Baldini, G. (2021). A Survey of Cybersecurity Certification for the Internet of Things. ACM Computing Surveys, 53(6), 1–36. https://doi.org/10.1145/3410160
This article explores the recent push to gain certified individuals in the cybersecurity space in terms of how it translates to enhances consumer protection. It then looks at those certification requirements as it pertains to consumer IoT devices in an effort to understand their application and if modifications are needed to focus security measures more towards these devices.
- I searched the Computer Source database for the subject term “Encryption” AND “Cybersecurity” OR “Cyber security” as a basic terms. This produces 3,609 results
- I then limited results to full articles and peer reviewed which brought the results total down to 164