Subject Term and Citation Tracking searches

Tumisu / Pixabay

 

In continuing my searches related to my research topic of “What do consumers understand about the steps required to secure their IoT devices?” I learned from the queries that I performed last week and refined them further with a Subject Term search that I felt would provide relevant results. From one of the articles that I cited last week named “User preference of cyber security awareness delivery methods” I found an interesting subject term, “Data Security”.

I took this term and search the Computer Source database for “Data Security” as a Subject term and also included Internet of Things as a basic term, then limited results to full articles and peer reviewed. This search yielded 9 results. Of these results I found the article annotated below which I feel will be of use.

  • Subjects: (1) INTERNET of things. (2) INTERNETWORKING, (3) RIGHT of privacy, (4) DATA security, (5) BIG data, (6) LAW
  • Poudel, Swaroop (2013). Internet of Things: Underlying Technologies, Interoperability, and Threats to Privacy and Security. Berkeley Technology Law Journal, 31, 997–1021. http://dx.doi.org/10.15779/Z38PK26
    This article explores the relation of end user IoT devices and the relationship between operability and user privacy and security.

I feel like this article will prove quite useful as it will likely address a lot of what is currently known about end user IoT devices and the risk that they pose if not secured.

 

For the forwards and backward citation searched using an article that I found related to the article “What do consumers understand about the steps required to secure their IoT devices?” I was not able to derive the information that I needed in the same Computer Source database, but did locate some useful information in the Library, Information Science & Technology Abstracts database.

According to this database, this journal article referenced 84 other papers. Also, the article had been referenced by 4 other articles available in the Library, Information Science & Technology Abstracts database. This information is very useful as it easily points me towards other articles that are in some way related to the research that I’m doing. After briefly reviewing the articles that were found, I located this document that may assist me in my research.

  • (1) Access to information, (2) Computer crimes, (3) Blogs, (4) Email, (5) Websites, (6) Phishing, (7) Online social networks, (8) Corruption
  • Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94–100. https://doi.org/10.1145/1290958.1290968
    This article studies phishing attacks on the internet to better understand how people were convinced to provide personally identifiable information to the attackers.

 

About Mark Ray

I am a middle aged man trying to find my way in an increasingly complex world. Despite the ever-changing landscape of life, I commonly find myself projecting a stoic reminder to colleagues and classmates that you only get something out of it if you give back. Find humor in the common and purpose in adversity, then let the cards fall where they may.

Leave a Reply

Your email address will not be published. Required fields are marked *