
In continuing my searches related to my research topic of “What do consumers understand about the steps required to secure their IoT devices?” I learned from the queries that I performed last week and refined them further with a Subject Term search that I felt would provide relevant results. From one of the articles that I cited last week named “User preference of cyber security awareness delivery methods” I found an interesting subject term, “Data Security”.
- Abawajy, J. (2012). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237–248. https://doi.org/10.1080/0144929x.2012.708787
I took this term and search the Computer Source database for “Data Security” as a Subject term and also included Internet of Things as a basic term, then limited results to full articles and peer reviewed. This search yielded 9 results. Of these results I found the article annotated below which I feel will be of use.
- Subjects: (1) INTERNET of things. (2) INTERNETWORKING, (3) RIGHT of privacy, (4) DATA security, (5) BIG data, (6) LAW
- Poudel, Swaroop (2013). Internet of Things: Underlying Technologies, Interoperability, and Threats to Privacy and Security. Berkeley Technology Law Journal, 31, 997–1021. http://dx.doi.org/10.15779/Z38PK26
This article explores the relation of end user IoT devices and the relationship between operability and user privacy and security.
I feel like this article will prove quite useful as it will likely address a lot of what is currently known about end user IoT devices and the risk that they pose if not secured.
For the forwards and backward citation searched using an article that I found related to the article “What do consumers understand about the steps required to secure their IoT devices?” I was not able to derive the information that I needed in the same Computer Source database, but did locate some useful information in the Library, Information Science & Technology Abstracts database.
- Hugl, U. (2011). Reviewing person’s value of privacy of online social networking. Internet Research, 21(4), 384–407. https://doi.org/10.1108/10662241111158290
According to this database, this journal article referenced 84 other papers. Also, the article had been referenced by 4 other articles available in the Library, Information Science & Technology Abstracts database. This information is very useful as it easily points me towards other articles that are in some way related to the research that I’m doing. After briefly reviewing the articles that were found, I located this document that may assist me in my research.
- (1) Access to information, (2) Computer crimes, (3) Blogs, (4) Email, (5) Websites, (6) Phishing, (7) Online social networks, (8) Corruption
- Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94–100. https://doi.org/10.1145/1290958.1290968
This article studies phishing attacks on the internet to better understand how people were convinced to provide personally identifiable information to the attackers.