Final Searches

I am looking at using many different resources in my research about Cyber Security. Mostly with how we can prevent it, avoid it and be safe.

 

1st Search

  • Database: Academic Search Premier
  • Search: Cyber security AND prevention and control
  • Limiters: Full text, Peer reviewed 
  • Results: 25

Crespo, M. (2020). let’s collaborate! cyber security. Technology & Engineering Teacher, 80(2), 20–21.
http://ezproxy.fhsu.edu:2048/login?url=https://search-ebscohost-com.ezproxy.fhsu.edu/login.aspx?direct=true&db=aph&AN=145982292&site=ehost-live&scope=site

Annotated Bibliography #1

In this article Michael Crespo is teaching students how the internet works. Some may fear that they are opening knowledge into future hackers but that’s not the case. To know how to fix something you first have to know how it actually works. Threats are not going away but they train students to be able to prevent and or fix hacking issues. Plus security for customers. 

 

2nd Search

  • Database: Academic Search Premier
  • Search: Cyber security AND hackers
  • Limiters: Full text, Peer reviewed 
  • Results: 67

Wolfe, N. A. (2015). Hacking the Anti-Hacking Statute: Using the Computer Fraud and Abuse Act to Secure Public Data Exclusivity. Journal of International Human Rights, 13(3), 301–315.
http://ezproxy.fhsu.edu:2048/login?url=https://search-ebscohost-com.ezproxy.fhsu.edu/login.aspx?direct=true&db=aph&AN=111341204&site=ehost-live&scope=site

Annotated Bibliography #2

This Article describes problems within the Act when compared with modern web-based applications and how savvy civil litigators are with hacking the Computer Fraud and Abuse Act for their own usage. They mainly use it as a copyright tool. This hack exposes two vulnerabilities. One being the literal application of the term “access controls” encompassing token controls; and two being the mere facial review of loss declarations. The article’s solution to the vulnerabilities is to build in reference to data security standards and define the type of data protectable under the Act.

 

3rd Search

  • Database: Academic Search Premier
  • Search: Cyber security AND usage or use or utilization
  • Limiters: Full text, Peer reviewed 
  • Results: 635

Carlton, M., & Levy, Y. (2017). Cybersecurity skills: Foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation. Online Journal of Applied Knowledge Management, 5(2), 16–28. https://doi-org.ezproxy.fhsu.edu/10.36965/ojakm.2017.5(2)16-28

Annotated Bibliography #3

This article is about how Advanced Persistent Threats (APTs) are penetration techniques that combine several approaches to gain access to organizational networks. Organizations need a team of skilled individuals to prevent APT’s and other threats. 

 

4th Search

  • Database: Communication & Mass Media Complete
  • Search: Cyber security AND hacking
  • Limiters: Full text, Peer reviewed 
  • Results: 4

O’Neil, M. (2006). Rebels for the System? Virus Writers, General Intellect, Cyberpunk and Criminal Capitalism. Continuum: Journal of Media & Cultural Studies, 20(2), 225–241. https://doi-org.ezproxy.fhsu.edu/10.1080/10304310600641760

Annotated Bibliography #4

This article discusses the differences between virus writers and legitimate hackers. The author expresses that knowing the concept of hackers will give them an understanding of their roles. 

 

5th Search

  • Database: Communication & Mass Media Complete
  • Search: Cyber security AND internet privacy
  • Limiters: Full text, Peer reviewed 
  • Results: 9

Rust, R. T., Kannan, P. K., & Na Peng. (2002). The Customer Economics of Internet Privacy. Journal of the Academy of Marketing Science, 30(4), 455–464. https://doi-org.ezproxy.fhsu.edu/10.1177/009207002236917

Annotated Bibliography #5

This article states that privacy will continue to erode, until it essentially disappears.Privacy will continue to decline and will be too expensive to maintain. Market of privacy will be able to be purchased by customers.

 

Have you reached Saturation?

 

I believe that my research has gone well with finding sources but it does not hurt to continue to find more information that could potentially assist with my research and paper. Some of the items I have had on my lists have been crossed off since I felt they were initially not enough to use or add in. My main search was Academic Search Premier and I used many different keywords along with limiters. 

About Kayla Mickey

Hi! My name is Kayla. I am 25 years old, and I live in PA. I work full time at a cable/internet/phone company as a social media specialist. I currently have an Associates degree in Specialized Technology as a Computer Tech. I am going for my Bachlors degree in Telecommunications and Networking.

Leave a Reply

Your email address will not be published. Required fields are marked *