Database 2: https://go-gale-com.ezproxy.fhsu.edu/ps/start.do? p=CDB&u=klnb_fhsuniv
Keywords: Cybersecurity, Networking, Computer
Database 1, Cybersecurity – 3,252 Results
Database 1, Networking – 22,123 Results
Database 1, Computer – 677,740 Results
Database 2, Cybersecurity – 200,000+
Database 2, Networking – 1,000,000+
Database 2, Computer – 2,000,000+
Results were mixed. Way too many results and too broad. I think it would be easy to find the information I need but I would have to refine the search further by deselecting certain source types and using more precise search terms.
Citations (Annotation is at the end, also formatting is wrong but I have no idea how to fix it using the blog tools)
Database 1, Cybersecurity
Zadeh, A., Jeyaraj, A., & Biros, D. (2020). Characterizing cybersecurity threats to organizations in support of risk mitigation decisions. e-Service Journal, 12(2), 1–34. https://doi.org/10.2979/eservicej.12.2.01
Database 1, Cybersecurity
Liu, C.-W., Huang, P., & Lucas, H. C. (2020). Centralized it decision making and cybersecurity breaches: Evidence from U.S. Higher Education Institutions. Journal of Management Information Systems, 37(3), 758–787. https://doi.org/10.1080/07421222.2020.1790190
Database 2, Cybersecurity
Alqahtani, M. A. (2022). Cybersecurity awareness based on software and E-mail security with statistical analysis. Computational Intelligence and Neuroscience, 2022, 1–12. https://doi.org/10.1155/2022/6775980
Database 2, Cybersecurity
Liu, C.-W., Huang, P., & Lucas, H. C. (2020). Centralized it decision making and cybersecurity breaches: Evidence from U.S. Higher Education Institutions. Journal of Management Information Systems, 37(3), 758–787. https://doi.org/10.1080/07421222.2020.1790190
ANNOTATION
Zadeh, A., Jeyaraj, A., & Biros, D. (2020). Characterizing cybersecurity threats to organizations in support of risk mitigation decisions. e-Service Journal, 12(2), 1–34. https://doi.org/10.2979/eservicej.12.2.01This article covers cybersecurity and the different threats that modern organizations face. Different types of organizations have different priorities in cybersecurity. All information in this entry was taken from e-Service Journal which belongs to Indiana University Press.
Great citations! Be sure to tell us which databases you are using. URL’s are not useful for databases.