Saturation on Phishing and Other Cyber Attacks

The search topic for the proposed research was explaining cyber attacks such as phishing and good methods to educate and prevent these attacks. It is important for me to find articles that explain what phishing is as well as what other types of attacks are out there. It is also important that I find article that explain how to prevent these attacks from showing up in the future

1st Search:

Database: Computer Source

Search Terms: Phishing AND Education

Search Details: I searched with the terms above and I also used the filters for full-text documents and peer reviewed. I also made the publications from as early as 2016 and the results showed 89 different articles.

Usefulness: This article is extremely helpful because it gives a basic description of what phishing is and how to combat it. This is a good source to use to educate others in the workplace about the potential dangers of phishing.

Annotation:

Gupta, B., Tewari, A., Jain, A., & Agrawal, D. (2017). Fighting against phishing attacks: state of the art and future challenges. Neural Computing & Applications28(12), 3629–3654. https://doi-org.ezproxy.fhsu.edu/10.1007/s00521-016-2275-y

This article first discusses what phishing attacks are, the history of these attacks, and the motivation of users behind this attack. Secondly, this article discusses proposed solutions to detect and defend from phishing attacks.

2nd Search:

Database: Computer Source

Search Terms: Cyber Terrorism AND Awareness

Search Details: I searched with the terms above and I also used the filters for full-text documents and peer reviewed. I also made the publications from as early as 2016 and the results showed 24 different articles.

Usefulness: This article is not very helpful. The search I conducted was very vague and general and this was the result of that. I learned form this search that terms like the ones I used will provide content that is all over the place.

Annotation:

Yaacoub, J.-P. A., Noura, H. N., Salman, O., & Chehab, A. (2022). Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security21(1), 115–158. https://doi-org.ezproxy.fhsu.edu/10.1007/s10207-021-00545-8

This article reviews the main security vulnerabilities, threats, risks, and the main security attacks within the robotics domain. Different methods are proposed in order to enhance and improve the security level of robotic systems. This article also reviews presented security solution for robotic systems.

3rd Search:

Database: Computer Source

Search Terms: Information Security AND Hacking

Search Details: I searched with the terms above and I also used the filters for full-text documents and peer reviewed. I also made the publications from as early as 2016 and the results showed 130 different articles.

Usefulness: This article isn’t as useful as I hoped it would be. It still has its use in that we can use the study to view what percentage of users will respond a certain way to the attacks they will receive.

Annotation:

Ng, K. C., Zhang, X., Thong, J. Y. L., & Tam, K. Y. (2021). Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective. Journal of Management Information Systems38(3), 732–764. https://doi-org.ezproxy.fhsu.edu/10.1080/07421222.2021.1962601

This article discusses the motivation for protecting sensitive information. To study this motivation, the attitudinal ambivalence theory is introduced. This theory is tested on data collected from 1,383 individuals facing potential cyberattacks of their emails in a field experiment.

4th Search:

Database: Computer Source:

Search Terms: Ransomware AND Malware

Search Details: I searched with the terms above and I also used the filters for full-text documents and peer reviewed. I also made the publications from as early as 2016 and the results showed 77 different articles.

Usefulness: This article can useful because it helps us learns how these attacks are carried out. I t also helps because it can be a great outlet to educate others what to do when they see these attacks.

Annotation:

MOUSSAILEB, R., CUPPENS, N., LANET, J.-L., & BOUDER, H. L. (2021). A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms: Case Closed? ACM Computing Surveys54(6), 1–36. https://doi-org.ezproxy.fhsu.edu/10.1145/3453153

This article discusses the four stages of a ransomware attack. These steps are delivery, deployment, destruction, and dealing. This article then discusses the appropriate countermeasures for each phase of these attacks.

5th Search:

Database: Computer Source

Search Terms: Phishing AND Virus

Search Details: I searched with the terms above and I also used the filters for full-text documents and peer reviewed. I also made the publications from as early as 2016 and the results showed 50 different articles.

Usefulness: This article proves to be useful because it gives an idea of what percentage of these students recognize phishing attacks and how many will report or ignore these attacks.

Annotation:

Goel, S., Williams, K., & Dincelli, E. (2017). Got Phished? Internet Security and Human Vulnerability. Journal of the Association for Information Systems18(1), 22–44.

This article conducts a study of sending phishing emails to 7,225 undergraduate students and recorded their responses. The results for this test reveal the recipients’ psychological weaknesses increase their susceptibility to phishing.

Have I reached Saturation?

I have conducted searches from databases such as Computer Source and Computer Science Collection. I have concluded that Computer Source has shown me the most relevant articles to use in my research. I may need one or two more articles but for the most part, I think I have everything I need.

About Nick Gaylord

My name is Nicholas but I go by Nick. I am currently pursuing a bachelors in networking and telecommunications. I was born and raised in Wichita, Kansas where I currently live. My hobbies include videos games as well as watching and playing football and basketball.

Leave a Reply

Your email address will not be published. Required fields are marked *