Cyber Security Flow Chart and Outline

 

 

Hypothesis: Educating more on viruses and the danger of hacker threats. 

Proposal Outline
Introduction (heading not included)
  • Firms turn to AI to fight cyber attackers,  Goodwin, B. (2019)
  • What We Talk about When We Talk about “Reasonable Cybersecurity”: A Proactive and Adaptive Approach. Computer & Internet Lawyer, 34(3), 1–8. Miller, K. L. (2017). 
  • Research hypothesis

Rebels for the System? Virus Writers, General Intellect, Cyberpunk and Criminal Capitalism. (Literature Review)

    • Technology information
      Crespo, M. (2020). let’s collaborate! cyber security. Technology & Engineering Teacher, 80(2), 20–21.
      Ng, K. C., Zhang, X., Thong, J. Y. L., & Tam, K. Y. (2021). Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective. Journal of Management Information Systems, 38(3), 732–764
    • Advanced Threats
      Carlton, M., & Levy, Y. (2017). Cybersecurity skills: Foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation. Online Journal of Applied Knowledge Management, 5(2), 16–28.
      Rust, R. T., Kannan, P. K., & Na Peng. (2002). The Customer Economics of Internet Privacy. Journal of the Academy of Marketing Science, 30(4), 455–464. 
    • Internet Privacy
      Schulte Scott, J. (1999). Privacy, confidentiality, and security: protecting “personally identifiable information.” Healthcare Financial Management : Journal of the Healthcare Financial Management Association, 53(3), 26–27.
      Simon, W. H. (2014). Rethinking Privacy. Boston Review, 39(5), 58–65.

 

Methodology

  • Present issue of Cyber Security 
  • Research ideas on how to attempt to prevent 
  • Apply the information found
  • Test the information

Discussion

  • Antiviruses: Which are the best, how can they be applied? 
  • In what ways would it be a good way to show how to prevent viruses or hackers?
  • More knowledge about Hackers

About Kayla Mickey

Hi! My name is Kayla. I am 25 years old, and I live in PA. I work full time at a cable/internet/phone company as a social media specialist. I currently have an Associates degree in Specialized Technology as a Computer Tech. I am going for my Bachlors degree in Telecommunications and Networking.

Leave a Reply

Your email address will not be published. Required fields are marked *