Hypothesis: Educating more on viruses and the danger of hacker threats.
Proposal Outline
Introduction (heading not included)
- Firms turn to AI to fight cyber attackers, Goodwin, B. (2019)
- What We Talk about When We Talk about “Reasonable Cybersecurity”: A Proactive and Adaptive Approach. Computer & Internet Lawyer, 34(3), 1–8. Miller, K. L. (2017).
- Research hypothesis
Rebels for the System? Virus Writers, General Intellect, Cyberpunk and Criminal Capitalism. (Literature Review)
-
- Technology information
Crespo, M. (2020). let’s collaborate! cyber security. Technology & Engineering Teacher, 80(2), 20–21.
Ng, K. C., Zhang, X., Thong, J. Y. L., & Tam, K. Y. (2021). Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective. Journal of Management Information Systems, 38(3), 732–764 - Advanced Threats
Carlton, M., & Levy, Y. (2017). Cybersecurity skills: Foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation. Online Journal of Applied Knowledge Management, 5(2), 16–28.
Rust, R. T., Kannan, P. K., & Na Peng. (2002). The Customer Economics of Internet Privacy. Journal of the Academy of Marketing Science, 30(4), 455–464.
- Technology information
-
- Internet Privacy
Schulte Scott, J. (1999). Privacy, confidentiality, and security: protecting “personally identifiable information.” Healthcare Financial Management : Journal of the Healthcare Financial Management Association, 53(3), 26–27.
Simon, W. H. (2014). Rethinking Privacy. Boston Review, 39(5), 58–65.
- Internet Privacy
Methodology
- Present issue of Cyber Security
- Research ideas on how to attempt to prevent
- Apply the information found
- Test the information
Discussion
- Antiviruses: Which are the best, how can they be applied?
- In what ways would it be a good way to show how to prevent viruses or hackers?
- More knowledge about Hackers