Tag Archives: annotated bibliography

Finishing the Quest for Information on Representation

I personally believe that I’ve used every search term of any worth for my topic of interest. I wanted to see more on the topic of ageism as a priority for today, but as you’ll soon come to realize, that’s easier said than done.  Any new info is still useful either way. Despite the pursuit … Continue reading Finishing the Quest for Information on Representation

Saturation? Maybe. Maybe not.

My research proposal is about small business and cyber-attacks. Why are small businesses attacked? What can small businesses do to prevent and respond to cyber-attacks. Search 1: Database: Computer Source Search: “cyber”, “security” and “business” Limiters: Full Text, Peer Reviewed Results: 37 Yong Wu, Tayi, G. K., Genzhong Feng, & Fung, R. Y. K. (2021). … Continue reading Saturation? Maybe. Maybe not.

The Final Search, Will saturation be Achieved?

The topic I have chosen is how the use of AI is affecting business. In this study, I want to see how companies use it to improve their workforce, whether it affects people’s job security, and whether it has helped do more jobs. First Search Database:  Business Source Premier Search: AI and Job performance Limiters: Full text … Continue reading The Final Search, Will saturation be Achieved?

The Final Search – Saturation Achieved?

I chose a topic of impacts on financial sectors implementing cloud service providers. In this case, I want to compare what affects could be had on banking institutions who look to host private versus public clouds for their infrastructure, and if there should be a standard to follow. I find this topic important because I … Continue reading The Final Search – Saturation Achieved?

Narrowing it Down to the Specifics

Advanced Searches Database: Computer Science Collection Boolean term: Cybersecurity and Cyberattacks Limiters: Academic Journals, Full-Text Documents, Peer-Reviewed Journals, Publication Date Apr 06,2017 – April 06, 2022. Results: 158 Potential Article: Alqahtani, M. A. (2022). Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience, 2022. https://link.gale.com/apps/doc/A698473867/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=494e0159. Accessed April 6, 2022. … Continue reading Narrowing it Down to the Specifics