Tag Archives: Cybersecurity

Cybersecurity in Infrastructure Research Proposal

Link to Final Research Proposal: https://docs.google.com/document/d/1suEQ6Po58HbgpmABuZG-aJViFSdZ-1w-/edit?usp=sharing&ouid=106053748700277601726&rtpof=true&sd=true It was fun thinking about how to approach asking the questions I’ve been wondering about for quite a while now. I realize after taking this class that conducting a study in a way that is valid and respected takes waaaaaaay more work than I ever would have guessed. My … Continue reading Cybersecurity in Infrastructure Research Proposal

Security over Convenience Proposal

Abstract Enlightening users’ cybersecurity awareness while learning the impact of cyber-attacks through deliberate attention to your behavior when surfing on public wi-fi. Public wi-fi is synonymous with a lack of privacy. Are people aware of how vulnerable their privacy is if certain safety measures are not taken? Which age group and devices are the most … Continue reading Security over Convenience Proposal

Week 13 Final Search – How Database Leaks Effect The Bottom Line

My topic for these past weeks has been in data protection, I’m looking at how cybersecurity can help and want to produce a research proposal that breaks down how data breaches hurt both companies and customers and why cybersecurity is necessary to prevent this. I am nearing saturation but have considered that perhaps in order … Continue reading Week 13 Final Search – How Database Leaks Effect The Bottom Line

Data Protection – Subject Search and Citation Traces

I am looking for information on Data Protection and how cybersecurity impacts the security of peoples’ data in an age where companies collect more data on their customers than ever before. This week’s search has provided me with additional information that will no doubt prove useful in examining this topic. Subject Search Database: GALE OneFile … Continue reading Data Protection – Subject Search and Citation Traces

Diving Deep into Cyber Research

Citation: I am looking at using many different resources in my research about Cyber Security. Mostly with how we can prevent it, avoid it and be safe.   Frank, M. L., Grenier, J. H., & Pyzoha, J. S. (2019). How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance. Journal … Continue reading Diving Deep into Cyber Research

Rapidly Refining Research — Wk11

Source 1 Database: “EBSCOhost, Computer Source” Search: “Vulnerability AND Security AND Cyber Attack.” There were no other filters applied. Results: 122 Article selected: “Computer Security Vulnerability as Concerns the Electricity Distribution Grid” by Stosovic, Dimitrijevic, and Litovski. Subject terms: computer security, electric power distribution, cyberterrorism, malware, eavesdropping, artificial intelligence. Stošović, M. A., Dimitrijević, M., & … Continue reading Rapidly Refining Research — Wk11

Detailed search queries for more refined results

Upon a good deal though as to my primary research topic, I have decided that it would be prudent to fall back on my secondary research topic of “What do consumers understand about the steps required to secure their IoT devices?” I searched the Computer Source database for the subject term “Consumer protection” AND “Cybersecurity” … Continue reading Detailed search queries for more refined results

Diving Deeper – Cybersecurity and Data Protection

Search 1: Database used: Computer Science Collection Boolean: Database AND cybersecurity AND protection online Limiter: Peer-Reviewed, Full-Text Results: 28 Potential Article: Examining the costs and causes of cyber incidents Subject Terms: Computer crimes, Computer insurance, Data security, United States, National Institute of Standards and Technology Citation: Romanosky, Sasha (2016), Examining the costs and causes of … Continue reading Diving Deeper – Cybersecurity and Data Protection

Diving Deeper into Databases — Cybersecurity Studies

Database 1: https://web-s-ebscohost-com.ezproxy.fhsu.edu/ehost/resultsadvanced?vid=2&sid=2a1a2735-5522-47b7-88e9-3ceb945aa3b4%40redis&bquery=security&bdata=JmRiPWNwaCZ0eXBlPTEmc2VhcmNoTW9kZT1TdGFuZGFyZCZzaXRlPWVob3N0LWxpdmUmc2NvcGU9c2l0ZQ%3d%3d Database 2: https://go-gale-com.ezproxy.fhsu.edu/ps/start.do?     p=CDB&u=klnb_fhsuniv   Keywords: Cybersecurity, Networking, Computer Database 1, Cybersecurity – 3,252 Results Database 1, Networking – 22,123 Results Database 1, Computer – 677,740 Results Database 2, Cybersecurity – 200,000+ Database 2, Networking – 1,000,000+ Database 2, Computer – 2,000,000+   Results were mixed. Way too many results and … Continue reading Diving Deeper into Databases — Cybersecurity Studies