Tag Archives: Week 13 Blog Post

Saturation on Phishing and Other Cyber Attacks

The search topic for the proposed research was explaining cyber attacks such as phishing and good methods to educate and prevent these attacks. It is important for me to find articles that explain what phishing is as well as what other types of attacks are out there. It is also important that I find article … Continue reading Saturation on Phishing and Other Cyber Attacks

When Saturation Levels Rise – Researching To The Limit

My research topic is about how website’s accessibility is impacted by usability. Meaning, in what way can websites be developed to help those with disabilities, and how do these developments help them in their lives. This is meant to study the trend of human computer interaction, programming, and web development in general. It’s meant to … Continue reading When Saturation Levels Rise – Researching To The Limit

Logos of Internet Explorer, Google Chrome, Mozilla Firefox, and Netscape Navigator

The Final Search

My topic is about artificial intelligence in vehicles. Artificial intelligence is improving each year. Having more vehicle companies adopt autonomous vehicles, artificial intelligence is starting to slowly take over in the vehicle space. There are of course pros and cons to this like with anything else. 1st Search Database: Computer Source Search: Artificial intelligence “AND” … Continue reading The Final Search

The Final Search, Will saturation be Achieved?

The topic I have chosen is how the use of AI is affecting business. In this study, I want to see how companies use it to improve their workforce, whether it affects people’s job security, and whether it has helped do more jobs. First Search Database:  Business Source Premier Search: AI and Job performance Limiters: Full text … Continue reading The Final Search, Will saturation be Achieved?

The Final Search

For my topic I am doing research on how cyber security involves with businesses. How having good security benefits with protecting your business. From data files, information and etc. and just want to expand on how cyber attacks try to breach data. Search 1: Terms-  Data Breach “AND” Data Privacy “OR” security Results- 346 Database- … Continue reading The Final Search