DSRT 837 University of the Cumberlands Cybersecurity Annotated Bibliography

User Generated

ivanl558

Computer Science

dsrt 837

University of the Cumberlands

DSRT

Description

Select 10 Articles that support your Topic.

Write a review of all the articles and submit.

APA 7TH Edition 12 Font Times New Roman

The basis precepts for formatting the pages and paragraphs are:
Margins: 1-inch margins
Spacing: double spaced
Font-Size: Times New Roman - 12-point font
Running head (text and page #) noted on header


References (include in text citations) 7the Edition


The specific use of the APA style is to write with clarity, precision, and inclusions. The APA style provides a uniformed platform for research papers to be better structured and organized. In this class, “The term “plagiarism” includes, but is not limited to, the use, by paraphrase or direct quotation, of the published or unpublished work of another person without full and clear acknowledgment.” The specific need is the APA standard writing style helps you to reduce bias languages and show you how to cite references correctly so that you can avoid charges of plagiarism.

Mechanics: Includes complete sentences, proper formatting of margins, spacing, indentation, etc.; typeface and use of emphasis are appropriate to task. Includes thorough documentation or citation as necessary; supports all claims within either text or appendix; properly identifies outside material. Possible Point Deductions 1- 10 pts.

Safe Assign review may include no more than two minor errors (90s’). Possible Deductions: 80s-1 pts.,70s-2pts., 60s-3pts. 50s-4 pts

Unformatted Attachment Preview

Running Header: CYBERSECURITY Cyber Security Student Name:Vinaykumar vure Institutional Affiliation:university of the cumberlands Course Name:DSRT 837 1 CYBERSECURITY 2 Cyber security: A Literature Review Cybersecurity is not a new issue but rather has developed through the years. Cybersecurity has become a challenge to both organisations and personal users. This literature will try to address the two concepts of cybersecurity; the first one being the causes of cybersecurity threats and the second one being the solutions and steps which have been taken to stop cybersecurity. Agrafiotis, et al. (2018) stated some of the approaches that can be used to identify the risks arising from cyber-attacks. The threat attacks have been at the core of cyber security risks. The researchers noted that many solutions have been suggested to counter these threats which in essence have failed in some situations. Some of the solutions suggested include making technological advancements of the processes and technologies which are made to prevent unauthorised and potential threats from accessing the digital systems and assets. They also include novel intrusion detection and prevention systems which are designed to identify emergent threats and help organisations limit any resulting harm. However, Bada et al. (2019) discussing the factors which lead to the success or failure of cyber security awareness, noted that cyber-attacks are as a result of perceived control and the experience of the personnel using the systems. This is the sense and perception that an individual has that can help in controlling the system. Therefore, an awareness and training program should be offered to the system users since it act as a vehicle for disseminating crucial information that all the users need. In addition, Anwar et al. (2017) noted that cyber security threats have also been related to gender difference. In their research, they evaluated the correlation of cyber-attacks in regard to gender, wherein female self-reported a lower level of computer skills, lower prior experience with cyber security, and lower cues on action scores as compared to men. The big CYBERSECURITY 3 difference was observed on surety self-efficacy. For instance, women are more concerned about risks whereas men are more willing to take risks and place significantly greater importance on perceived control and privacy risk when sharing information of the social media and networks. Moreover, Hadlington, (2017) researched on the link between personality trait and cybersecurity, and the attitude of users towards cybersecurity. In its findings their research noted that peoples attitude towards cybersecurity was negatively correlated to the frequency with which they engaged in risky cybersecurity behaviours. Also, other factors such as being impulsive and having risky cybersecurity behaviour, and being addicted to the internet are also some of the factors associated with cybersecurity threats. However, Dilek, et al. (2015) looked into the use of artificial intelligence techniques in combating Cybersecurity problems through reviewing different literatures done on the same topic. In their study, they mention some already existing applications that are used in cybersecurity such as the artificial neural network application which works to simulate structural and functional aspects of networks to prevent against cyber attacks,. In addition, the researchers looked at intelligent agent applications which are computer generated forces that communicate with each other to share information with each other to device appropriate responses to threats which might be posed. Cybersecurity is a compound issue. There exists a wide literature on the topic explaining how it is linked to many diverse maters which lead to the development of cyber security study and threats. This review of literature looked at mainly two concepts, causes of cybersecurity threats and some of the steps of solutions, which have been taken to cub the issue. The issue on cybersecurity still remains a contested matter and even in future. CYBERSECURITY 4 References Agrafiotis, I., Nurse, J., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 4(1). DOI: 10.1093/cybsec/tyy006 Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender differences and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443. Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cybersecurity awareness campaigns: Why do they fail to change behavior?. arXiv preprint arXiv:1901.02672. Dilek, S., Cakır, H., & Aydın, M. (2015). Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review. International Journal of Artificial Intelligence & Applications, 6(1), 21-39. doi: 10.5121/ijaia.2015.6102 Hadlington, L. (2017). Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviors. Heliyon, 3(7), e00346.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

CYBERSECURITY

1

Annotated Bibliography

Student Name: Vinaykumar vure
Institutional Affiliation: University of the Cumberlands
Course Name: DSRT 837

CYBERSECURITY

2
Cybersecurity: Annotated Bibliography

Agrafiotis, I., Nurse, J., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of
cyber-harms: Defining the impacts of cyber-attacks and understanding how they
propagate. Journal of Cybersecurity, 4(1). DOI: 10.1093/cybsec/tyy006
Agrafiotis et al., in their article, stated that cyber-attacks have increased due to the
advent of several organizations embracing digitalization in most of their system
functioning. This paper reflects on understanding cyber harm in different fields and
looks into how concepts like impact and risk related to cybersecurity. The researchers
looked at different types of harm and created a taxonomy of cyber harms that affect
different organizations. Besides, the organization's ability to monetize harm to allow
them to make better decisions concerning the approach to a specific risk has been
emphasized by the researchers.
This article explains the importance of using analytical tools to counter the
organization's cyber harms based on the text's taxonomy. The analytical method ensures
the identification of assets and draws the link with cyber harm. Further, the article
provides controls and measures that can be taken to control cyber harms. Mainly is by
considering every stakeholder's perception of cyber harm, which results in different
angles of examining the cyber harm. This article is relevant to my research since it
offers alternatives to controlling cyber threats in organizations.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender differences and
employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443
According to the authors, Cybersecurity attacks connected to human errors have been
regularly noticed in many organizations. Hence, there is a need for improved security

CYBERSECURITY

3

awareness measures within the firms to illuminate the employees on the possible
cybersecurity threats and breaches. The authors carried out a cross-sectional survey to
explore gender parity in cybersecurity issues. This was targeted to evaluate whether
there is an apparent difference regarding experience, self-respect, and skills among the
female and male workers.
In their discussion, the researchers indicated that men have a bit high self-reported
cybersecurity behavior than women. Also, there is no clarity...


Anonymous
Super useful! Studypool never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags