Sie sind auf Seite 1von 5

Kunce 1

Brody Kunce

English 102 19

Professor Newport

April 30, 2017

Annotated Bibliography

What is cybersecurity? Why is it such an important topic today? Why are many people

not informed on how to protect themselves from cybercrime and dont know how cybersecurity

works? Cybersecurity is all about protecting data through technology. This paper will discuss the

ins and outs of cybersecurity as well as using different ways to define it. Although people might

say that we should be grasping at the opportunity to use technology and the internet,

cybersecurity needs to be a topic businesses and citizens should focus on being educated in so

they can learn to limit their digital activity, prevent financial harm, and learn how to protect their

data in various ways.

Ashford, Warwick. "Cyber Crime: What Every Business Needs to Know." ComputerWeekly.

N.p., Mar. 2015. Web. 23 Apr. 2017. < >.

This article written by Warwick Ashford is an article where he writes about cybersecurity in

businesses and what lessens can be learned. The article is a neutral observation in which he

includes many facts and quotes. Warwick explains how cyber criminals collaborate and exploit

weaknesses, the executives struggling responses to cybercrime in businesses, supply chain

incentive, and more.

Kunce 2

Ashfords article is a credible source because of the vast number of quotes and facts he uses in a

professional manner. I can use this source in my research paper by bringing in a quote, facts

about how much money is lost in the global economy by cybercrime, and explain the lack of

concern about cyber threats by a survey.

Johnson, Vincent. "Cybersecurity, Identity Theft, and the Limits of Tort Liability." By Vincent

Johnson :: SSRN. N.p., 04 Jan. 2017. Web. 15 Apr. 2017.

The article by Vincent Johnson is an article in which he writes about minimizing harm and

liability when a hacker gets into a companys information. This scholarly source includes a

neutral observation from the author which discusses cyber-threats, tort law, and liability issues.

I think this scholarly article is going to be a great addition to my research paper by explaining

liability. The author seems credible in his writing, but he doesnt provide any factual evidence or

graphs. I can use information in this article about how liability is an issue in the cybersecurity

world along with also including something about what tort principles are.

Korwitts, Kayte. "Are Americans Concerned About Cyber Security? | SurveyMonkey

Blog."SurveyMonkey. N.p., 13 Nov. 2015. Web. 23 Apr. 2017.


This article by Kayte Korwitts is a blog which is written about Americans being concerned about

cybersecurity. This blog includes neutral observations with a lot of facts and surveys taken into

effect. 61% of people report that they feel extremely concerned about the nations cyber security

while there is less concern about corporate cyber security.

Kunce 3

I believe that this Kaytes blog will be very beneficial to my research paper because I can use

their survey to prove that citizens and businesses need to be more concerned and educated about

cyber security. The intended audience for this blog can be for anyone, but it can mostly be

intended for businesses and there the blog is very unbiased.

Lord, Nate. "What Is Cyber Security?" Digital Guardian. N.p., 26 Jan. 2017. Web. 20 Apr. 2017.

< >.

This article by Nate Lord is a blog on what cybersecurity is and how important it is to

government, military, and more. This blog is a neutral observation and some of the key

arguments are that for an effective cyber security, an organization needs to be effective and have

synergy through many types of information systems and that the United States top intelligence

officials are stating that digital spying is one of the top threats to national security.

Nates blog is extremely helpful for me because I use this source for one of my first paragraphs

to define cybersecurity which is what my entire research argument is all about. The intended

audience seems to be anyone in the IT industry and there seems to be no biased work in this


Martins, Flavio. "3 Quick Facts on Why a Strong Password Policy Matters." DigiCert Blog. N.p.,

18 Feb. 2015. Web. 21 Apr. 2017. <>.

The article by Flavio Martins is a neutral observation source to give information on strong

password policies. It is a blog that provides numerous facts dealing with how strong passwords

are and strong password construction guidelines and how changing a password with just one site

leaves users vulnerable to hackers.

Kunce 4

Flavios blog is very helpful for my research paper because I have a wide variety of facts about

passwords that I can use in my paper about passwords, which is very important in cybersecurity.

Flavio, who is the VP of Operations at DigiCert, is a credible source which shows no bias and is

helpful to every citizen.

McCusker, Rob. "Transnational Organised Cyber Crime: Distinguishing Threat from

Reality."SpringerLink. Kluwer Academic Publishers, 23 Mar. 2007. Web. 21 Apr. 2017.


Rob McCuskers article talks about cybercrime, the generic relationship between technology and

crime, the target environment, and more. This is a scholarly article that provides many

information on cybercrime with neutral observation. Rob discusses how when there are new

technological advances, a new crime decides to come along with it. A great fact he uses is that

80% of the top 50 reported threats in 2005 can be used for stealing data.

McCuskers scholarly article will be beneficial to my paper because I can discuss the target

environment in depth and how technology and crime relate to each other. The target audience for

this article is for the average citizen because Rob defines cybercrime first before he goes into

depth so the average citizen knows what he is talking about. His article is very unbiased making

it a great source to use in my research paper.

Romanosky, Sasha. "Examining the Costs and Causes of Cyber Incidents." Journal of

Cybersecurity. Oxford University Press, 08 Aug. 2016. Web. 20 Apr. 2017. < >.

This article by Sasha Romanosky is a scholarly article about examining the damage caused by

cyber-attacks. The article provides neutral observation about the types of cyber incidents
Kunce 5

including privacy violations, data breaches, cyberattacks, and more. Sasha also goes in depth by

explaining the legal actions that occur at a time of a cyberattack and how the actions are


Romansokys blog is going to be very beneficial to my research paper because I can grab some

of the many graphs in this article to place into my paper and explain the type of cyber incidents.

The attended audience is for anyone and it shows no bias at all.

Wykes, Maggie. "Constructing Crime: Culture, Stalking, Celebrity and Cyber." Constructing

Crime: Culture, Stalking, Celebrity and Cyber - Maggie Wykes, 2007. N.p., n.d. Web. 27

Apr. 2017. <>.

This article by Maggie Wykes is a peer reviewed scholarly source about how stalking, celebrity,

and cyber stalking all connect with each other. This scholarly source provides neutral observation

about the boundaries of stalking and harassment. Maggie goes in depth on defining stalking as a

crime as well as the limits.

Wykess article will be a great aspect to my paper because I can explain how cybercrime doesnt

necessarily have to do with stealing data, but it can lead to harassment. There is no specific

intended audience because the intended audience is for everyone and shows no biased point of