Annotated Bibliography
Annotated Bibliography
Brody Kunce
English 102 19
Professor Newport
Annotated Bibliography
What is cybersecurity? Why is it such an important topic today? Why are many people
not informed on how to protect themselves from cybercrime and dont know how cybersecurity
works? Cybersecurity is all about protecting data through technology. This paper will discuss the
ins and outs of cybersecurity as well as using different ways to define it. Although people might
say that we should be grasping at the opportunity to use technology and the internet,
cybersecurity needs to be a topic businesses and citizens should focus on being educated in so
they can learn to limit their digital activity, prevent financial harm, and learn how to protect their
Ashford, Warwick. "Cyber Crime: What Every Business Needs to Know." ComputerWeekly.
This article written by Warwick Ashford is an article where he writes about cybersecurity in
businesses and what lessens can be learned. The article is a neutral observation in which he
includes many facts and quotes. Warwick explains how cyber criminals collaborate and exploit
Ashfords article is a credible source because of the vast number of quotes and facts he uses in a
professional manner. I can use this source in my research paper by bringing in a quote, facts
about how much money is lost in the global economy by cybercrime, and explain the lack of
Johnson, Vincent. "Cybersecurity, Identity Theft, and the Limits of Tort Liability." By Vincent
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2891894
The article by Vincent Johnson is an article in which he writes about minimizing harm and
liability when a hacker gets into a companys information. This scholarly source includes a
neutral observation from the author which discusses cyber-threats, tort law, and liability issues.
I think this scholarly article is going to be a great addition to my research paper by explaining
liability. The author seems credible in his writing, but he doesnt provide any factual evidence or
graphs. I can use information in this article about how liability is an issue in the cybersecurity
world along with also including something about what tort principles are.
<http://svy.mk/2pWuogX>.
This article by Kayte Korwitts is a blog which is written about Americans being concerned about
cybersecurity. This blog includes neutral observations with a lot of facts and surveys taken into
effect. 61% of people report that they feel extremely concerned about the nations cyber security
I believe that this Kaytes blog will be very beneficial to my research paper because I can use
their survey to prove that citizens and businesses need to be more concerned and educated about
cyber security. The intended audience for this blog can be for anyone, but it can mostly be
Lord, Nate. "What Is Cyber Security?" Digital Guardian. N.p., 26 Jan. 2017. Web. 20 Apr. 2017.
This article by Nate Lord is a blog on what cybersecurity is and how important it is to
government, military, and more. This blog is a neutral observation and some of the key
arguments are that for an effective cyber security, an organization needs to be effective and have
synergy through many types of information systems and that the United States top intelligence
officials are stating that digital spying is one of the top threats to national security.
Nates blog is extremely helpful for me because I use this source for one of my first paragraphs
to define cybersecurity which is what my entire research argument is all about. The intended
audience seems to be anyone in the IT industry and there seems to be no biased work in this
source.
Martins, Flavio. "3 Quick Facts on Why a Strong Password Policy Matters." DigiCert Blog. N.p.,
The article by Flavio Martins is a neutral observation source to give information on strong
password policies. It is a blog that provides numerous facts dealing with how strong passwords
are and strong password construction guidelines and how changing a password with just one site
Flavios blog is very helpful for my research paper because I have a wide variety of facts about
passwords that I can use in my paper about passwords, which is very important in cybersecurity.
Flavio, who is the VP of Operations at DigiCert, is a credible source which shows no bias and is
< http://bit.ly/2ph5O9K>.
Rob McCuskers article talks about cybercrime, the generic relationship between technology and
crime, the target environment, and more. This is a scholarly article that provides many
information on cybercrime with neutral observation. Rob discusses how when there are new
technological advances, a new crime decides to come along with it. A great fact he uses is that
80% of the top 50 reported threats in 2005 can be used for stealing data.
McCuskers scholarly article will be beneficial to my paper because I can discuss the target
environment in depth and how technology and crime relate to each other. The target audience for
this article is for the average citizen because Rob defines cybercrime first before he goes into
depth so the average citizen knows what he is talking about. His article is very unbiased making
Romanosky, Sasha. "Examining the Costs and Causes of Cyber Incidents." Journal of
Cybersecurity. Oxford University Press, 08 Aug. 2016. Web. 20 Apr. 2017. <
http://bit.ly/2qKE7GQ >.
This article by Sasha Romanosky is a scholarly article about examining the damage caused by
cyber-attacks. The article provides neutral observation about the types of cyber incidents
Kunce 5
including privacy violations, data breaches, cyberattacks, and more. Sasha also goes in depth by
explaining the legal actions that occur at a time of a cyberattack and how the actions are
distributed.
Romansokys blog is going to be very beneficial to my research paper because I can grab some
of the many graphs in this article to place into my paper and explain the type of cyber incidents.
Wykes, Maggie. "Constructing Crime: Culture, Stalking, Celebrity and Cyber." Constructing
Crime: Culture, Stalking, Celebrity and Cyber - Maggie Wykes, 2007. N.p., n.d. Web. 27
This article by Maggie Wykes is a peer reviewed scholarly source about how stalking, celebrity,
and cyber stalking all connect with each other. This scholarly source provides neutral observation
about the boundaries of stalking and harassment. Maggie goes in depth on defining stalking as a
Wykess article will be a great aspect to my paper because I can explain how cybercrime doesnt
necessarily have to do with stealing data, but it can lead to harassment. There is no specific
intended audience because the intended audience is for everyone and shows no biased point of
view.