Sunday, February 28, 2016

Week 7 blog post for topic - How has increased adoption of the Internet increased cyber attacks?

Week 7 How has increased adoption of the Internet increased cyber attacks?



1 What new sources did you include in your annotated bibliography and why?

I included two new pieces.  I kept my search primarily to academic papers.  My topic does not have wide spread coverage at the level I need outside of academia.

2 What was the search path you took to locate them?

My search started with the Brandman library.  I reviewed the references in the papers I had already found to generate a list of potential candidates.  Then instead of search for topics I searched by tittle.  After looking through a dozen or so I selected 2 to include in the annotated bibliography.

3 Why do you feel these sources are credible (remember the CRAAP Test)?

Both new additions were released within the last 10 years, appeared in respectable journals, included detailed reference list that supported their data.  Additionally, INFORMATION SECURITY THREATS AND PRACTICES IN SMALL BUSINESSES also included a detailed one on one interviews with small business to generate their data.

4 What aspect(s) of your research question do they address?

Both papers cover additional parameters that are contributing to increased levels of attacks.  One covers the difficulties with normal deterrents preventing cyber attacks.  The second covers computers used by small business, which tend to be configured and secured in a fairly similar manner to home users.  The end users also have similar levels of security awareness, both of which can contribute to increased levels of attack.

5 Are there still aspects of your research question that remain unanswered?
What are some aspects of your research that you feel would be most interesting to a wide audience?

For the most part I have what I need to write a decent paper.  Once I start to write I may be able to take advantage of additional stats around specific internet service growth instead of generic internet usage growth.  I think the information on attack types, cause of attack and attack outcomes will be very interesting to a broad audience.

Saturday, February 20, 2016

Week 6 Blog on items such as academic integrity

While I deal with Intellectual Property on a daily basis, what I deal with is around product and brand related issues rather than written concepts.  So some of this was interesting in the differences between how I think about securing software code vs more intellectual endeavors.

What did you learn about plagiarism? 

This is a fairly straight forward.  The new items are around the citations.  In the past when I have used content I have used quotes and footnotes which I thought were clear. Without the proper citations a black and white definition would consider this to be plagiarism.

What is your definition of academic integrity?

Some of these teams can have very explicit definitions, but when you really get down to it a person should know if they are trying to get away with something.  If you are copying someone else’s paper, then you are avoiding doing your own.  Students should do the work, do their own work, and stand behind their work.  This to me shows integrity.

What is your definition of Intellectual Property?

Unlike physical property, there may not be a physical object with Intellectual property.  To me this is any idea, design, or written piece which brings value to someone either by itself or by realizing that idea in a physical object.  For example a Story could be told verbally or could be printed in a book to be made physical.  A consumer would own the book but the author owns the Intellectual property which could be used to write more books.

 What did you learn about Creative Commons?

Only that it works in conjunction with standard copy write to allow content owners to share their content with the public under different terms.

 What are open access journals?

These are peer reviewed papers that are available to readers without having to pay a fee or join a service legally.  They are available via a number of front end search engines on the internet.  Connecting to one of those search engines is the only requirement for accessing the journals.

Saturday, February 13, 2016

Week 5 Blog Post

How has increased adoption of the Internet increased cyberattacks?

Kim, W., Jeong, O., Kim, C., & So, J. (2011). The dark side of the Internet: Attacks, costs and responses. Information Systems, 36(3), 675-705. doi:10.1016/j.is.2010.11.003.

This weeks paper looks at the dark side of the Internet and the damages that result including items such as Loss of money, Defamation, Invasion of Privacy, Physical harm, Loss of time, Mental anguish or psychological damage, and increase in crime.  The introduction starts with “The Good the Bad and the Ugly” of the internet.  Most of this is glossing over the good to focus on setting up the bad and the ugly portions.  The paper then goes on to supply a taxonomy of the negative aspects along with a summary of the damages caused.  This taxonomy covers a broad set of the negative aspects which will be useful in my overall research paper.  From the taxonomy the paper moves on to the causes of the Internet’s dark side.  This section was a bit weaker than the others.  The focus is primarily on psychological driven aspects akin to bullying.  It covers very little of the ease of exploitation (e.g. stealing small amounts from very large volumes of users) Much has been done to try and protect against the dark side both technical and non technical.  This is covered in the penultimate section before moving to a brief prognosis of the future which concludes the paper.  Overall I believe the paper will be useful in adding background to my greater research paper.


What new ideas, arguments, and/or phenomena have you been introduced to?

Most of my research has been focused on the facts and figures of Internet usage and the growth of cyber attacks.  This paper focused quite a bit on the psychological aspects of Internet usage.  This would add a good section to the overall research paper.

From what you’ve discovered in these research articles, are you reconsidering the focus of your research question?

I would likely have not added a section to the overall paper had I not found this piece.

Were other studies or resources mentioned in the literature review and references sections that you want to look into? 

This paper more than any of the others had a very long list of reference materials.  In reviewing this for the CRAAP review I did find and examine a few.  I would very likely use some of those references in a longer paper.

How do you feel your research skills are developing so far?

I think the greatest increase I have experienced is having access to review academic papers.  I am using many of the same research skills I use in my day to day life and career.  I am however applying those skills to catalogs I don’t normally have access to.  Additionally, with the number of catalogs available I am using more of the filter components than I would normally.  With a standard Google search I often just tweak my terms and limit the time to the last X days.

Sunday, February 7, 2016

Looking for Peer Review Content for Research Topic

How has increased adoption of the Internet increased cyberattacks?

Cong, G., Jianfeng, M., Jingjing, G., Liang, Z., & Xindi, M. (2013). The Inside of Information Security Industry in the Perspective of Hackers and Economics. Journal Of Engineering Science & Technology Review, 6(3), 146-152.

With the advent of many markets a criminal element will move in to exploit the growth.  The cybersecurity realm is no different.  The paper outlines the hacker economy around the collection and commercialization of user information.  The paper first covers the various ways hackers or cyber attackers have come up with to obtain the user information.  From there the paper covers how the information is used to attain money, the structure of the hacker economy and finishes with a discussion of possible countermeasures.

The overall paper offers good information, but focuses vary narrowly on the hacker economy built up around the exploitation of user information economy.  There is no coverage on the selling of exploit tools, zombie networks, 0day vulnerabilities, etc.  So this will add information on the consumer impact during the period of internet growth but I will need additional content for a fuller picture.  This paper covered a number of concepts that I already understood, however the paper was a source of key reference statistics I have not been able to find in other areas.

What knowledge did you gain about your topic as a result of the research you’ve conducted so far?

The use case executed with this paper has been the first statistics I have been able to find that covers the impact of both technology and education have on users being exploited.

What new search strategies did you use to locate your sources? Be specific and refer to the notes you took.

I don’t normally search specifically for academic papers.  So targeting information contained in them was a different approach.  Typically, my searches are targeted and locating content in the body of the content.  I found that searching more for titles was a better way to find the content I was looking for.

What specific aspect of your topic do you want to research further

This paper focused on personal information leakage.  I would like to look at other impacts such as the rise and fall of Denial of Service attacks.