Annotated Bibliography
Alexander Trevino
6/23/2024
Firat, I., & Khraisat, A. (2021). Cyber risk and cybersecurity: A systematic review of data
availability. The Geneva Papers on Risk and Insurance – Issues and Practice. Retrieved from
https://link.springer.com/article/10.1057/s41288-021-00229-4
Annotation: This article reviews cybersecurity datasets and their importance in
preventing cyberattacks. The authors emphasize the need for updated data to maintain effective
cybersecurity measures and protect privacy. It highlights the role of data in cybersecurity and its
broader impact on privacy.
Ahmed, I., Bashir, A. K., & Shaukat, K. (2023). A critical cybersecurity analysis and
future research directions for the Internet of Things: A comprehensive review. Sensors.
Retrieved from https://www.mdpi.com/1424-8220/23/8/4117
Annotation: This review examines security challenges in the Internet of Things (IoT). It
discusses the vulnerabilities of interconnected devices and the need for a comprehensive
approach to IoT security. The article details IoT security issues and sets benchmarks for
assessing security solutions.
Rawindaran, et al. (2022). Cybersecurity, data privacy and blockchain: A review. SN
Computer Science. Retrieved from https://link.springer.com/article/10.1007/s42979-022-01165-7
Annotation: This article explores the intersection of cybersecurity, data privacy, and
blockchain technology. It addresses human factors, legal challenges, and technical aspects that
impact data security and privacy. The article illustrates how blockchain can enhance data privacy
while addressing cybersecurity challenges.
Ahmed, I. (2023). A systematic review of multi perspectives on human cybersecurity.
ScienceDirect. Retrieved from
https://www.sciencedirect.com/science/article/pii/S259029112300008X
Annotation: This review focuses on human factors in cybersecurity, discussing how
human behavior and perceptions influence security and privacy measures. The study highlights
the need to understand human elements to develop effective cybersecurity strategies that respect
privacy concerns.
Leave a Reply