{"id":48,"date":"2024-08-05T00:57:59","date_gmt":"2024-08-05T00:57:59","guid":{"rendered":"https:\/\/student.wp.odu.edu\/atrev004\/?p=48"},"modified":"2024-08-05T00:57:59","modified_gmt":"2024-08-05T00:57:59","slug":"annotated-bibliography","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/atrev004\/2024\/08\/05\/annotated-bibliography\/","title":{"rendered":"Annotated Bibliography"},"content":{"rendered":"\n<p>Annotated Bibliography<br>Alexander Trevino<br>6\/23\/2024<br>Firat, I., &amp; Khraisat, A. (2021). Cyber risk and cybersecurity: A systematic review of data<br>availability. The Geneva Papers on Risk and Insurance &#8211; Issues and Practice. Retrieved from<br>https:\/\/link.springer.com\/article\/10.1057\/s41288-021-00229-4<br>Annotation: This article reviews cybersecurity datasets and their importance in<br>preventing cyberattacks. The authors emphasize the need for updated data to maintain effective<br>cybersecurity measures and protect privacy. It highlights the role of data in cybersecurity and its<br>broader impact on privacy.<br>Ahmed, I., Bashir, A. K., &amp; Shaukat, K. (2023). A critical cybersecurity analysis and<br>future research directions for the Internet of Things: A comprehensive review. Sensors.<br>Retrieved from https:\/\/www.mdpi.com\/1424-8220\/23\/8\/4117<br>Annotation: This review examines security challenges in the Internet of Things (IoT). It<br>discusses the vulnerabilities of interconnected devices and the need for a comprehensive<br>approach to IoT security. The article details IoT security issues and sets benchmarks for<br>assessing security solutions.<br>Rawindaran, et al. (2022). Cybersecurity, data privacy and blockchain: A review. SN<br>Computer Science. Retrieved from https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01165-7<br>Annotation: This article explores the intersection of cybersecurity, data privacy, and<br>blockchain technology. It addresses human factors, legal challenges, and technical aspects that<br>impact data security and privacy. The article illustrates how blockchain can enhance data privacy<br>while addressing cybersecurity challenges.<br>Ahmed, I. (2023). A systematic review of multi perspectives on human cybersecurity.<br>ScienceDirect. Retrieved from<br>https:\/\/www.sciencedirect.com\/science\/article\/pii\/S259029112300008X<br>Annotation: This review focuses on human factors in cybersecurity, discussing how<br>human behavior and perceptions influence security and privacy measures. The study highlights<br>the need to understand human elements to develop effective cybersecurity strategies that respect<br>privacy concerns.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Annotated BibliographyAlexander Trevino6\/23\/2024Firat, I., &amp; Khraisat, A. (2021). Cyber risk and cybersecurity: A systematic review of dataavailability. The Geneva Papers on Risk and Insurance &#8211; Issues and Practice. Retrieved fromhttps:\/\/link.springer.com\/article\/10.1057\/s41288-021-00229-4Annotation: This article reviews cybersecurity datasets and their importance inpreventing cyberattacks&#8230;. <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/atrev004\/2024\/08\/05\/annotated-bibliography\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26774,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/48"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/users\/26774"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/comments?post=48"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/48\/revisions"}],"predecessor-version":[{"id":49,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/48\/revisions\/49"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/media?parent=48"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/categories?post=48"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/tags?post=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}