Annotated Bibliography

Creese, S., Dutton, W. H., & Esteve-González, P. (2021). The social and cultural shaping of

Creese et al. (2021) discuss the ways in which various countries and geographic locations engage in the capacity enhancement of cybersecurity, with a special focus on social and cultural aspects. To achieve the objectives of the work, the authors provide a comparative analysis of the identified differences in the strategies and activities for the countries concerned, emphasizing the importance of the context at the local level when implementing cybersecurity measures. They explain that social and cultural aspects are essential to consider when developing an efficient cybersecurity capacity. The article is a systematic comparative study of cybersecurity capacity building and will be useful to comprehend the state of cybersecurity around the world. This work is most relevant to the study area due to the focus on the need to have context-aware cybersecurity policies and how these policies influence social trust. Through the explanation of how cultural and social aspects affect cybersecurity measures, the article provides valuable information to the readers about how those factors impact the users’ confidence and trust in the digital systems.

Wang, Z., Liu, H., Li, T., Zhou, L., & Zhou, M. (2023). The Impact of Internet Use on Citizens’ Trust in Government: The Mediating Role of Sense of Security. Systems, 11(1), 47. https://doi.org/10.3390/systems110100473

Wang et al. (2023) explore the relationship between internet use and the level of trust that citizens have in their government, with the mediating variable being security. The authors posit that while the internet offers people a tool for information sharing and taking part in public matters, the perceived security levels of online activities shape the citizen’s confidence in governmental institutions. In the study, a cross-sectional survey design is employed to establish that internet security has a positive relationship with trust in governments. The research is important in investigating the relationship between digital security and institution trust. Wang et al. (2023) apply sound techniques to analyze to what extent perceived security affects trust in government and use strong arguments to demonstrate the role of cybersecurity. These insights are directly applicable to the study of trust and distrust in the context of cybersecurity, as they underscore the significance of implementing security measures with regard to the development and sustainability of trust both in online environments and in governmental organizations. The article offers a broader perspective for understanding the role of security in building trust, which is crucial in appraising the social traces of cybersecurity policies on trust in digital platforms.

Lanz, Z. (2022). Cybersecurity Risk in U.S. Critical Infrastructure: An Analysis of Publicly Available U.S. Government Alerts and Advisories. International Journal of Cybersecurity Intelligence and Cybercrime, 5(1), 43–70. https://doi.org/10.52306/2578-3289.11214

Lanz (2022) drew on publicly available alerts and advisories from U.S. government agencies to explore cybersecurity threats in the critical infrastructure of the United States. The study classifies and analyzes the kinds of risks and threats in cyberspace, the weaknesses that can be exploited, and the possible consequences in strategic areas including energy, healthcare, and transportation systems. Lanz (2022) also points out how these advisories are key resources for both the public and private sectors regarding understanding and managing cybersecurity threats. A procedural examination of threats provided by government alerts and advisories provides tangible findings about the kinds and volumes of threats confronting critical sectors. The subject of the article is analyzed comprehensively, with references to numerous sources that indicate the author’s efforts to provide a detailed analysis of the topic. The work is most related to the topic of research as it emphasizes the role of proper cybersecurity policies in the safeguarding of the infrastructure and, therefore, the trust of the public. The evaluation of government alerts offers a view of the threat and the measures that are needed to overcome it, which is vital in understanding the role of cybersecurity policies in building social capital in information systems.

Choi, J., Lee, S. (Zech), & Dittmann, L. (2022). The Relationship between Parenting Practices and Cyberbullying Perpetration: The Mediating Role of Moral Beliefs. International Journal of Cybersecurity Intelligence & Cybercrime, 5(1), 4–22. https://doi.org/10.52306/2578-3289.1119

Choi et al. (2022) examine parenting practices and cyberbullying behaviors of adolescents with a focus on the moderation effect of moral beliefs. The study also uses a survey approach to assess the effect of parenting practices (authoritative, authoritarian,5and permissive) on children’s cyberbullying behavior. The authors discover that parenting practices are a major factor that determines moral beliefs, which in turn determine cyberbullying behavior. The incorporation of quantitative data makes the results more believable, while the identification of moral beliefs as a moderator provides an insightful perspective on the problem. The research is relevant to the discussion of cybersecurity and social sciences because it identifies human elements that affect cyber actions. It provides knowledge about how different parenting practices are connected to cyberbullying and what might be done to improve the safety and credibility of internet technologies. Choi et al. (2022) add to the ongoing discussion of how social and family related factors influence the behavior of users online which is beneficial for creating effective and coherent cybersecurity strategies that would lead to a creation of a safer environment on the internet.6

References

Choi, J., Lee, S. (Zech), & Dittmann, L. (2022). The Relationship between Parenting Practices and Cyberbullying Perpetration: The Mediating Role of Moral Beliefs. International Journal of Cybersecurity Intelligence & Cybercrime, 5(1), 4–22. https://doi.org/10.52306/2578-3289.1119

Creese, S., Dutton, W. H., & Esteve-González, P. (2021). The social and cultural shaping of cybersecurity capacity building/; A comparative study of nations and regions. Personal Ubiquitous Computing, 25(5), 941-955. https://doi.org/10.1007/s00779-021-01569-6

The social and cultural shaping of

Lanz, Z. (2022). Cybersecurity Risk in U.S. Critical Infrastructure: An Analysis of Publicly Available U.S. Government Alerts and Advisories. International Journal of Cybersecurity Intelligence and Cybercrime, 5(1), 43–70. https://doi.org/10.52306/2578-3289.1121

Wang, Z., Liu, H., Li, T., Zhou, L., & Zhou, M. (2023). The Impact of Internet Use on Citizens’ Trust in Government: The Mediating Role of Sense of Security. Systems, 11(1), 47. https://doi.org/10.3390/systems11010047

Published by: gbafu001

Welcome to my ePortfolio! My name is Gloria Kandy Bafunye, and I'm a senior at ODU, focusing on cybersecurity and information technology. Currently, I'm deeply immersed in coursework that delves into the intricacies of securing digital infrastructures and leveraging technology for organizational efficiency. With a passion for healthcare and a strong background in IT, my goal is to transition into a role where I can merge these two worlds seamlessly. Specifically, I aspire to become an IT project manager or IT director within a hospital setting. My experience working within a hospital environment has given me invaluable insights into the software and systems utilized for patient care and administrative functions. I'm eager to leverage this knowledge to drive innovation and streamline processes that ultimately enhance patient outcomes. In addition to my academic pursuits, I actively seek opportunities to expand my skill set and stay current with industry trends. I believe in the power of continuous learning and strive to remain adaptable in an ever-evolving technological landscape. Thank you for visiting my ePortfolio. I invite you to explore further and learn more about my journey and accomplishments. Let's connect and collaborate on ways to leverage technology for the betterment of healthcare delivery.

Categories Annotated Bibliography, CYSE200S, CYSE200TLeave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *