{"id":307,"date":"2024-08-04T19:29:44","date_gmt":"2024-08-04T19:29:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/?p=307"},"modified":"2024-10-11T20:53:09","modified_gmt":"2024-10-11T20:53:09","slug":"annotated-bibliography","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/2024\/08\/04\/annotated-bibliography\/","title":{"rendered":"Annotated Bibliography"},"content":{"rendered":"\n<p>Creese, S., Dutton, W. H., &amp; Esteve-Gonz\u00e1lez, P. (2021). The social and cultural shaping of<\/p>\n\n\n\n<p>Creese et al. (2021) discuss the ways in which various countries and geographic locations engage in the capacity enhancement of cybersecurity, with a special focus on social and cultural aspects. To achieve the objectives of the work, the authors provide a comparative analysis of the identified differences in the strategies and activities for the countries concerned, emphasizing the importance of the context at the local level when implementing cybersecurity measures. They explain that social and cultural aspects are essential to consider when developing an efficient cybersecurity capacity. The article is a systematic comparative study of cybersecurity capacity building and will be useful to comprehend the state of cybersecurity around the world. This work is most relevant to the study area due to the focus on the need to have context-aware cybersecurity policies and how these policies influence social trust. Through the explanation of how cultural and social aspects affect cybersecurity measures, the article provides valuable information to the readers about how those factors impact the users\u2019 confidence and trust in the digital systems.<\/p>\n\n\n\n<p>Wang, Z., Liu, H., Li, T., Zhou, L., &amp; Zhou, M. (2023). The Impact of Internet Use on Citizens\u2019 Trust in Government: The Mediating Role of Sense of Security. Systems, 11(1), 47. https:\/\/doi.org\/10.3390\/systems110100473<\/p>\n\n\n\n<p>Wang et al. (2023) explore the relationship between internet use and the level of trust that citizens have in their government, with the mediating variable being security. The authors posit that while the internet offers people a tool for information sharing and taking part in public matters, the perceived security levels of online activities shape the citizen\u2019s confidence in governmental institutions. In the study, a cross-sectional survey design is employed to establish that internet security has a positive relationship with trust in governments. The research is important in investigating the relationship between digital security and institution trust. Wang et al. (2023) apply sound techniques to analyze to what extent perceived security affects trust in government and use strong arguments to demonstrate the role of cybersecurity. These insights are directly applicable to the study of trust and distrust in the context of cybersecurity, as they underscore the significance of implementing security measures with regard to the development and sustainability of trust both in online environments and in governmental organizations. The article offers a broader perspective for understanding the role of security in building trust, which is crucial in appraising the social traces of cybersecurity policies on trust in digital platforms.<\/p>\n\n\n\n<p>Lanz, Z. (2022). Cybersecurity Risk in U.S. Critical Infrastructure: An Analysis of Publicly Available U.S. Government Alerts and Advisories. International Journal of Cybersecurity Intelligence and Cybercrime, 5(1), 43\u201370. https:\/\/doi.org\/10.52306\/2578-3289.11214<\/p>\n\n\n\n<p>Lanz (2022) drew on publicly available alerts and advisories from U.S. government agencies to explore cybersecurity threats in the critical infrastructure of the United States. The study classifies and analyzes the kinds of risks and threats in cyberspace, the weaknesses that can be exploited, and the possible consequences in strategic areas including energy, healthcare, and transportation systems. Lanz (2022) also points out how these advisories are key resources for both the public and private sectors regarding understanding and managing cybersecurity threats. A procedural examination of threats provided by government alerts and advisories provides tangible findings about the kinds and volumes of threats confronting critical sectors. The subject of the article is analyzed comprehensively, with references to numerous sources that indicate the author\u2019s efforts to provide a detailed analysis of the topic. The work is most related to the topic of research as it emphasizes the role of proper cybersecurity policies in the safeguarding of the infrastructure and, therefore, the trust of the public. The evaluation of government alerts offers a view of the threat and the measures that are needed to overcome it, which is vital in understanding the role of cybersecurity policies in building social capital in information systems.<\/p>\n\n\n\n<p>Choi, J., Lee, S. (Zech), &amp; Dittmann, L. (2022). The Relationship between Parenting Practices and Cyberbullying Perpetration: The Mediating Role of Moral Beliefs. International Journal of Cybersecurity Intelligence &amp; Cybercrime, 5(1), 4\u201322. https:\/\/doi.org\/10.52306\/2578-3289.1119<\/p>\n\n\n\n<p>Choi et al. (2022) examine parenting practices and cyberbullying behaviors of adolescents with a focus on the moderation effect of moral beliefs. The study also uses a survey approach to assess the effect of parenting practices (authoritative, authoritarian,5and permissive) on children\u2019s cyberbullying behavior. The authors discover that parenting practices are a major factor that determines moral beliefs, which in turn determine cyberbullying behavior. The incorporation of quantitative data makes the results more believable, while the identification of moral beliefs as a moderator provides an insightful perspective on the problem. The research is relevant to the discussion of cybersecurity and social sciences because it identifies human elements that affect cyber actions. It provides knowledge about how different parenting practices are connected to cyberbullying and what might be done to improve the safety and credibility of internet technologies. Choi et al. (2022) add to the ongoing discussion of how social and family related factors influence the behavior of users online which is beneficial for creating effective and coherent cybersecurity strategies that would lead to a creation of a safer environment on the internet.6<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Choi, J., Lee, S. (Zech), &amp; Dittmann, L. (2022). The Relationship between Parenting Practices and Cyberbullying Perpetration: The Mediating Role of Moral Beliefs. International Journal of Cybersecurity Intelligence &amp; Cybercrime, 5(1), 4\u201322. https:\/\/doi.org\/10.52306\/2578-3289.1119<\/p>\n\n\n\n<p>Creese, S., Dutton, W. H., &amp; Esteve-Gonz\u00e1lez, P. (2021). The social and cultural shaping of cybersecurity capacity building\/; A comparative study of nations and regions. Personal Ubiquitous Computing, 25(5), 941-955. https:\/\/doi.org\/10.1007\/s00779-021-01569-6<\/p>\n\n\n\n<p>The social and cultural shaping of<\/p>\n\n\n\n<p>Lanz, Z. (2022). Cybersecurity Risk in U.S. Critical Infrastructure: An Analysis of Publicly Available U.S. Government Alerts and Advisories. International Journal of Cybersecurity Intelligence and Cybercrime, 5(1), 43\u201370. https:\/\/doi.org\/10.52306\/2578-3289.1121<\/p>\n\n\n\n<p>Wang, Z., Liu, H., Li, T., Zhou, L., &amp; Zhou, M. (2023). The Impact of Internet Use on Citizens\u2019 Trust in Government: The Mediating Role of Sense of Security. Systems, 11(1), 47. https:\/\/doi.org\/10.3390\/systems11010047<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Creese, S., Dutton, W. H., &amp; Esteve-Gonz\u00e1lez, P. (2021). The social and cultural shaping of Creese et al. (2021) discuss the ways in which various countries and geographic locations engage in the capacity enhancement of cybersecurity, with a special focus on social and cultural aspects. To achieve the objectives of the work, the authors provide &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/2024\/08\/04\/annotated-bibliography\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Annotated Bibliography<\/span><\/a><\/p>\n","protected":false},"author":29128,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":8},"categories":[10,8,6],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/wp-json\/wp\/v2\/posts\/307"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/wp-json\/wp\/v2\/users\/29128"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/wp-json\/wp\/v2\/posts\/307\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/wp-json\/wp\/v2\/posts\/307\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/wp-json\/wp\/v2\/media?parent=307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/wp-json\/wp\/v2\/categories?post=307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyberguardian-eportfolio\/wp-json\/wp\/v2\/tags?post=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}