{"id":325,"date":"2024-08-05T01:23:27","date_gmt":"2024-08-05T01:23:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ktomas\/?p=325"},"modified":"2024-08-05T01:23:27","modified_gmt":"2024-08-05T01:23:27","slug":"annotated-bibliography","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/annotated-bibliography\/","title":{"rendered":"Annotated Bibliography"},"content":{"rendered":"\n<p>Mitigating Ransomware Risks in Manufacturing and the<br>Supply Chain: A Comprehensive Security Framework<br>Aljoghaiman, A., &amp; Sundram, P. K., Veera. (2023). Mitigating Ransomware Risks in<br>Manufacturing and the Supply Chain: A Comprehensive Security Framework.<br>International Journal of Cyber Criminology, 17(2).<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/214\/81<br>This article is important because it shows the cause and effect of what happens when employees<br>learn about how to migrate ransomware. Having this article in my paper about how it is<br>important for employees to learn about the type of ransomware that a company could be affected<br>by. This also shows the effects in statics and data about how teaching is good for employees to<br>avoid ransomware.<br>Implementing Effective Cyber Security Training for End Users of Computer Networks<br>Beyer, R., &amp; Brummel, B. (2015). Implementing Effective Cyber Security Training for<br>End Users of Computer Networks. In (pp. 19).<br>https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&amp;type=pdf&amp;doi=73746f3a5e2808082c4b4393<br>126f9566c826dc69<br>The author of this journal has a Masters in Industrial and organizational psychology and was the<br>vice president of human resources for NationsBank and Bradley Brummel who has his Ph.D in<br>industrial and organizational psychology. This study was also funded by the Air Force Office of<br>Scientific Research. This article is older but can be expanded because of the way it is formatted<br>and layed. It is good with my paper because it shows how to train cybersecurity with different<br>types of teams inside of a company like human resources and psychology.<br>Does Explicit Information Security Policy Affect Employees&#8217; Cyber Security Behavior? A Pilot<br>Study<br>L. Li, W. He, L. Xu, A. Ivan, M. Anwar and X. Yuan, &#8220;Does Explicit Information Security<br>Policy Affect Employees&#8217; Cyber Security Behavior? A Pilot Study,&#8221; 2014 Enterprise<br>Systems Conference, Shanghai, China, 2014, pp. 169-173, doi: 10.1109\/ES.2014.66<br>The company that published this journal is the IEEE which is a very credible organization within<br>the information technology field. This article explains how to train employees with cyber risk<br>with more awareness training and defending the company on the network side. There is data<br>within this article that shows when the employees are trained to be aware of the cybersecurity it<br>shows that they are more comfortable with reporting incidents , as well as not having so many.<\/p>\n\n\n\n<p>Handling Insider Threat Through Supervised Machine Learning Techniques<br>Janjua , F., Masood, A., Abbas , H., &amp; Rashid, I. (2020). Handling Insider Threat<br>Through Supervised Machine Learning Techniques. Procedia Computer Science,<br>177, 7.<br>This article is relevant because it was written in 2020 and it was published in the Procedia<br>Computer Science Journal which gives it more credibility within this paper. Insider Threat is a<br>pivotal in understanding how to train users in being aware about how to mitigate that. This<br>article helps me understand how to train users that are not familiar with information technology<br>and cyber security.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mitigating Ransomware Risks in Manufacturing and theSupply Chain: A Comprehensive Security FrameworkAljoghaiman, A., &amp; Sundram, P. K., Veera. (2023). Mitigating Ransomware Risks inManufacturing and the Supply Chain: A Comprehensive Security Framework.International Journal of Cyber Criminology, 17(2).https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/214\/81This article is important because it shows the cause and effect of what happens when employeeslearn about how to migrate&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ktomas\/2024\/08\/05\/annotated-bibliography\/\">Read More<\/a><\/div>\n","protected":false},"author":26185,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/325"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/users\/26185"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/325\/revisions"}],"predecessor-version":[{"id":326,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/posts\/325\/revisions\/326"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/categories?post=325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ktomas\/wp-json\/wp\/v2\/tags?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}