You are on page 1of 11

5/28/2019 Final Annotated Source List - Google Docs

Amrit Magesh
30 January 2018
G/T Independent Research

Annotated Source List

Cimpanu, Caitlin. "US Lawmakers Introduce Bill to Fight Cybersecurity Workforce Shortage."
ZDNet, 17 Sept. 2018, www.zdnet.com/article/us-lawmakers-introduce-bill-to-
fight-cybersecurity-workforce-shortage/.Accessed 3 Oct. 2018.

This article addresses the reasoning behind lawmakers introducing a bill meant to
respond to the lack of trained cyber security personnel in organizations across the United States.
The research suggests that over 300,000 cybersecurity positions within public and private
subdivisions were unreserved for eleven months. The source then provides reasons as to why the
shortage permits threats to breach the security of the economy. For example, it determines that
Al Qaeda and Russia both produced similar attacks through the internet. Furthermore, the Cyber
Ready Workforce Act generated support from few congresspeople and agencies. The author
encourages people to support the lawmakers for the economic and national security of the US.
This web page was very helpful because it outlined evidence on cybersecurity shortages
which ultimately clarifies the importance of this workforce and its job. Although the source may
not provide many examples of breaches on national security, other sources have more extreme
cases of cyber threats which can further demonstrate the ideas in this reading. The article
provides a starting point for someone hoping to understand the value of a job in the field of
cybersecurity.

Uchill, Joe. "Codebook." Axios, 18 Sept. 2018, www.axios.com/newsletters/axios-codebook-


7392a20b-6556-410b-8541-053f86d8e0e8.html. Accessed 4 Oct.2018.

This article highlights many proven cases of cybersecurity threats to the US within the
past two years and presents solutions to these problems. For example, the research suggests that
there are many ways to intervene elections so citizens must be aware. The source mentions that
cyber threats can manipulate elections by trying to suppress voter turnout with a false report of
long lines, inconvenience, or gun violence in a certain polling place. Furthermore, voters should,
in the most effective way possible, arrive at a polling place safely because election hackers may
deliberately close a bridge or message a bus driver that no transportation is necessary. All of
these tactics are susceptible to election-related websites that scam users and produce falsified
information. This article describes a modern approach to avoid Russian cyber attacks.
This article was very helpful because it develops insight on how a voter should respond
to potential cyber attacks. Furthermore, the article helps develop the general idea that cyber
attacks do exist and can interfere with significant elections. Therefore, the importance of
cybersecurity is justified by the repeated input of evidence throughout this article. There are
more examples of cyber threats in the article, but the idea is comprehensible. The article provides
a starting point for someone trying to gather evidence for claims that praise cybersecurity's value
to society.

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 1/11
5/28/2019 Final Annotated Source List - Google Docs

Cooper, Betsy. "Opinion: Cracking the Cybersecurity Gender Code." Christian Science Monitor.
MasterFILE Premier, 18 September 2016. <http://web.a.ebscohost.com/ehost/detail/
detail?vid=3&sid=52970f75-b579-4f1b-98ac-8f06d150cbad%40sdc-v-sessmgr06&bdata
=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=117556746&db=f5h> Accessed 9 Oct.
2018.

This article addresses the lack of gender diversity in the fields of cybersecurity and the
growing concern for pay equity. The research suggests that the reason few cybersecurity
positions are held by a woman, which totals to 11 percent, is because of the growing number of
women in the digital privacy field. The field of privacy operates much like the field of
cybersecurity because it also manages data breaches but it lacks the respect of many as evident
by its larger demand for women. According to the newspaper's research, at least half of the
employees in this field are women. Many believe that the differences between the outcome of
women in fields of privacy and cybersecurity is in large part due to stereotypes of it being a
feminist job and that the ideas associated with it suggesting lack of necessity for high officials.
Thus, pay for women in the privacy fields usually roams below that of the security field. This
article describes a controversy of lack of gender diversity in the important field of cybersecurity
and also establishes its purpose of spreading more recruits for cybersecurity that are outside of
computer science, the military, and intelligence communities where undervalued women remain.
Overall, this article was helpful because it provided a specific reading about the gender
gap in cybersecurity which will be beneficial to answering questions related to why undervalued
women must be more represented in cybersecurity or important fields in general. The uses of
evidence and a clear conclusion further support the newspaper's argument.

Guynn, Jessica. "Tech's Gender Gap Is Widening." USA Today, 27 Mar. 2015. MasterFILE
Premier,web.b.ebscohost.com/ehost/detail/detail?vid=0&sid=0211ce70-5294-420a-97c0-
534990cc3889%40pdc-v-sessmgr06&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#A
N=J0E274352382515&db=f5h. Accessed 11 Oct. 2018.

This article addresses the lack of women being represented in tech-fields such as
computer science and the absence of pay equity between men and women. The article details that
if a woman and man who have the same successes and skills in computer science or security, the
man will be selected and be given more in his salary. The source provides many reasons as to
why this may happen. Women in college often drop out of programs and do not graduate because
they get overwhelmed and uncomfortable in the level of bias favoring men in technical careers or
environments that are hostile and not as inclusive. Furthermore, gender representation is a
problem between different ethnicities. Companies usually neglect these stereotypes and prejudice
associated with technical and computer-science jobs, but some, like Google, fueled resources
into recruiting and retaining women in their projects. The article describes a
monumental discovery of stereotypes of women in the field of computer science and cites many
examples of evidence.
This article was helpful because instead of explaining the idea of women being
undervalued in a certain field with concrete ideas, the newspapers' authors used more
sophisticated examples of evidence to support their ideas. The source generally contains a
prejudice towards feminine views in the job but also highlights the bias of the actions unfair to

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 2/11
5/28/2019 Final Annotated Source List - Google Docs

women. Someone using this source will be able to identify why women are misrepresented in the
sector of computer science. There are many interviews throughout the articles of experienced
women on the topic which will further solidify claims by people who use this source.

Cooper, Charles, and AT&T. “Social Media Is a Cybersecurity Risk for Business.” CSO Online,
29 June 2017, www.csoonline.com/article/3198715/data-breach/social-media-is-a-
-risk-for-business.html.

The article focuses on how cyber attacks can affect personal lives through social media.
Social media websites like Facebook, Linkedin, or Twitter are susceptible to scams, phony
updates, or phishing applications. Cybercriminals can use these tactics to promote certain beliefs
or install a malware through a survey. The authors suggest that every time a person sees an
unknown link, survey, or contact online, there is another reason for funding in order to spread
awareness of cyber threats on social media, not for online tools or countermeasures. For
example, rather than paying extra for security programs, that could be ineffectual to eliminate
viruses or unwanted ads, one can be more conscious of cyber threats. The solution is to make
users more cautioned of their privacy settings or actions online the next time they open their
account.
All in all, the article is valuable for someone interested in learning how to prevent
breaches on personal data. The source contains bias because the author incorporates negative
adjectives to describe online threats in order to make his or her point more appealing. For
example, the author mentions how easy it is for people to use “phony” scams which is indicative
of the overall lack of knowledge in how to prevent these frauds. This article is a valid resource
for someone who wants to learn how online scams work, what forms they may take, and actions
that can be taken to prevent this.

Kruse, Clemens Scott, et al. "Cybersecurity in Healthcare: A Systematic Review of Modern


Threats and Trends." IOS Press Content Library, 21 Feb. 2017, content.iospress.com
/download/technology-and-health-care/thc1263?id=technology-and-health-care%2Fthc12
63. Accessed 18 Oct. 2018.

The article addresses the lack of funding, technology updates, and time put into
protecting healthcare technology from data breaches. The healthcare industry is the primary
target for medical information because, unlike other organizations, it did not make enough
protocols for cybersecurity duties. Therefore, the field's technology can be vulnerable to modern
tactics that have evolved over time. For example, one trend that cybercriminals share is
ransomware: a software that forces an amount of money to be paid or otherwise risk the malware
to publish sensitive, personal and financial information online.
Overall, the article warns about the instability of the healthcare industry in order to
persuade healthcare providers to financially address cybersecurity more often. The article
references many scholarly sources in order to support its purpose. Although the reading describes
a one-sided issue, bias is generally avoided because the source provides statistics and historical
reasoning to support its arguments sparingly. This piece would be a good place for someone
interested in the significance of cybersecurity and how it is applicable to the modern-day society.

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 3/11
5/28/2019 Final Annotated Source List - Google Docs

Glennon, Lorraine. "Tracking down the Crooks." Consumer Reports, vol. 83, p. 32. MasterFILE
Premier, http://bit.ly/2yQYmsE. Accessed 24 Oct. 2018. Excerpt originally published in
Consumer Reports.

This excerpt from a magazine addresses sophisticated ways of identifying cyber threats
and solving them. The article states that at most, only 14 percent of the population actually
reports cases of fraud or scams against them. This is significant because the federal government
budget for cybersecurity amounted to 15 billion over 70 different agencies, and powerful
companies like Apple or Microsoft invested large sums of money into the field as well.
According to the magazine, if money is carelessly spent without a clear objective, the money
may be wasted. Therefore, the article suggests people need to identify and report cyber crimes.
Thus, the article provides many ways for restitution. One option is to report information to local
or national agencies that address the crime one experiences. Although this may not be able to
help one's case, agencies can track common patterns of crime from multiple cases, so they can
prevent suspicious online activity in the future.
In conclusion, the article is an interesting approach for someone wanting to understand
what is currently being done in Washington DC to prevent cyber crimes nationally. It was
helpful because it uses many pieces of evidence to draw its conclusions on preventions. Also,
Consumer Reports, which is known for informing educationally and scientifically on a
non-biased approach, produced this article.

“Internet Scams and Hoaxes.” Information Security, 2018, security.calpoly.edu/content/antivirus


/scam. Accessed 24 Oct. 2018

This website addresses reasons why cybersecurity is more important than people think.
Today, scammers disguise their cyber attacks online better than they did before. The website
dives into different schemes criminals use which mostly comprises of phishing attacks through
emails. Most phishing attacks through the email are intended to steal personal information,
usually a credit card or financial data, while falsifying the hacker’s own identity. Some people
are clever at avoiding this, but others may be gullible enough to accept fake offers. Moreover,
emails can consist of ransomware which is intended to make users pay certain amounts or risk
his or her personal information being leaked. All of these examples are accurate in today’s
society.
This source is beneficial to learning about different types of scams. This has many useful
applications: one being that it can help educate people and spread awareness for the future. The
source, however, contains little to no bias because it is informative and educative. Someone
interested in learning about the techniques hackers uses on the internet would be able to use this
website as a valuable resource.

Ezeoha, Abel Ebeh. “Regulating Internet Banking In Nigeria: Some Success Prescriptions– Part
2.” Journal of Internet Banking and Commerce, Apr. 2006, www.icommercecentral.com
/open-access/regulating-internet-banking-in-nigeria-some-success-prescriptions-part-1-12
.pdf.

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 4/11
5/28/2019 Final Annotated Source List - Google Docs

The article describes how internet regulators, both internationally and locally, responded
to the damages cyber crimes inflicted upon the internet banking system in a developing country
such as Nigeria. Nigeria currently lacks the regulatory policies to capture all the financial fraud
within a certain scope. For example, in a public internet location, a developed country would
strongly suggest avoiding sending sensitive and financial information online. On the other hand,
developing countries retain fewer commercial spots that guarantee access to computers and
electronics making it harder to regulate the increasing amount of people who utilize it for daily
necessities. Moreover, the regulators already in place are obsolete in finding solutions to cyber
crimes in the subject of e-commerce and internet banking. The author also criticizes local banks
in improperly enforcing internet protocols that align with international policies for electronic
banking, funding for banking laws, and increasing awareness and education. However, the banks
complain about investing too much money for this integration. To conclude, the article highlights
that Nigeria should continue its efforts to establish a political structure to eliminate Internet
frauds.
This source was helpful in understanding the limitations and challenges Nigeria
experienced enforcing internet regulation. Some of the ideas represented in the article may be
slanted against Nigeria’s current state of internet protocols. This article is useful for someone
interested in learning how a developing country responds to internet frauds or scams. Someone
can identify what financial barriers may limit the country from executing its programs and how it
overcomes these challenges.

Morgus, Robert. “Getting the International Development Community to Care About Cyber
Security.” Council on Foreign Relations, Council on Foreign Relations, 7 May
2018, www.cfr.org/blog/getting-international-development-community-care-about-
cybersecurity.

This article analyzes the actions necessary to ensure cybersecurity is not underused in
developing countries. According to the World Bank’s Development Report, emerging internet
risks lack the benefits of cybersecurity. The article then begins to divulge into reasons why the
general public and development actors in low-income countries continue to neglect the
importance of the field. The first reason is that developmental actors rely on the statistics that
prove cybersecurity’s significance. Why do they need to support a “development” issue? The
next challenge is that the average aid recipient is totally unaware of how to execute policies on
cybersecurity needs. Another major challenge is distinguishing the necessity of cybersecurity to
other needs. Some may believe that other costs, such as housing, food, education, or health
outweigh the necessity of cybersecurity costs. Finally, there is an overall lack of talent for the
position in most developmental institutions. The author concludes that in order to maintain cyber
security, more discussions and awareness are necessary to reestablish a financial, moral, and
sustainable trust of the people in the field. If more knowledge is present, developmental actors
can find cost-effective cybersecurity solutions.
This article was very helpful because it outlines valid challenges to the development of
cybersecurity as a whole. The author of the article is already a senior policy analyst in the
Cybersecurity Initiative, so this increases the overall credibility of the source. Furthermore, one
can understand why approval of cybersecurity is high but the investment is low.

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 5/11
5/28/2019 Final Annotated Source List - Google Docs

Fischer, Eric A. “Cybersecurity Issues and Challenges: In Brief.” Federation of America


Scientists, 12 Aug. 2016, fas.org/sgp/crs/misc/R43831.pdf.

The article, from the Congressional Research Service Agency, highlights the federal role
in the management of cybersecurity threats. The agency’s efforts have been to immediate federal
spending, legislative action, and executive action in favor of cybersecurity, but there are many
challenges in fulfilling this process. As spending tends to increase, some researchers look at the
incentives, or economic reasons, to be involved in cybersecurity. Cybercrime continues to find its
efforts cheap and profitable while cybersecurity maintenance has been expensive and flawed.
Another challenge is finding an effective design for a program because future cybersecurity
needs cannot be predicted. Another idea that should be taken account for is that the rationale for
finding a design today tends to be more economically based than for security. Most importantly,
another constraint is the lack of consensus among the researchers. Cybersecurity has distinct
implications among different organizations in both sectors. It is necessary to have a consensus
before there can be political support for a crucial policy. To conclude, the author details that
future Congresses framework or policy could have unseen impacts on overcoming challenges.
The article is useful because it informs a decisive approach to combating cybercrime in
the US while also understanding the challenges of its methods. Moreover, the article contains
minimal to no bias at all. The report comes from a governmental agency, the Congressional
Research Service, which is known to be a highly factual source that many academics, businesses,
judges, or policy advocates use. The article would be an excellent source for someone interested
in understanding challenges to investing time, money, and effort to combat cybercrime.

Adhikari, Chiranjibi. “CyberSecurity Challenges in Developing Countries.” ICT Frame


Technology, 9 Nov. 2017, ictframe.com/cybersecurity-challenges-in-developing-
countries/.

The article addresses the challenges to designing and enacting effective cybersecurity
programs and policies in developing countries. The author highlights many issues the countries
face. One challenge is the lack of awareness, both in the public and private sector, and
downgraded infrastructure in the countries. The lack of education on the topic amongst people of
a developing country makes it difficult to enact a law despite passing it. Moreover, people tend to
resist change in the public sector. For example, the article states that if a phone company wants
to update their version to remove bugs or other malware, people are inclined to delaying the
update. Furthermore, there is a gap between what the stakeholders believe in and the public
thinks. Unclear instructions and communication between the two groups limit progress. Another
topic the article discusses is mobile device security. The least developed countries face the most
security breaches because of weak passwords. Therefore, the article concludes that these
countries take action in order to resolve data theft, the lack of accountability in the private sector,
and lack of awareness or education.
The article is useful because it discusses the cyber threats that the least developed
countries face in the modern, technological world; however, the article itself may contain some
bias. The reading suggests that developing countries are wasting their time, effort, and money to
a solution that has already been outlined by other countries across the globe. Moreover, it seems
hypocritical to discuss the state of cybersecurity in developing countries when the author himself

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 6/11
5/28/2019 Final Annotated Source List - Google Docs

is in one. The article is useful for someone who wants to understand the barriers developing
countries face in enhancing cybersecurity within their ecosystem.

DHS. “Combating Cyber Crime.” Department of Homeland Security, 20 Nov. 2018,


www.dhs.gov/cisa/combating-cyber-crime.

A strategic method for developing nations to solve its cybersecurity issues is to model
successful nations. This webpage highlights the tactics that the United States Homeland Security
Department implements in order to effectively maintain cybersecurity. The Department
accentuates three different solutions in combating cybercrime: tracking down and punishing
cybercriminals, prioritizing recruitment and retention of workers, developing effective protocols,
and reporting local or federal cybercrimes. In response to these ideas, the Homeland Security
Department created some federal law enforcement agencies to regulate cybersecurity. The U.S.
Secret Service Agency’s primary role in cybersecurity is to create task forces that find and arrest
cyber criminals for data breaches, bank frauds, or other related deeds. The U.S. Immigration and
Custom’s Enforcement (ICE) focuses on ensuring investigations into crimes are valid. The
agency offers training to officials, judges, law-enforcement officers, and others to prepare them
for their tasks in computer forensics. Lastly, the Law Enforcement Cyber Incident Reporting
provides information for local law enforcement on how to share and report cybercrime.
Ultimately, the tasks that these agencies accomplish provide effective models for the
infrastructure of developing nations.
The webpage highlighted how the United States bureaucracy effectively responds to
cybercrime. The webpage contains minimal to no bias because it is published directly from the
official website for the Department of Homeland Security. Someone reading this webpage can
understand how developing nations can model off of existing protocols for cybersecurity.

ICT Forum 21. “An Overview of Cyber Security Challenges in Developing World.”
Http://Www.ict-21.Ch/Com-Ict/IMG/Pdf/Abstract-Contextualisation-Ref-7.Pdf, 2018,
www.ict-21.ch/com-ict/IMG/pdf/Abstract-contextualisation-ref-7.pdf.

This document requests a call to action for cybersecurity in developing nations. The
author’s idea is action on the basis of the consensus among advanced and undeveloped countries.
The author highlights a program called the ICT, Information and Communication Technology,
which facilitates cyberspace to achieve economic efficiency. Developed nations have already
implemented aggressive ICT and cybersecurity standards within their policies. On the other
hand, undeveloped nations lack this infrastructure which can leave them vulnerable in many
areas. For example, purported Russian hackers stole hundreds of millions of dollars after they
had seized 160 million credit card companies. Financial loss is not the only cyber threat these
countries face. Anonymous Organizations attacked weaker infrastructures for personal or
governmental information, reduced brand or market value, and declined overall growth and
economic status. However, the author does identify opposing motives for enhancing
cybersecurity in developing nations. Officials argue that more pressing issues, such as
HIV/AIDS prevention, can setback growth of cybersecurity. While this may be valid, the author
mentions that consensus among all countries is necessary because some developing nations do
not acknowledge the amount of financial loss and identity theft they suffer from cyber threats.

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 7/11
5/28/2019 Final Annotated Source List - Google Docs

Overall, this document advocates for a common plan among developing and developed
countries to combat skepticisms and mend weak infrastructures in countries with poor ICT or
cybersecurity programs. The reading avoids bias because it reports on factual information and
cites concrete evidence. This article would be useful for someone wanting to understand the
limitations or complaints of cybersecurity in developing nations and the solutions to address this
issue.

Garson, Philippa. “Cybercriminals Find Wonderland in Developing Countries.”


OpenDemocracy, 10 Dec. 2013, www.opendemocracy.net/opensecurity/philippa-garson/
cybercriminals-find-wonderland-in-developing-countries.

This article argues for comprehensive legislation to thwart cybercrime internationally.


Today, Asia, Africa, and Latin America are projected to experience the most internet growth over
the next decade. Developing nations within these regions already experience the most
cybercrime, so newcomers would be more uneducated and vulnerable to cyber attacks. With
today’s society, it’s even easier to conduct cybercrime. Cybercrime is appealing to many,
especially unemployed young people, because of its high profit and relatively easy access to
harnessing data, hacking, spreading malware or spamming in developing countries. Furthermore,
young people find opportunities to hack easily online. YouTube and other social media platforms
inform how to commit basic fraud. Moreover, criminal gangs can watch videos online on how to
evade arrest while committing frauds. Cumulatively, these actions have threatened the stability of
many countries and the poorer people within them. Therefore, the author stresses nations to
contribute to forming legislation internationally and enforcing it; however, this has posed some
challenges to developing nations. For example, Ghana has passed its own legislation granting
police more power to act against cybercriminals, but Ghana’s weak bureaucracy and limited
police force made it difficult to enforce any initiatives.
The article focuses on a consensus when addressing cybersecurity internationally. Rather
than wasting money, many countries should contribute equally and enforce their initiatives to
dissipate financial loss due to cyber attacks. The article contains minimal to no bias because the
author, a human rights activist, cites a lot of evidence in supporting details. For example, when
describing Ghana’s efforts to enforce cybersecurity, the author cited many quotes from
researchers and activists in the field to increase the reliability of the information. Someone who
uses this source can identify the challenges developing countries face despite creating legislation
to bypass cybercrime.

Gibson, Kate. “Google Plus Shutdown Date Gets Moved up after New Security Breach.” CBS
News, CBS Interactive, 10 Dec. 2018, www.cbsnews.com/news/google-plus-shutdown-
date-moves-up-after-another-security-breach/.

This article reports on an obsolete social network platform that has experienced many
challenges in its 7 year tenure. On October 8, 2018, Google Plus’ data was breached which
resulted in Google announcing that they planned to shut down the social media network by the
end of August 2019. Also, the company informed the public that they would enforce greater
security measures; however, this did not occur. Google Plus was attacked yet again on the 11th of
December revealing personal data, such as age, birth, schooling, name, from about 53 million

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 8/11
5/28/2019 Final Annotated Source List - Google Docs

people. Furthermore, access to these accounts allows hackers to infiltrate emails or reset
passwords. How does a major corporation get attacked twice within 2 months? Overall, Google
has issued little to no response on how the data has been breached, but, Google CEO, Sundar
Pichai, is scheduled to testify in front of Congress on the accountability issues of Google Plus.
Until then, it is known that due to a recent update in its system, Google Plus had experienced
another glitch and many hackers were able to steal information. Ultimately, Google Plus’ tenure
will be coming to a close as Google announced the platform would be closing in April instead of
August 2019.
The article reported on a social media network, Google Plus, that will be closing down
due to security reasons. Although many other reports were on the topic of Google Plus data
being breached twice, CBS was the most credible and known source. According to
MediaBiasFactCheck, CBS is known for being high in factual reporting. Someone who uses this
source can identify a recent exposure of weak cybersecurity application. By identifying data
breaches such as ones on Google Plus, one can find tactics hackers use and how effective the
cybersecurity protocol from the Department of Homeland Security is.

Admin. “Prohibited Offensive and Illegal Content.” ACORN - Australian Cybercrime Online
Reporting Network, ACORN, 22 Dec. 2015, www.acorn.gov.au/learn-about-cybercrime/
prohibited-offensive-and-illegal-content.

This article reports on different cybercrime tactics that hackers may use. The information
is derived from the Australian Cybercrime Online Reporting Network (ACORN) that outlines
and analyzes different issues within cybercrime. Identity theft, one of the most impactful and
harmful methods of cybercrime, is used when a criminal online attempts to steal personal
information regarding someone else’s address, phone number, or date of birth in order to benefit
themselves. Within identity theft, phishing, providing personal information through junk mail,
phone calls, or messages, occur most often, but the methods of phishing are all scams intended to
access money and commit criminal activity. Phishing is not restricted to just identity theft, it is
prevalent in online scams or fraud as well. Within the junk emails, phone calls, or instant
messages, malvertising, scams, or social engineering roam menacingly. Scams can play on
emotional sentiments through dating and romance scams. Also, scams can target unemployed
people requiring them to pay first before claiming a “job.” ACORN has placed restrictions and
regulations on online content, dismissing anything that depicts sexual content or informs people
through videos online to conduct cybercrime.
Overall, the article reports on many different tactics hackers may use to exploit countries
with weak cybersecurity to validate ACORN’s restrictions and regulations on content in
Australia. In general, the information is trustworthy and unbiased because the Australian
government and Criminal Intelligence Institution manage and supervise the website. Someone
reading the information regarding Australia’s cyber security can efficiently detail how effectively
different countries manage and are aware of cyber security protocols.

Khurana, Ajeet. “When E-Commerce Isn't So Great. Learn the Disadvantages.” The Balance
Small Business, The Balance Small Business, www.thebalancesmb.com/disadvantages
-of-e-commerce-1141571

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 9/11
5/28/2019 Final Annotated Source List - Google Docs

This article analyzes the concept of e-commerce and how it has been misused throughout
the last decade. The function of e-commerce is to conduct commercial, online transactions. This
is used when someone decides to purchase or sell items on the internet. This innovation’s
primary purpose is to make shopping effortless for consumers in remote areas. E-commerce’s
market and popularity have exponentially expanded over the past years. Despite the benefits of
e-commerce, there is an increasing concern when committing online transactions. The website or
host that is used for e-commerce may appear to be genuine, but, realistically, it could be
misleading and intended to steal credit card information. Accordingly, unemployed, young
people may use identity theft. If a hacker sets up a misleading advertisement or website with an
underlying malicious intent that others do not recognize, personal information and patterns of
interest can be exploited. Electronic trackers, called cookies, pick up on data that people use
when they shop online. This will be used to track surfing patterns of customers and allows
companies to target others based on his or her needs. Already, people may be uncomfortable
acknowledging that their interests are being tracked. Moreover, if a hacker tracked information
regarding purchases of someone, that person would be even more distressed and insecure.
This article analyzes how cybercrime can devalue e-commerce in the society and
economy today. There is minimal to no bias in the information because it supports the usage of
e-commerce and acknowledges the many different disadvantages of it. Someone using this article
can be more cautious of his or her online transactions in the future. Also, someone using this
reading can discuss many arguments supporting or refuting the concept of e-commerce.

“DDoS Attacks: In the Healthcare Sector.” CIS Control 20: Penetration Tests and Red Team
Exercises, 24 Apr. 2017, www.cisecurity.org/blog/ddos-attacks-in-the-healthcare-sector/.

This article reports on the significance of Distributed Denial of Service Attacks, (DDoS),
in the healthcare sector. DDos attacks are another method that hackers may use to infiltrate and
congest a network until it has lost its functionality. The article provides an important example
concerning the Boston Children’s Hospital in 2014 to show how threatening DDoS attacks can
be for an institution. Generally, a group that decides to conduct DDoS attacks may find
something important and unjust within a network. A well-known group, titled Anonymous,
decided to conduct DDoS attacks on the Boston Children’s Hospital. The members believed that
the hospital had unlawfully advocated to relieve custody of a girl from her parents because they
were pushing for unnecessary treatment. The members of the group surmised that these actions
contravened the girls’ rights, so they instituted many DDoS attacks that lasted for several days.
The results were many outages, inability to access the network that tracked information of
medical patients, and hundreds of thousands in financial loss to respond to the damage of the
attack. Ultimately, the author explains that networks and corporations must adopt DDoS
mitigation services or maintain an effective connection with a service provider to reduce DDoS
attacks.
The reading identifies an important event in the history of cybercrime to detail how
DDoS attacks may occur, the reasoning behind the attacks, and to describe potential solutions to
the infringements. The article, derived from the Center for Internet Security, contains minimal to
no bias because it records other familiar examples to elaborate on the topic at hand. Someone
using this article can effectively explain what a DDoS attack is and how it develops in reality.

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 10/11
5/28/2019 Final Annotated Source List - Google Docs

“Cyber Crime.” FBI, FBI, 26 Sept. 2018, www.fbi.gov/investigate/cyber.

This article reports on FBI recommendations to prevent ransomware attacks.


Ransomware is a tactic hackers use to illicitly obtain money by forcing others networks,
companies, school districts, or groups into capitulation. The cybercriminals behind the malicious
software decrypt and deny access for important data. In most cases, the cybercriminal states that
an individual can regain access to their data only with a ransom. Since its creation, ransomware
has been expanding indefinitely and covertly which has prompted FBI officials to undertake
measures preventing the spread of the malware. The article details that the FBI recommends
keeping workers informed on ransomware and containing it through efficient firewalls, path
operating systems, or other softwares. Furthermore, the FBI recommends frequently backing up
data that is not connected to the main computer servers.
The article elaborates on the importance of ransomware in order to reason for initiatives
to prevent it spreading. The reading contains minimal to no bias because it is derived from the
genuine FBI website of the US Department of Justice. Someone using this source can thoroughly
explain the significance of ransomware today and advocate for more awareness of it in the field
of cyber security globally.

https://docs.google.com/document/d/1AkmTJvXTCq6EYosq_wztroVr_iAWzH0I8_robmA883E/edit 11/11

You might also like