Professional Documents
Culture Documents
By: SHAW, ABRAHAM. Columbia Journal of Law & Social Problems. Summer2010,
Vol. 43 Issue 4, p517-562. 46p.
The efficiency and integrity of payment card systems: Industry views on the risks posed
by data breaches.
By: Cheney, Julia S.; Hunt, Robert M.; Jacob, Katy R.; Porter, Richard D.; Summers,
Bruce J. Economic Perspectives. 2012, Vol. 36 Issue 4, p130-146. 17p.
6. The articles from CCBC where easily accessed from CCBC library database online for the
most part unless they were not available online to be downloaded. But the searches are easy and
the filters can narrow down the searches are easily set. You can search the different databases
depending on the subject you are looking for. The internet searches do not contain all the filters
available from the online library and you have to sift through a lot of articles to get to what you
want. The database contain articles from journals that are very recent from the latest version of
the publications and they have some that are older when needed. The period to search for an
article is easily set with a slide bar on the search screen. With online searches, there is no way to
indicate on the time you want the article to be published within. The journals are for the most
part from reputable journals that are used by the different industries for latest publications,
finding and studies. The articles published by experts in the subject matter. Research papers done
for academia or for the corporate world are usually done by qualified people with supported data
and references. On the other hand, the online articles found by regular searches are published by
businesses that want to attract customers with their publications or studies. So a lot of them are
biased to one solution to another. You can find the publications from the library sometimes if
you pay for a subscription to the journal or if free, you have to use a distinct search string using
the author and the title.
7. MLA format
References:
1. Laurent Gil. 2014 Hack Retrospective, Or Why Security Ecosystems Matter.
(http://techcrunch.com/2015/01/08/2014-hack-retrospective-or-why-security-ecosystemsmatter/) Web. 8 January 2015.
2. KROLL
CYBER
SECURITY.
Data
Breach
Prevention
Tips.
5. SHAW, ABRAHAM. Data Breach: From Notification to Prevention Using PCI DSS.
Columbia Journal of Law & Social Problems. Summer2010, Vol. 43 Issue 4, p517-562.
46p.