Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Cybersecurity Policy and Law

Guide created in Spring 2020 for CS4368 / CS6368. The sources describe here are suggested for the course literature review and paper.

What's in this guide?

This course guide lists and describes resources for the literature review and paper assigned in the CS 4368 / CS 6368 Cybersecurity Policy and Law class, taught in Spring 2020 semester, by Professor Mitra Bokaei Hosseini. 

Topics included in the research workshop on Tuesday, 1/28/2020:

  • Articles, Journals, Databases
    • how and why to choose between the ACM Digital Library, Discover, Hein Online, and Google Scholar 
  • Borrow from Other Libraries
    • How to verify that the Blume Library does not have the source you need, including Interlibrary Loan (ILL)
  • Citations 
    • Discuss various support tools for citation. Includes link to the Zotero citation software to manage your documents during your research process.
  • Computer Science Librarian 
    • make an appointment or contact me with your questions

Review on your own later:

  • Career, Professional -
    • associations and other information regarding the computer science profession. 

We will discuss research strategies, primarily focusing on journal articles, in the research workshop.  I encourage you to explore this course page for more resources in your time outside of the workshop.

Book an appointment to discuss research techniques that solve specific issues you are experiencing. Go to my profile guide or click Schedule Appointment, under my profile, to make an appointment.  Please include details about your topic.