User:Bdmparker/Choose an Article

Article Selection
Please list articles that you're considering for your Wikipedia assignment below. Begin to critique these articles and find relevant sources.

<>

Option 1: Cyber security awareness

 * Article title: Cyber security awareness
 * Article Evaluation:
 * Lead section:
 * Does the lead include an introductory sentence that concisely and clearly describes the article's topic?
 * -         Yes
 * Does the lead include a brief description of the article's major sections?
 * -         No, it does not provide a brief description of the article's major sections, but it does provide a list of the major sections.
 * Does the lead include information that is not present in the article? (It should not.)
 * -         No, it does not reference a topic that is not later addressed in the article.
 * Is the lead concise, or is it overly detailed?
 * -         The lead is concise.
 * Content:
 * Is the article's content relevant to the topic?
 * -         For the most part it is.  However, the topic is on social awareness and it appears that it will only cover threats against humans (phishing, spear-phishing, social engineering). But then the third paragraph under the “Overview” section, begins discussing Internet of Things.  It was an abrupt transition from Spear phishing to IOT to then Social engineering.
 * Is the content up-to-date?
 * -         This appears to be more of a descriptive article and so the foundational information is up to date.  However, while they discussed phishing, spear phishing, social engineering. It would seem that if you call out phishing and spear-phishing, newer vectors that are becoming common like whaling, smishing, vishing to also be introduced.  As such, I would say it appears a bit dated.
 * Is there content that is missing or content that does not belong?
 * -         As previously mentioned, the brief mention of IOT appears out of place. I would likely remove it.  I would add newer threat vectors against humans like smishing, vishing etc.
 * Does the article deal with one of Wikipedia's equity gaps? Does it address topics related to historically underrepresented populations or topics?
 * -         I do not think this question applies to this work on Cyber security awareness.
 * Tone and Balance:
 * Is the article from a neutral point of view?
 * -         Yes, it is also written in third person, objectively, and no opinions are offered.
 * Are there any claims that appear heavily biased toward a particular position?
 * -         No claims stated.
 * Are there viewpoints that are overrepresented or underrepresented?
 * -         No, a very neutral topic that neutrally represented.
 * Are minority or fringe viewpoints accurately described as such?
 * -         This question is not applicable.
 * Does the article attempt to persuade the reader in favor of one position or away from another?
 * -         No Sources and References  A Wikipedia article should be based on the best sources available for the topic at hand. When possible, this means academic and peer-reviewed publications or scholarly books.
 * Are all facts in the article backed up by a reliable secondary source of information?
 * -         Some.  Perhaps because the topic itself is so broad and most reliable sources select more specific topics. Are the sources thorough - i.e.
 * Do they reflect the available literature on the topic?
 * -         While about 25-30% of the sources appear to be vendor-related, and some blogs, there are references from industry related journals.  I believe the sources could be improved for more reliability and completeness of topic. Are the sources current?
 * -         The sources range from 2014-2021.
 * Are the sources written by a diverse spectrum of authors? Do they include historically marginalized individuals where possible?
 * -         Not able to determine.
 * Are there better sources available, such as peer-reviewed articles in place of news coverage or random websites? (You may need to do some digging to answer this.)
 * -         I believe there is sufficient coverage by scholarly and industry journals on this topic, they could certainly replace some of the blog(s) like https://fraudwatchinternational.com/security-awareness/what-is-cyber-security-awareness-training/ .
 * Check a few links. Do they work?
 * -         Some of the links either take you to a page that does not exist (i.e. Reference 9
 * Bada – the link to Information and Computer Security) or does not take you directly to the relevant article (i.e. Reference 11: Cyberstream – it does not provide the article title and the link takes you to Cyberstream’s landing page).
 * Check a few links. Do they work?
 * -         Some of the links either take you to a page that does not exist (i.e. Reference 9
 * Bada – the link to Information and Computer Security) or does not take you directly to the relevant article (i.e. Reference 11: Cyberstream – it does not provide the article title and the link takes you to Cyberstream’s landing page).

Organization and writing quality:''' Talk page discussion:''' Overall impressions:''' Examples of good feedback -         The 5 main points for improvement from my perspective would be to''':  o  Update the sources (links should be direct and active);  o  Update the sources (use more reliable sources i.e., remove blogs);  o  The language in the image should be the same as the article;  o  The section on IOT is not fully developed and appears tossed in between 2 sections that are more related (phishing/spear-phishing and social awareness). It also points to the future while the other topics are more about the present; o  Expand the topic to include the newer vectors like smishing.
 * Is the article well-written - i.e., Is it concise, clear, and easy to read?
 * -         With the exception of the flow (see previous mention regarding the injection of IOT), I would say that it is concise, clear, and easy to read.
 * Does the article have any grammatical or spelling errors?
 * -         Really just a few minor issues like missing hyphens, misplaced commas but not really worth mentioning as most could go either way i.e. cyber security vs. cybersecurity and end user vs. end-user.
 * Is the article well-organized - i.e. broken down into sections that reflect the major points of the topic?
 * -         Yes Images and Media
 * Does the article include images that enhance understanding of the topic?
 * -         The article is in English but the image is in a different language.  You are however able to select “Google Translate” to translate the website to English. Unfortunately, no direct link to the captioned poster so it does not enhance understanding of the topic.
 * Are images well-captioned?
 * -         It does cite the source’s website but it is not in English (like the article) and it is not a link direct to the poster.
 * Do all images adhere to Wikipedia's copyright regulations?
 * -         Not sure.  Unable to locate the poster in English to determine copyright protection.
 * Are the images laid out in a visually appealing way?
 * -         Yes
 * The article's talk page — and any discussions among other Wikipedia editors that have been taking place there — can be a useful window into the state of an article and might help you focus on important aspects that you did not think of. What kinds of conversations, if any, are going on behind the scenes about how to represent this topic?
 * -         There article was nominated for deletion on March 16, 2020.  After discussion, they determined to keep it. How is the article rated? Is it a part of any WikiProjects?  -         This article is rated “Stub-Class” by the WikiProject Articles for Creation project and Stub-Class, Low-Importance by the WikiProject Computer Security project.
 * How does the way Wikipedia discusses this topic differ from how we have talked about it in class?
 * -         We have not discussed this topic in class.  However, I based on my knowledge of this topic, this Wiki article appears to be lacking relevant information.  It needs to be expanded.
 * What is the article's overall status?
 * -         This article is currently published. What are the article's strengths?
 * -         It does an OK job providing a high level overview of the topic.
 * How can the article be improved?
 * -         As previously mentioned in this critique (update threat vector information, remove IOT) etc.
 * How would you assess the article's completeness - i.e., Is the article well-developed? Is it underdeveloped or poorly developed?
 * -         This appears somewhat underdeveloped topic and suggestions previously mentioned.
 * Possible Sources
 * Improving cybersecurity awareness using phishing attack simulation by Chatchalermpun, Surachai; Daengsi, Therdpong. https://www-proquest-com.proxymu.wrlc.org/docview/2513026067?accountid=27975&pq-origsite=primo
 * Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues by Hussain Aldawood; Skinner, Geoffrey.  https://www-proquest-com.proxymu.wrlc.org/docview/2429965624?pq-origsite=primo
 * National Cybersecurity Awareness Month.  https://www.cisa.gov/national-cyber-security-awareness-month (various topics) Cybersecurity Awareness by Jason Nurse. https://arxiv.org/abs/2103.00474
 * National Cybersecurity Awareness Month.  https://www.cisa.gov/national-cyber-security-awareness-month (various topics) Cybersecurity Awareness by Jason Nurse. https://arxiv.org/abs/2103.00474

Option 2

 * Article title: California Consumer Privacy Act is still the published page.
 * NEW? - California Privacy Rights Act of 2020


 * Article Evaluation: Unable to locate Wiki page
 * Sources
 * Sources

Option 3

 * Article title
 * NEW? - Leveraging the CIS Controls Framework to improve Cybersecurity Policy in the US Virgin Islands/Caribbean


 * Article Evaluation: Nothing found on Wiki... still searching for reliable sources.
 * Sources
 * Sources

Option 4

 * Article title
 * NEW? - Leveraging the CIS Controls Framework to improve Small and Medium Enterprise Cybersecurity Policy (in i.e. Financial Sector)


 * Article Evaluation: Nothing found on Wiki... still searching for reliable sources.
 * Sources
 * Sources

Option 5

 * Article title
 * NEW? - How US State Government (Local, County) could leverage CIS Controls Framework to improve their Cybersecurity Policy


 * Article Evaluation: Nothing found on Wiki... still searching for reliable sources.
 * Sources
 * Sources