User:Stephen.defibaugh/Choose an Article

Article Selection
Please list articles that you're considering for your Wikipedia assignment below. Begin to critique these articles and find relevant sources.

Option 1

 * Article title
 * Cyber Electronic Warfare


 * Article Evaluation
 * The article is defined as a starter article that is in need of serious updating. The article conflates cyber warfare with information warfare and confuses it further with electronic warfare.  The article has limited notability, being based on one single reference.  This article should be significantly updated or should be removed from the wikipedia.


 * Sources
 * Alexander, D. (2012). Cyber Threats in the 21st Century. Security, 49(9), 70-76.
 * Robinson, M., Jones, K., & Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers & security, 49, 70-94.
 * The principle of maneuver in cyber operations. In 2012 4th International Conference on Cyber Conflict (CYCON 2012),  (pp. 1-13). Retrieved from https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=& arnumber=6243974&isnumber=6243954
 * Harris, M. A. (2018). Preparing for Multidomain Warfare: Lessons from Space/Cyber Operations. Air & Space Power Journal, 32(3), 45. Retrieved from http://proxymu.wrlc.org/login?url=https://search-proquest-com.proxymu.wrlc.org/docview/2099884315?accountid=27975 Jensen, E. T. (2009). Cyber warfare and precautions against the effects of attacks. T. L. Rev., 88, 1533. Retrieved from http://proxymu.wrlc.org/login?url=https://search-proquest-com.proxymu.wrlc.org/ docview/722437496?accountid=27975

Option 2

 * Article title
 * Cyber Kinetic Attack


 * Article Evaluation
 * The article under evaluation is a stub article with very low notability. It lacks current examples of physical system that were impacted as a result of cyber attack.  The article does not differential the differences in impact between military targets, critical infrastructure, and individual's property.


 * Sources
 * Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 9(3), 49-51.
 * Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23-40.
 * Matrosov, A., Rodionov, E., Harley, D., & Malcho, J. (2010). Stuxnet under the microscope. ESET LLC (September 2010).
 * Hodge, C., Hauck, K., Gupta, S., & Bennett, J. C. (2019). Vehicle cybersecurity threats and mitigation approaches (No. NREL/TP-5400-74247). National Renewable Energy Lab.(NREL), Golden, CO (United States).
 * Petit, J., & Shladover, S. E. (2014). Potential cyberattacks on automated vehicles. IEEE Transactions on Intelligent transportation systems, 16(2), 546-556.

Option 3

 * Article title
 * Proactive Cyber Defense


 * Article Evaluation
 * The cyber defense article is lacking in historical context of what constitutes defense as well as the different types of defensive maneuvering and notable examples of them throughout history. The article does not take in to account the latest developments and academic proposals for conducting active cyber defense and even a letter of marque program.  The article also is too focused on the United States and lacks a broader world view.  The references have not been updated since 2012 and, realistically, this article could likely be combined with the larger cyber warfare article.


 * Sources
 * Applegate, S. D. (2012, June). The principle of maneuver in cyber operations. In 2012 4th International Conference on Cyber Conflict (CYCON 2012),  (pp. 1-13). Retrieved from https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=& arnumber=6243974&isnumber=6243954

Option 4

 * Article title
 * Cyber Attack


 * Article Evaluation
 * The cyber attack article is an intermediate article that has decent layout and notability. However, it does not provide granularity into the various types of cyber attacks and their employment.  It loosely groups most attacks into a syntactic category with other subcategories.  It does not attempt to explain the difference between cyber attack and electronic warfare or information warfare.   Additionally, the cyber warfare topic could be linked and expounded upon.


 * Sources
 * Parks, R. C., & Duggan, D. P. (2011). Principles of Cyber Warfare. IEEE Security & Privacy, 9(5), 30-35.
 * Jensen, E. T. (2009). Cyber warfare and precautions against the effects of attacks. T. L. Rev., 88, 1533. Retrieved from http://proxymu.wrlc.org/login?url=https://search-proquest-com.proxymu.wrlc.org/ docview/722437496?accountid=27975
 * P. K., Singh, Maneuver in Cyberspace. MMS Thesis, Command and Staff College, Marine Corps University, Quantico, VA.
 * Robinson, M., Jones, K., & Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers & security, 49, 70-94.

Option 5

 * Article title
 * Cyber Warfare in the United States


 * Article Evaluation
 * The Cyber Warfare in the United States article has several issues. The references are dated and are not current which reduces the pages's notability.  The page has not been updated to include the sitting President's latest edict in protecting national security from cyber attack.  The definition of cyber attack only uses four articles as references and does not include the ontological debate on the definition and usage of the term cyber warfare.  The United States Cyber Components are improperly identified under one banner of US Cyber Command and does not accurately delicate the roles of supported and supporting commands and echelons.  Additionally, the names of specific DoD organizations have renamed, consolidated, or split.


 * Sources
 * Parks, R. C., & Duggan, D. P. (2011). Principles of Cyber Warfare. IEEE Security & Privacy, 9(5), 30-35.
 * Jensen, E. T. (2009). Cyber warfare and precautions against the effects of attacks. T. L. Rev., 88, 1533. Retrieved from http://proxymu.wrlc.org/login?url=https://search-proquest-com.proxymu.wrlc.org/ docview/722437496?accountid=27975
 * P. K., Singh, Maneuver in Cyberspace. MMS Thesis, Command and Staff College, Marine Corps University, Quantico, VA.
 * Robinson, M., Jones, K., & Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers & security, 49, 70-94.