Skip to Main Content

Cybersecurity: Finding Articles

Search Tips for Cybersecurity

 4 simple strategies for effective database searches:

  1. Start with a Basic Search Using AND

Think about the main ideas in your research question. For example, in the question, "What role does malware play in cyberwarfare?" the main ideas are: malware and cyberwarfare.

These keywords can be used in your search statement:

malware AND cyberwarfare

When you use AND, you are asking the database to find both terms in articles you retrieve.

If you can't think of any keywords, try a simple search in a database related to your topic. You can find keywords that you can use to improve your search in the abstracts and subject terms given for useful articles in your results.

2. Expand Your Search Using OR 

If you do not find enough useful articles, expand your search by using OR to include additional, related keywords:

(malware OR spyware) AND cyberwarfare

Look through the subject termstitle, and abstract of useful articles you find for keywords related to those that you have used - then try connecting them using OR as shown above. This will often locate useful articles missed in your first search.

3. Expand Your Search Using Truncation

Many databases allow you to use "*" (an asterisk) to truncate a term. Truncating allows you to search for all variations of a word using a single search. For example, a search for ...


... will find articles containing "cyberwar" "cyberwars" "cyberwarfare", and related words with one search. Broadening a search like this can help you find more useful articles.

4. Exclude Words With NOT

NOT lets you exclude words from your search to remove unhelpful articles from your results:

cyberwar* AND cost* NOT (simulation* OR game*)

Additional Suggested Search Terms for Cybersecurity

Some suggested subject terms/keywords to use in your searches:

  • clickjacking / keystroke logger
  • cyber crime / cybercrime
  • cyber defense
  • cyber operations
  • cyber security / cybersecurity
  • cyberspace
  • cyber warfare
  • data breach
  • data security
  • encryption
  • hacking / hackers / hacktivism
  • honeypot
  • information security
  • information warfare
  • malware
  • network attacks
  • phishing / spear phishing
  • ransomware
  • social engineering
  • spyware
  • white hat / black hat

Key Publications in Cybersecurity

DatabaseMilitary & Government Collection (Ebsco)

  • Designed to offer current news pertaining to all branches of the military and government, this database offers a thorough collection of periodicals, academic journals, and other content pertinent to the increasing needs of those sites.

Journal/Periodical titles Found in the Clover Park Library Databases:

Open Access (Free) Journals: