JSTOR is massive and multidisciplinary database which I
frequently used as an undergraduate student. Because JSTOR pulls from so many
different sources, it is an excellent beginning to this searching project,
allowing me to get a general idea of what types of research and reporting is
being done on cybersecurity today. I began my search with a quick and dirty
search for “cybersecurity”, returning a surprisingly manageable 118 results:

The results came from many different disciplines, including
science and technology, law, political science, history and public
administration/human resources. Nearly everyone on the first page was relevant
to the search. If I were simply trying to learn more about cybersecurity
generally, the very first results – Richard J. Harknett and James A Stever’s “The
New Policy World of Cybersecurity” – would have been a good start, providing a
general overview without getting too technical. However, it was not available
as a full-text document through JSTOR and I was forced to investigate other
options for obtaining that document.
In order to test out other functions of JSTOR, I performed a
second, advanced search for “cybersecurity” and “libraries”, limiting the
results to only those that were available strictly within JSTOR by deselecting
the option to link to external content.
Unfortunately, there were no articles that covered this more
specific topic exactly, but there were multiple articles, including the first
article listed (see above – titled “Wake Up The Nation: Public Libraries,
Policy Making and Political Discourse”) which discussed cybersecurity and privacy
concerns in addition to many other political issues that affect public
libraries and their continued funding.
What I Learned
Through the article I selected, I learned about the many different federal regulations that play a part in how libraries interact with their patrons and a patron's rights within a library. In addition to major pieces of legislation like the USA Patriot Act and the Homeland Security Act, there are regulations that control how a library can receive federal funding for technology and even regulations that allow the federal government to require libraries to offer free training for government applications to the public. In 2010, a new Broadband Act began to defund assistance to libraries, specifically funding to acquire faster and more secure internet access. This was a very enlightening article about the institution of public libraries and their interaction with the federal government.
Reflection
I found JSTOR very easy to use and, because of the limited
topic that I chose, the results were very reasonable. The advanced search
feature for JSTOR was easy to use, even if I had not already learned about
search strategies in my MLS education. Had I had a more broad topic, the
ability to search by discipline would have been very helpful. Another interesting feature of JSTOR are the
tabs above your search results that allow you to instantly sort for journal
articles, books or pamphlets, without having to go back and limit your search
again on the Advanced Search page.
I think JSTOR is a great place to start on a research
project because it brings together so many different resources from a variety
of disciplines. This is ideal for a subject like cybersecurity because concern
about this topic and of privacy in general affect scholars and students from
many different fields.