Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Cybersecurity Research Guide

research and topic selection guide for cybersecurity course

Research Dos and Don'ts

  • DO find proper LEGAL SUPPORT for your paper.  Legal support can come from:

You may use news articles to support FACTUAL ASSERTIONS but not for legal support.  DON'T use news articles for legal support.  

  • DO conduct an interview, if desired, to obtain support for your paper.  The Bluebook has a citation format for interviews.
  • DO cite to reliable sources such as law review articles, primary sources of law, legal treatises, etc.  DON'T cite to Wikipedia or other web sources of questionable reliability.
  • DO start by searching law review and journal articles. Use Google Scholar, Lexis or Westlaw Edge and SSRN. 
  • DO consult legal treatises (books), especially for background information on the law.
  • DO consult scholarly articles from other disciplines, such as information technology.
  • DO search legislative history documents, especially if your paper revolves around a statute or sentencing guidelines.  Even if it does not, you can often find hearings containing expert testimony on many issues.