{"id":260,"date":"2026-04-25T17:59:48","date_gmt":"2026-04-25T17:59:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alewi073\/?p=260"},"modified":"2026-04-25T17:59:48","modified_gmt":"2026-04-25T17:59:48","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/alewi073\/2026\/04\/25\/article-review-2\/","title":{"rendered":"Article Review #2"},"content":{"rendered":"\n<p><strong>Understanding Cyber Crime And Social Behavior in the Digital Age<\/strong><\/p>\n\n\n\n<p>Introduction:<br>The article explores how cybercrime is influenced by human behavior, social structures, and<br>technological access. The main takeaway (BLUF) is that cybercrime is not just a technical issue,<br>but heavily shaped by social science factors like environment, opportunity, and behavior<br>patterns.<br><\/p>\n\n\n\n<p>Relation\/Connection to Social Science Principles:<br>The article connects to several social science principles. First, it reflects rational choice theory,<br>showing how people make calculated decisions to commit cybercrime based on risk vs. reward.<br>Second, it relates to social learning theory, where people learn cybercriminal behavior through<br>online communities and peer influence. Third, the article highlights routine activity theory,<br>explaining that cybercrime occurs when a motivated offender, a suitable target, and the lack of<br>guardianship exist online. These principles help explain why cybercrime continues to grow as<br>technology becomes more accessible.<br><\/p>\n\n\n\n<p>Research Question\/Hypothesis\/Independent Variable\/Dependent Variable:<br>The main research question focuses on how social and environmental factors influence<br>cybercriminal behavior. The hypothesis suggests that people exposed to certain online<br>environments and opportunities are more likely to engage in cybercrime. The independent<br>variables include factors like access to technology, social exposure to cybercrime, and online<br>environments. The dependent variable is the likelihood or occurrence of cybercriminal behavior.<br><\/p>\n\n\n\n<p>Types of Research Methods Used:<br>The study primarily uses qualitative research methods, including analysis of existing literature<br>and case studies related to cybercrime. It may also incorporate some quantitative elements, such<br>as statistical data on cybercrime trends. Data is collected through academic sources, reports, and<br>documented cybercrime cases.<br><br>Types of Data Analysis Used:<br>The authors use thematic analysis to identify patterns in cybercriminal behavior and trends<br>across different cases. They also rely on comparative analysis to examine how different social<br>factors influence cybercrime. This allows them to connect behavior patterns with broader social<br>science theories.<br><\/p>\n\n\n\n<p>Connections to Other Course Concepts:<br>This study connects to several concepts discussed in class. For example, it reinforces the idea of<br>security fatigue, where users become careless online, increasing vulnerability. It also relates to<br>social engineering, as cybercriminals exploit human behavior rather than just technical<br>weaknesses. Additionally, the article supports the concept of risk perception, showing that people<br>often underestimate cybersecurity threats, making them easier targets.<\/p>\n\n\n\n<p>Connections to the Concerns or Contributions of Marginalized Groups:<br>The article highlights that marginalized group maybe more vulnerable to cybercrime due to<br>limited access to cybersecurity education and resources. For example, individuals from lower<br>income backgrounds may lack awareness of online threats, making them easier targets. At the<br>same time, these groups can also contribute to cybersecurity solutions by bringing diverse<br>perspectives and experiences that improve threat detection and prevention strategies.<br><\/p>\n\n\n\n<p>Conclusion to Societal Contributions of the Study:<br>In conclusion, the study contributes to society by emphasizing that cybersecurity is not just about<br>technology, but also about understanding human behavior. It helps improve awareness of how<br>social factors influence cybercrime and encourages better education and prevention strategies.<br>The research advances our understanding of the relationship between cybersecurity and social<br>sciences, making it easier to develop more effective solutions to cyber threats.<br><br>References:<br>Vishing and Smishing Perpetrators and Their Victims in Nigerian Slums. Lateef J Adeyemo,<br>Tirimisiyu Y Olabulo, and Idenyi G. Peter<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding Cyber Crime And Social Behavior in the Digital Age Introduction:The article explores how cybercrime is influenced by human behavior, social structures, andtechnological access. The main takeaway (BLUF) is that cybercrime is not just a technical issue,but heavily shaped by social science factors like environment, opportunity, and behaviorpatterns. Relation\/Connection to Social Science Principles:The article connects [&hellip;]<\/p>\n","protected":false},"author":32118,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/260"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/users\/32118"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/comments?post=260"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/260\/revisions"}],"predecessor-version":[{"id":261,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/posts\/260\/revisions\/261"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/media?parent=260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/categories?post=260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/tags?post=260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}