Article Review #1
The Importance of Digital Compliance In the Workplace
https://www.cybercrimejournal.com/
Introduction
The study/article I’ve chosen to discuss examines how cybersecurity influences the development of the digital workplace across a wide range of Iraq businesses. The diverse viewpoints held by management and staff also demonstrate their attitudes toward and observance of the cybersecurity measures that have been implemented.
Personal Thoughts
As I read the story, I became aware of the social exclusion that Iraq experiences. I mention this because Iraq lacks comprehensive cybersecurity education because they do not have the same educational resources. They will also encounter a lack of security resources if they do not possess cybersecurity knowledge.With that being said, how can individuals properly comprehend data protection and cybersecurity in their place of employment? These additional worries then result in security and privacy issues for Iraq in the job/cyber world.
Class Relation
This paper makes excellent and numerous connections between social science and cybersecurity. These methods include behavior and risk, variety, and study.To begin with, they conducted study utilizing surveys, a social science research methodology. They employed a multi-research approach in addition to questionnaires, which was also applied in this workplace. Diversity is the second relationship; it was deliberated over and decided upon. We already studied in 201S how diversity fosters advancement in the cybersecurity industry.Finally, conduct and danger. As previously discussed, in the world of cyberspace, innocent people might easily fall prey to hackers. An individual may become a victim of cybercrime due to their actions and/or ways.
Hypothesis
Upon reading the text, several hypotheses were established prior to the study’s execution. According to the expert, “performance in the digital workplace is considerably positively impacted by organizational cybersecurity determinants (Nazem et al., 2023).” Based on my analysis, it appears that employees are generally in favor of utilizing cybersecurity since they are aware of the potential consequences of an attack. Sensitive data loss could result from this, which would be bad for the business in the long run.
Research Method and Data
The researchers used the quantitative method to gather data for this work. They employed this strategy by providing managers and staff with a survey to fill out. They might determine how well managers and employees adhere to established policies using this data. Their attitude about the policies and acts was also revealed by the study. The researchers examined the data to ascertain the efficacy of cybersecurity in the workplace.
Conclusion
To sum up, this study was excellent. It illustrated how crucial it is for workers in Iraq to have positive attitudes and follow rules and policies in the workplace. Furthermore demonstrating the significance of having strong cybersecurity protocols is this research. Making sure the business is safely protected from any attempted cyberthreats is crucial. As was previously mentioned, it is crucial that businesses constantly strive to improve their security procedures.
Article Review #2
Cybersecurity When Working From Home During COVID-19
Introduction
This particular research study goes in-depth on the impact and effectiveness of cybersecurity practices during COVID-19 from the lenses of remote workers. Remote work as we know it today has become the norm for millions of employees across the world. Whitty, Mustafa, and Grobler from this study discuss the challenges of maintaining safe cybersecurity practices while teleworking as it relates to cybersecurity technicalities and human behavior, bridging the gap between cybersecurity and social sciences.
Personal Thoughts
One of the critical questions that was discussed in the article was how employees learned and understood good cybersecurity practices during sudden lockdowns and how they were adopted at home. As I sat with this question I began to wonder how it was for me personally when the world had suddenly changed. There had suddenly been a shift in responsibilities for students as well across all grade levels to use school sponsored laptops and tablets. I began to reflect on the training that had been given to us prior to receiving the devices at the start of the school year. A responsible briefing of responsibilities and safe practices to combat security breaches should be the top priority of every organization. Remote workers should always be required to complete a mandatory training on the importance of cyber awareness and safe practices prior to being given credentials in order to prevent certain base level issues.
Class Relation
The core of this research article discusses the human factor in the surveyed employees cyber security practices. It mentions how certain psychological and sociological factors have a significant impact on how well workers implement safe practices while working online. This is a great example as to how social sciences influences the technical aspect of cybersecurity. Especially since we are aware that an one size fits all approach does not equate well with the evolving field of cybersecurity.
Hypothesis
“We suggest that cyber educators and policymakers take a Vygotskian approach, which considers that social interaction is central to learning” (Whitty, Moustafa, & Grobler, 2024). This quote speaks to the theory that researchers have developed after gathering data from this particular study. This hypothesis also supports my personal thoughts from earlier in this writing. The evidence from the surveys show support as to why the assumption of secure online practices from employees without adequate preparation is counterproductive.
Research Method and Data
Researchers chose to survey a group of 27 individuals in Australia, a quantitative approach to gathering data. The participants occupations were diverse being that workers ranged from age 25 to 72 and were employed in the field of IT, education, public relations, sales, public services, consulting, food manufacturer, scientist, marketing, fundraising, solicitor, administrator, travel agent, and a financial planner. It is important to mention that all 27 employees had been working in-office prior to the pandemic.
Conclusion
This particular research article was an outstanding read. Researchers provided great detail at the intersection of social sciences and cybersecurity for remote workers during a historical period of time. After examining the article, readers of all demographics should come away with a new insight of how certain human factors influence employees and their production of safe, smart, and logical cyber security best practices.