{"id":290,"date":"2025-02-07T00:10:15","date_gmt":"2025-02-07T00:10:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/?page_id=290"},"modified":"2025-04-30T00:26:48","modified_gmt":"2025-04-30T00:26:48","slug":"article-review","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/article-review\/","title":{"rendered":"Article Review One"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong><em>The Creation and Evaluation of the Cybersecurity Measurement Instrument used for<br>Undergraduate Students<\/em><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Introduction<\/strong><br>The Article I have chosen to review is and article from \u201ccybercrimejournal.com\u201d. The title<br>of it is \u201cDevelopment and Evaluation on Cybersecurity Behavior Measurement<br>Instruments for Undergraduate Students\u201d. It was written by Pannika Ngamcharoen,<br>Naksit Sakdapat, and Duchduen Emma Bhanthumnavin. In the article it covers many<br>different points of research and data that revolves around the overall topic.<br>Relations to the principles of social sciences<br>The Article explores undergraduates\u2019 perception of cyber threats using data and<br>multiple sources. It demonstrates principles of social science, including Determinism,<br>Ethical Neutrality, and objectivity. Determinism is evident in the researchers\u2019 focus on<br>self-protection and cybersecurity behaviors. Ethical Neutrality emphasizes the<br>importance of cybersecurity awareness without bias. Objectivity is demonstrated<br>through the methods used to gather statistics and date, supporting the conclusions<br>drawn.<br><strong>The Studies questions and hypotheses<\/strong><br>The research questions asked in the article are: \u201cAre the measurement instruments<br>used in the research reliable?\u201d, and \u201cHow is the reliability of measurement<br>instruments?\u201d. The Hypotheses that were made by the researchers in the article are: 1.<br>\u201cExploratory Factor Analysis (EFA) can effectively evaluate the cybersecurity behavior<br>measurement instrument, requiring a minimum of four items per component.\u201d (Pannika<br>Ngamcharoen et al., 2024). 2.\u201d Exploratory Factor Analysis can account for more than<br>60% of the variance in cybersecurity behavior (Tucker et al.,1997). 3. \u201cCFA will Validate<br>that the model satisfactory fits the empirical data\u201d (Pannika Ngamcharoen et al., 2024).<br><strong>The Research method<\/strong><br>The research method used is a quantitative research method. In the text it is said that<br>this research study\u201d seeks to develop and evaluate a robust measurement instrument<br>for assessing cybersecurity behavior\u201d. So, the overall goal of this method is to create<br>the measurement instrument for assessing behavior revolving around cybersecurity<br>while also using data gathered to evaluate whether or not it is validated.<br><strong>Types of data<\/strong><br>The Types of data Used in the article are Preliminary information of the samples they<br>had, Cybersecurity Behavior Measurement, and Inferential Statistics: Parametric<br>Statistics. The analysis shown in the research are three distinct types that revolve<br>around the statistics. As stated in the text the three are: \u201cAssessing the quality of<br>individual items, specifically utilizing independent-Sample t-test (Sedgwick,2010) a<br>Pearson\u2019s Correlation Coefficient Analysis (Obilor et al., 2018). The second type<br>consisted of Factor Analysis aimed at exploring the dimensions or structures of specific<br>characteristics of the items, which included both Exploratory Factor Analysis and<br>Confirmatory Factor Analysis and Confirmatory Factor Analysis. The third type involved<br>Inferential Statistics, with a particular focus on SEM Analysis (Stein et al., 2012).)<br><strong><em>Concept relationships with the PowerPoints<\/em><\/strong><br>The article discusses the concepts of understanding and learning cybersecurity through<br>module threes slides, like focusing on multi-method research (combining multiple types<br>of research). While also using module twos principles of social science. Lastly it also<br>covers Human Factors from Module four.<br><strong>Challenges, Concerns, and Contributions<\/strong><br>The Challenges that this article of research is the continuous evolution of cybersecurity<br>and cyberthreats as it continuously becomes more and more sophisticated. Another is<br>the validation of the results gathered from the research. The concerns of this are the<br>ethical neutrality as it is crucial when it comes to developing the instrument, another is<br>the way the instrument is made as its intended for undergraduates and not students of<br>different grades. The Contribution of this article is the measurement tool, The<br>awareness that the article spreads, and the future impacts that it might spark for<br>research on the topic.<br><strong>Conclusion<\/strong><br>So as seen and was explained the article explains well how the measurement tool used<br>to help with and evaluate Undergraduates behavior on cybersecurity with the help of the<br>data that was used to help the tool.<br><strong>References<\/strong><br>Ngamcharoen, P., Sakdapat, N., &amp; Bhanthumnavin, D. E. (2024). Development and<br>Evaluation on Cybersecurity Behavior Measurement Instruments for Undergraduate<br>Students [Review of Development and Evaluation on Cybersecurity Behavior<br>Measurement Instruments for Undergraduate Students]. International Journal of Cyber<br>Criminiology, 18(1), 139\u2013156.<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/351\/<br>103<br>Tucker, L. R., &amp; MacCallum, R. C. (1997). Exploratory factor analysis. Unpublished<br>manuscript, Ohio State University, Columbus,1-<br>459.https:\/\/www.ffzg.unizg.hr\/psihologija\/phm\/nastava\/Book_Exploratory%20Factor%20<br>Analysis.PDF<br>Sedgwick, P. (2010). Independent samples t test. Bmj, 340,1-<br>2.https:\/\/doi.org\/10.1136\/bmj.c2673<br>Obilor, E. I., &amp; Amadi, E. C. (2018). Test for significance of Pearson\u2019s correlation<br>coefficient. International Journal of Innovative Mathematics, Statistics &amp; Energy Policies,<br>6(1),11-23.https:\/\/www.researchgate.net\/profile\/Esezi-IsaacObilor\/publication\/343609693_Test_for_Significance_of_Pearson&#8217;s_Correlation_Coeffici<br>ent_r\/links\/5f33ebbf458515b72918a25b\/Test-for-Significance-of-Pearsons-CorrelationCoefficient-r.pdf<br>Stein, C. M., Morris, N. J., &amp; Nock, N. L. (2012). Structural Equation Modeling. In R. C.<br>Elston, J. M. Satagopan, &amp; S. Sun (Eds.), Statistical Human Genetics: Methods and<br>Protocols(pp. 495-512). Humana Press. https:\/\/doi.org\/10.1007\/978-1-61779-555-8_27<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Creation and Evaluation of the Cybersecurity Measurement Instrument used forUndergraduate Students IntroductionThe Article I have chosen to review is and article from \u201ccybercrimejournal.com\u201d. The titleof it is \u201cDevelopment and Evaluation on Cybersecurity Behavior MeasurementInstruments for Undergraduate Students\u201d. It was written by Pannika Ngamcharoen,Naksit Sakdapat, and Duchduen Emma Bhanthumnavin. In the article it covers manydifferent&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/article-review\/\">Read More<\/a><\/div>\n","protected":false},"author":30282,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/pages\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/users\/30282"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/pages\/290\/revisions"}],"predecessor-version":[{"id":328,"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/pages\/290\/revisions\/328"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/media?parent=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}