Article review 2
Ben Easterday
CYES 201
22 March 2024
Article review #2 Mitigating Ransomware Risks in Manufacturing and the Supply Chain:A
Comprehensive Security Framework
How the topic relates to the principles of the social sciences
Cybercrime and the social sciences have a unique relationship, which is explored in this
piece. It gives useful information about the complicated dynamics of illegal activities that happen
online. The goal of this study is to look into the social aspects of hacking by using basic ideas
from the social sciences. More specifically, it looks into how criminal behavior that happens
online is linked to the rules, structures, and interactions of everyday life. This method, which
looks into issues related to social control, power dynamics, and crime (including social control),
is in line with the ideas of both sociology and criminology.
The study’s research questions or hypotheses;
Issues or hypotheses that require additional examination are as follows: During the course
of reading this article, you can find yourself facing a number of issues, such as “What are the
socio-economic factors that influence engagement in cybercrime?” In what ways do social
networks and online communities make it easier for criminal activities to take place? To what
2
extent do people’ underlying psychological traits contribute to their propensity to perform
criminal acts?
The types of research methods used
The research approaches that were utilized include qualitative methodologies like as
interviews and content analysis. These methodologies were utilized in order to gain a better
understanding of the subjective experiences of cyber criminals and their victims. When
attempting to recognize patterns and correlations in the actions of cybercriminals, one might also
take into consideration the utilization of quantitative methods such as surveys or data mining.
The types of data and analysis done
There are many other types of data that can be evaluated, such as case studies of criminals,
transcripts of online chats, and statistical statistics on the prevalence of cybercrime. As part of
the analytical process, there are a number of techniques that can be utilized to unearth previously
concealed patterns and relationships. Some of these techniques include thematic coding,
statistical modeling, and network analysis.
How concepts from the PowerPoint presentations relate to the article
In PowerPoint presentations, an investigation of the relationship between concepts is
presented: For the purpose of providing an explanation for the origins of cybercrime as well as
its ongoing existence, it is highly probable that the article will make connections to many
conceptual frameworks, like how common phishing emails are and how hackers use lies to get
3
people to give up their personal information or click on harmful links. The piece could also talk
about the risks of giving out too much personal information online, which phishing scammers
could use to make convincing social engineering schemes.
How the topic relates to the challenges, concerns, and contributions of marginalized groups
The fact that marginalized communities may be more susceptible to cybercrime than
other communities is something that should be taken into consideration when considering the
difficulties and worries that marginalized groups experience. One of the primary reasons for this
is that they have restricted access to resources and a lower level of expertise with digital
technologies. There is also the possibility that they could experience increased surveillance and
bias online, which would further exacerbate the socioeconomic inequities that they are already
experiencing.
The overall contributions of the studies to society.
All things considered, the investigation’s findings offer significant insights into the
repercussions of cybercrime on society. Through the study of criminal behavior on the internet,
we are able to acquire precious insights that may be utilized in the development of efficient
techniques for intervention and prevention. It assists policymakers, law enforcement agencies,
and community organizations in the development of solutions that are more successful in
addressing the hazards that are posed by cyber threats.
References
4
International Journal of Cyber Criminology. (n.d.).
https://www.cybercrimejournal.com/previousissue.html
Blanche Palasi, 2024 PharmD Candidate St. John’s University College of Pharmacy &
Health Sciences Queens. (2022, June 16). Social Determinants of health and impact on
marginalized populations during COVID-19. U.S. Pharmacist – The Leading Journal in
Pharmacy. https://www.uspharmacist.com/article/social-determinants-of-health-and-impact-on-
marginalized-populations-during-covid19
Insights, G. (2024, March 1). Social injustice: Causes, consequences, and solutions. Gray Group
International. https://www.graygroupintl.com/blog/social-injustice