{"id":290,"date":"2024-04-22T22:58:13","date_gmt":"2024-04-22T22:58:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/?page_id=290"},"modified":"2024-04-22T22:58:13","modified_gmt":"2024-04-22T22:58:13","slug":"article-review-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/article-review-1\/","title":{"rendered":"Article review 1"},"content":{"rendered":"\n<p>Ben Easterday<br>CYES 201<br>10 Febuary 2024<br>Article Review #1 Digital Criminal Investigations in the Era of Artificial Intelligence<br>How the topic relates to the principles of the social sciences<br>The area of cybercrime explores the societal consequences and behavioral aspects of<br>unlawful activities conducted in digital environments, establishing connections with the<br>fundamental concepts of the social sciences. To understand the complexities of cybercriminal<br>behavior, an interdisciplinary approach is employed, drawing from several domains of social<br>science such as sociology, psychology, and criminology (Mehra &amp; Singh, 2023)<br>The study&#8217;s research questions or hypotheses;<br>The study presumably presents research inquiries aimed at clarifying the motives<br>underlying cybercriminal acts, the techniques they employ, and the consequences they generate.<br>These issues may address the factors that motivate individuals to commit cybercrimes, the<br>efficacy of existing cybersecurity solutions, and the socio-economic consequences of computer<br>hazards(Mehra &amp; Singh, 2023)<br>The types of research methods used<\/p>\n\n\n\n<p>2<br>The study may have employed a combination of qualitative research methods, such as<br>interviews, content analysis, and case studies, together with quantitative approaches, such as<br>surveys, statistical analysis, and data mining tools. By employing a mixed-methods approach, it<br>becomes feasible to comprehensively examine the issue of cybercrime. This technique enables<br>the collection of detailed information about individual experiences, as well as the identification<br>of broader patterns and trends related with digital crime(Mehra &amp; Singh, 2023)<br>The types of data and analysis done<br>Data collection entails the acquisition of information from diverse sources, such as law<br>enforcement records, victim reports, online forums, and government cyber event statistics.<br>Thematic coding, descriptive statistics, regression analysis, and network analysis are all<br>analytical methods that can be employed to uncover concealed patterns, correlations, and causal<br>connections within the data(Mehra &amp; Singh, 2023).<br>How concepts from the PowerPoint presentations relate to the article<br>Honeypots could be used to find and study cybercriminal behavior before it happens,<br>which fits with the study&#8217;s goal of figuring out how complex cybercrime is. By putting honeypots<br>in networks or systems, researchers can distract cyberattackers from legitimate targets, learn<br>useful information about attack methods, and test how well current security measures are<br>working Along with the study&#8217;s main goal of learning more about hacking (Rapid7, 2020),<br>honeypots are also used as research tools to look into malicious behavior and help make defenses<br>that are stronger.<\/p>\n\n\n\n<p>3<br>How the topic relates to the challenges, concerns and contributions of marginalized groups<br>Cybercrime poses significant challenges and worries for vulnerable communities. These<br>groups are more vulnerable to cybercrime and have limited access to cybersecurity resources.<br>The absence of adequate assistance often faced by vulnerable communities, coupled with the<br>potential for cybercriminals to disproportionately target them, can worsen the existing<br>socioeconomic disparities (Jackson et al., 2018).<br>The overall contributions of the studies to society.<br>This study has made significant contributions to society by enhancing comprehension of<br>cyber dangers, formulating policies and intervention strategies to counter digital crime, and<br>fostering awareness of the socio-economic consequences of cybercrime on individuals and<br>communities. This study aims to enhance the advancement of more efficient strategies to<br>safeguard individuals and organizations against digital threats (Mehra &amp; Singh, 2023)<br>. This is achieved by illuminating the complexities of cybercriminal behavior.<br>References<br>Mehra, S., &amp; Singh, A. (2023). View of digital criminal investigations in the era of<br>artificial intelligence: A comprehensive overview. International Journal of Cyber Criminology,<br>17(1), 1-23.<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/189\/71<br>Rapid7. (n.d.). Honeypots. Retrieved February 11, 2024, from<br>https:\/\/www.rapid7.com\/fundamentals\/honeypots\/<a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/189\/71\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p>4<br>Jackson, K. M., Pukys, S., Castro, A., Hermosura, L., Mendez, J., Vohra-Gupta, S., Padilla, Y.,<br>&amp; Morales, G. (2018, February). Using the transformative paradigm to conduct a mixed<br>methods needs assessment of a marginalized community: Methodological lessons and<br>implications. Evaluation and program planning.<br>https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC10371208\/<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ben EasterdayCYES 20110 Febuary 2024Article Review #1 Digital Criminal Investigations in the Era of Artificial IntelligenceHow the topic relates to the principles of the social sciencesThe area of cybercrime explores the societal consequences and behavioral aspects ofunlawful activities conducted in&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/article-review-1\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28416,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/pages\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/users\/28416"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/pages\/290\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/pages\/290\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/media?parent=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}