{"id":292,"date":"2024-04-22T23:04:36","date_gmt":"2024-04-22T23:04:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/?page_id=292"},"modified":"2024-04-22T23:04:36","modified_gmt":"2024-04-22T23:04:36","slug":"article-review-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/article-review-2\/","title":{"rendered":"Article review 2"},"content":{"rendered":"\n<p>Ben Easterday<br>CYES 201<br>22 March 2024<br>Article review #2 Mitigating Ransomware Risks in Manufacturing and the Supply Chain:A<br>Comprehensive Security Framework<br>How the topic relates to the principles of the social sciences<br>Cybercrime and the social sciences have a unique relationship, which is explored in this<br>piece. It gives useful information about the complicated dynamics of illegal activities that happen<br>online. The goal of this study is to look into the social aspects of hacking by using basic ideas<br>from the social sciences. More specifically, it looks into how criminal behavior that happens<br>online is linked to the rules, structures, and interactions of everyday life. This method, which<br>looks into issues related to social control, power dynamics, and crime (including social control),<br>is in line with the ideas of both sociology and criminology.<br>The study&#8217;s research questions or hypotheses;<br>Issues or hypotheses that require additional examination are as follows: During the course<br>of reading this article, you can find yourself facing a number of issues, such as &#8220;What are the<br>socio-economic factors that influence engagement in cybercrime?&#8221; In what ways do social<br>networks and online communities make it easier for criminal activities to take place? To what<\/p>\n\n\n\n<p>2<br>extent do people&#8217; underlying psychological traits contribute to their propensity to perform<br>criminal acts?<br>The types of research methods used<br>The research approaches that were utilized include qualitative methodologies like as<br>interviews and content analysis. These methodologies were utilized in order to gain a better<br>understanding of the subjective experiences of cyber criminals and their victims. When<br>attempting to recognize patterns and correlations in the actions of cybercriminals, one might also<br>take into consideration the utilization of quantitative methods such as surveys or data mining.<br>The types of data and analysis done<br>There are many other types of data that can be evaluated, such as case studies of criminals,<br>transcripts of online chats, and statistical statistics on the prevalence of cybercrime. As part of<br>the analytical process, there are a number of techniques that can be utilized to unearth previously<br>concealed patterns and relationships. Some of these techniques include thematic coding,<br>statistical modeling, and network analysis.<br>How concepts from the PowerPoint presentations relate to the article<br>In PowerPoint presentations, an investigation of the relationship between concepts is<br>presented: For the purpose of providing an explanation for the origins of cybercrime as well as<br>its ongoing existence, it is highly probable that the article will make connections to many<br>conceptual frameworks, like how common phishing emails are and how hackers use lies to get<\/p>\n\n\n\n<p>3<br>people to give up their personal information or click on harmful links. The piece could also talk<br>about the risks of giving out too much personal information online, which phishing scammers<br>could use to make convincing social engineering schemes.<br>How the topic relates to the challenges, concerns, and contributions of marginalized groups<br>The fact that marginalized communities may be more susceptible to cybercrime than<br>other communities is something that should be taken into consideration when considering the<br>difficulties and worries that marginalized groups experience. One of the primary reasons for this<br>is that they have restricted access to resources and a lower level of expertise with digital<br>technologies. There is also the possibility that they could experience increased surveillance and<br>bias online, which would further exacerbate the socioeconomic inequities that they are already<br>experiencing.<br>The overall contributions of the studies to society.<br>All things considered, the investigation&#8217;s findings offer significant insights into the<br>repercussions of cybercrime on society. Through the study of criminal behavior on the internet,<br>we are able to acquire precious insights that may be utilized in the development of efficient<br>techniques for intervention and prevention. It assists policymakers, law enforcement agencies,<br>and community organizations in the development of solutions that are more successful in<br>addressing the hazards that are posed by cyber threats.<br>References<\/p>\n\n\n\n<p>4<br>International Journal of Cyber Criminology. (n.d.).<br>https:\/\/www.cybercrimejournal.com\/previousissue.html<br>Blanche Palasi, 2024 PharmD Candidate St. John&amp;rsquo;s University College of Pharmacy &amp;<br>Health Sciences Queens. (2022, June 16). Social Determinants of health and impact on<br>marginalized populations during COVID-19. U.S. Pharmacist \u2013 The Leading Journal in<br>Pharmacy. https:\/\/www.uspharmacist.com\/article\/social-determinants-of-health-and-impact-on-<br>marginalized-populations-during-covid19<br>Insights, G. (2024, March 1). Social injustice: Causes, consequences, and solutions. Gray Group<br>International. https:\/\/www.graygroupintl.com\/blog\/social-injustice<a href=\"https:\/\/www.cybercrimejournal.com\/previousissue.html\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.uspharmacist.com\/article\/social-determinants-of-health-and-impact-on-marginalized-populations-during-covid19\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.uspharmacist.com\/article\/social-determinants-of-health-and-impact-on-marginalized-populations-during-covid19\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ben EasterdayCYES 20122 March 2024Article review #2 Mitigating Ransomware Risks in Manufacturing and the Supply Chain:AComprehensive Security FrameworkHow the topic relates to the principles of the social sciencesCybercrime and the social sciences have a unique relationship, which is explored in&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/article-review-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28416,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/pages\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/users\/28416"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/pages\/292\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/pages\/292\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ben-cyes201s\/wp-json\/wp\/v2\/media?parent=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}