{"id":377,"date":"2024-04-04T15:17:18","date_gmt":"2024-04-04T15:17:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bgree041\/?p=377"},"modified":"2024-04-04T15:17:18","modified_gmt":"2024-04-04T15:17:18","slug":"article-two-review","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bgree041\/2024\/04\/04\/article-two-review\/","title":{"rendered":"Article Two Review"},"content":{"rendered":"\n<p>Do people have to worry about privacy threats in an intimate relationship? Today, we will explore privacy threats in intimate relationships by Karen Levy and Bruce Schneier. With more people on the Internet and computers getting smaller and smaller, people run the risk of privacy threats in their relationships from abusers. This paper will explore the typical privacy concerns and scale of intimate threats.<\/p>\n\n\n\n<p>How does this paper relate to social science principles is victimization because disproportionately, these issues affect &#8220;women, children, the elderly, and the physically or cognitively impaired&#8221; (Levy and Schneier). The attackers want to target vulnerable people in intimate relationships where one person works and the other stays at home (Levy and Schneier). The person who stays at home is more vulnerable to financial issues from an abusive partner.<\/p>\n\n\n\n<p>The research question\/hypothesis explored in this paper is that intimate threats present unique challenges distinct from traditional privacy concerts. The paper aims to uncover their common characteristics. The research methods used in &#8220;Privacy threats in intimate relationships&#8221; are qualitative and quantitative methods such as journals, case studies, and statistics. These bring different types of papers into perspective. Allowing researchers to see the bigger picture and help try to explain the privacy threats and how parents can help stop it or how to recognize it.<\/p>\n\n\n\n<p>This article relates to class in multiple ways because it uses victimization, multi-method research, human factors, neutralization theory, and psychological consequences of victimization. Case point: victimization can come from a lover or a friend with benefits, causing emotional stress and anguish and leading to the person not wanting to lose their lover or friend and leading themselves into victimization. The article also relates to human factors with this quote, &#8220;System designers should consider that sharing preferences will change: couples will break up, children will grow up, and roommates will move in and out&#8221; (Levy and Schneier). A system designer needs to consider these human factors when creating an application. Another example is the neutralization theory. An attacker might think everything is okay because they are in a relationship with the victim. One example is going through the phone, or constantly checking the person&#8217;s messages. However, it can evolve to the attacker wanting control over the victim\u2014finally, psychological consequences of victimization. Victims might be afraid or embarrassed by what has happened and may not report the privacy threats. This is a big issue for men that are abused because they feel ashamed.<\/p>\n\n\n\n<p>How does this paper relate to the challenges, concerns, and contributions of marginalized groups by relating to women, children, and the physically or cognitively impaired population? For women, this could be physical or psychological abuse from a lover. In addition, the lover could be motivated to control her because of jealousy or fear. &#8220;Children are among the most marginalized and vulnerable members of society and are rarely consulted about how communities make decisions affecting them directly&#8221; (Children | UN Global Compact). Finally, physically or cognitively impaired people, abuse can come from caregivers and nurses. This can lead to them not speaking out and being in fear for their life, or they might not be able even to remember what happened to them to report it.<\/p>\n\n\n\n<p>How does this study contribute to social improvement by bringing awareness to the fact that there are threats in intimate relationships? However, there are also privacy threats in intimate relationships. Another reason this study contributes to societal improvement is because it also shows that caregivers can cause abuse to the elderly.<\/p>\n\n\n\n<p>To bring everything together, Karen Levy and Bruce Schneier&#8217;s exploration of privacy threats in intimate relationships displays a sobering reality of what can happen in intimate relationships. This paper sheds light on the power dynamic and vulnerability of marginalized groups such as women, children, the elderly, and the physically or cognitively impaired. Furthermore, the paper uses qualitative data better to understand the effects of privacy threats in intimate relationships.<\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<p>\u201cChildren | UN Global Compact.\u201d Unglobalcompact.org, unglobalcompact.org\/what-is-gc\/our-work\/social\/childrens-rights#:~:text=Children%20are%20among%20the%20most.<\/p>\n\n\n\n<p>Levy, Karen, and Bruce Schneier. \u201cPrivacy Threats in Intimate Relationships.\u201d Journal of Cybersecurity, vol. 6, no. 1, 1 Jan. 2020, https:\/\/doi.org\/10.1093\/cybsec\/tyaa006.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do people have to worry about privacy threats in an intimate relationship? Today, we will explore privacy threats in intimate relationships by Karen Levy and Bruce Schneier. With more people on the Internet and computers getting smaller and smaller, people run the risk of privacy threats in their relationships from abusers. This paper will explore&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bgree041\/2024\/04\/04\/article-two-review\/\">Read More<\/a><\/div>\n","protected":false},"author":27155,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[7],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bgree041\/wp-json\/wp\/v2\/posts\/377"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bgree041\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bgree041\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bgree041\/wp-json\/wp\/v2\/users\/27155"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bgree041\/wp-json\/wp\/v2\/comments?post=377"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/bgree041\/wp-json\/wp\/v2\/posts\/377\/revisions"}],"predecessor-version":[{"id":378,"href":"https:\/\/sites.wp.odu.edu\/bgree041\/wp-json\/wp\/v2\/posts\/377\/revisions\/378"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bgree041\/wp-json\/wp\/v2\/media?parent=377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bgree041\/wp-json\/wp\/v2\/categories?post=377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bgree041\/wp-json\/wp\/v2\/tags?post=377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}