Article Review #1: The Legal Response to the Intrusion into Digital Identity in Social Media
Bryce Staples
School of Cybersecurity, Old Dominion University
CYSE 201S: Cybersecurity and the Social Sciences
Instructor Name: Diwakar Yalpi
Date: 2/26/2026
Intrusions into Digital Identity: Cybersecurity, Social Harm, and the Legal Response to Fake Online Profiles
With the rise in fake profiles on social media, Spain introduced an offense criminalizing the creation of fake accounts to protect privacy and personal integrity, underscoring the need for legal responses to new forms of cybercrime.
Introduction
Social media has brought the opportunity to connect and communicate with people, but it has also created pathways for cyber criminals. The article’s main focus was to analyze whether criminal law is the appropriate response to the rise in fake social media accounts. María González-García Vinuela examines how Spain has addressed this issue. Criminalizing the creation of fake profiles on social media. As the creation of fake profiles increases, people can readily assume another person’s identity and obtain personal information. The article also explores the legal and ethical implications of impersonating someone on social media, analyzing whether criminal law would be the most effective way to protect sensitive information. (Vinuela, n.d.).
Digital Identity and Social Science Principles
Your identity on social media highlights key principles of social science, including skepticism, ethical neutrality, and objectivity. Skepticism is applied throughout this article by questioning assumptions about behavior online and how effective legal responses are to fake profiles on social media. Ethical neutrality plays a part in this article by ensuring that researchers investigate cybercrime without a bias toward victims or the perpetrator, focusing more on the law and social impacts. Objectivity focuses more on evidence and systematic analysis rather than opinion. The article relates to objectivity by examining Spain’s legislation and legal systems. Vinuela maintains objectivity by researching the analysis of digital identity intrusion.
Research Question and Variables
In this article, the primary research question is whether it was an effective legal response to digital identity intrusion for Spain to criminalize the creation of social media profiles? The study in the article does not present hypotheses; it implies that the current legal provisions might have been enough to prosecute harmful conduct. In this analysis, the independent variable is the implementation of a new criminal offense targeting fake social media accounts, and the dependent variable is how effective protecting sensitive information and reducing related cyber crimes.
Research Methods and Types of Data and Analysis used
The article uses a qualitative research method, which focuses on analyzing laws rather than using surveys or conducting experiments. The author uses Spain’s criminal law reform on fake social media accounts. The study also evaluates how other countries address digital intrusion, such as Germany, Brazil, and Chile. The data that was used in the article consists of legal text from Spain and judicial decisions. The author systematically evaluates legislative intent and the necessity of criminalization. The study focuses more on logical reasoning, such as Spain’s criminalization of fake social media accounts.
Challenges and Concerns Towards Marginalized Groups
The problem with fake social media accounts and digital identity intrusion affects marginalized groups, including women, minors, and minorities, who are often targeted for harassment and scams. A fake account can also be used for non-consensual image distribution, bullying, and cyberstalking. This could also limit their participation on social media.
Conclusion
This study focuses more on Criminology out of all of the social science disciplines. The societal contribution of this study evaluates how legal systems respond to emerging forms of cybercrime. With the analysis of Spain’s criminalization of fake social media profiles, the study helps cybersecurity professionals understand the balance between keeping digital identities safe and avoiding over-criminalization. The study brings awareness of digital identity protection and regulating online behavior in a digital society.
Works Cited
Vinuela, M. G. (n.d.). The Legal Response to the Intrusion into Digital Identity in Social Media. Virtual Commons – Bridgewater State University. https://vc.bridgew.edu/ijcic/vol8/iss2/3/
Article Review #2: Cybercrime, Vulnerability and Digital Guardianship: Opportunity Structures and Prevention in a Changing Online Landscape
Bryce Staples
School of Cybersecurity, Old Dominion University
CYSE 201S: Cybersecurity and the Social Sciences
Instructor Name: Diwakar Yalpi
Date: 4/16/2026
Understanding Cybercrime Through a Social Lens: An Analysis of Vulnerability and Prevention
Cyber attacks are not just technological issues; they are a social problem driven by inequality, vulnerability, and human behavior. The studies in this article show that improving digital guardianship through education and addressing underlying social and economic conditions are important for effective prevention.
Introduction
The article Cybercrime, Vulnerability and Digital Guardianship: Opportunity Structures and Prevention in a Changing Online Landscape explains how cybercrime is shaped by not just technology but social and economic conditions. It shows two studies that explore prevention strategies and the main causes of cyber-enabled fraud. This article argues that understanding cyber attacks requires a social science perspective, focusing on human behavior and community structures.
Relation to Social Science Principles
In this article, cybercrime is deeply connected to social science principles, especially in sociology and criminology. The article explains how cybercrime is influenced by social environments, like poverty, education, and trust in companies. It also shows that human behavior and social norms play a major role in shaping criminal activity and victimization. This shows how cybercrime is also a social issue, not just a technological issue.
Research Questions, Hypotheses, and Variables
One of the studies in this article examines cybercrime in Nigerian slums and asks what social and economic factors contribute to constant scams like vishing. The hypothesis for this study is that offending and victimization have increased because of poverty, weak institutions, and normalized fraud. The independent variables include trust in the companies and socioeconomic status, while the dependent variable focuses on involvement in cybercrime and vulnerability to scams.
Research Methods That Were Used
The studies in this article rely on qualitative research methods to get a better understanding of human behavior and social context. The Nigerian study uses interviews with both victims and offenders, providing a perspective of cybercrime from both sides. Another study was the SHIELD study, which used interviews with participants who were a part of the training program to evaluate its effectiveness.
Types of Data and Analysis
The data collected for the Nigerian study is qualitative, using primarily interview responses and personal narratives. Researchers analyze this data by finding patterns and recurring themes such as trust and vulnerability. They also explore how cybercrime is learned and embedded within communities. For example, in the article, it says how offenders use low-priced technology like pre-registered SIM cards. (Toro-Alvarez & Lim, n.d., p. 3)
How This Relates to Course Concepts
The article relates to course concepts by highlighting social engineering, where criminals exploit human trust rather than technical weakness. It also talks about social vulnerability and how certain populations are at greater risk because of their social position.
How This Affects Marginalized Groups
Seniors are more likely to be seen as vulnerable because they may lack digital literacy and are just not familiar with technology. People who live in poor communities like the Nigerian slums also face a high risk of victimization because of how normalized fraud is. These challenges show how cybercrime can make marginalized groups a target or a participant.
Contributions to Society
This article contributes to society by giving a better understanding of cybercrime. By emphasizing the importance of digital guardianship, the article gives ways to reduce cybercrime. It also encourages individuals to be more cautious when it comes to digital literacy when it comes to phishing, vishing, or scams.
Conclusion
The article shows how cybercrime isn’t just technological; it is also shaped by social factors. Through analysis of prevention programs, it shows that for solutions to be effective, you must address human behavior and social structures. This article shows how society can make better decisions to oppose cybercrime.
Work Cited
Toro-Alvarez, M., & Lim, A. (n.d.). Cybercrime, Vulnerability and Digital Guardianship: opportunity Structures and prevention in a changing online landscape. Virtual Commons – Bridgewater State University. https://vc.bridgew.edu/ijcic/vol9/iss1/1/?utm_source=vc.bridgew.edu%2Fijcic%2Fvol9%2Fiss1%2F1&utm_medium=PDF&utm_campaign=PDFCoverPages