Article #1 Reviewing Cyber Journals
Victimization by Deepfake in the Metaverse: Building a Practical
Management Framework
This study has its roots in the laws of social science and explores the complications between
technology, human behaviors and society’s aftereffects. This research integrates criminological
theories with analysis of routine activities theory, Eysenck’s criminology theory and insights
from the metaverse in exploring the link between technology, criminality and virtual spaces. The
other questions are whether these theories can be applied to deepfake-related crimes in the
metaverse; what makes people use illicit deepfakes; how to design a comprehensive mitigation
framework. Thus, the study uses a mixed-methods approach which includes qualitative expert
interviews and quantitative online open sources analysis. It touches on concepts from
PowerPoint presentations that talk about problems faced by marginalized communities thus
providing useful ideas for making policies and laws as well as technological safeguards for a
secure digital environment.
Cyber Defamation Through the Media: Comparative Study of
Indonesia, South Korea and Malaysia
This study is about the effects of cyber defamation on society and it compares the regulatory
frameworks in Indonesia, Malaysia and South Korea. Research methods that will be used are normative juridical by analyzing secondary data with library research and documentation
searches. The paper analyzes regulations regarding cyber defamation crimes through conceptual,
statutory, and comparative approaches. Therefore, these findings contribute towards an
understanding of the legal landscape thereby guiding policy makers as well as practitioners to
refine legislative policies.By addressing issues surrounding cybercrimes especially in relation to
electronic media, this study seeks to promote a safer online environment towards substantial
contributions on societal development amidst technological advances.
Journal of Cybersecurity
This research was aimed at exploring how APTs affect organizations in terms of availability,
integrity and confidentiality of information. This survey draws on 45 studies found both from
academia and industry following the principles for systematic review to demonstrate that APTs
propagate themselves laterally and attack systemic weaknesses. The study offers a fresh
perspective by incorporating vulnerability assessment, multi-stage attack related behaviors and
visualization techniques to enhance APT detection accuracy. Stressing on proactive measures,
this study offers knowledge for cyber security literature that underscores the importance of
securing networks as well as understanding the societal implications involved. In conclusion,
there is a need to develop a comprehensive strategy which can be used to protect organizations
against sophisticated cyber threats.
Citations
Prayitno, K. P., & Bawono, I. R. (2023). View of cyber defamation through the media:
Comparative study of Indonesia, South Korea and Malaysia.
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/199/75
Stavola, J. & Choi, K. (2023). Victimization by Deepfake in the Metaverse: Building a Practical
Management Framework. International Journal of Cybersecurity Intelligence & Cybercrime: 6(2)
, . DOI:
https://doi.org/10.52306/2578-3289.1171
Nur Ilzam Che Mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah, A systematic
literature review on advanced persistent threat behaviors and its detection strategy, Journal of
Cybersecurity, Volume 10, Issue 1, 2024, tyad023, https://doi.org/10.1093/cybsec/tyad023