{"id":366,"date":"2024-04-16T23:45:37","date_gmt":"2024-04-16T23:45:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/calebbryant\/?p=366"},"modified":"2024-04-16T23:45:37","modified_gmt":"2024-04-16T23:45:37","slug":"article-review-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/calebbryant\/2024\/04\/16\/article-review-1\/","title":{"rendered":"Article review #1"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Article #1 Reviewing Cyber Journals<br>Victimization by Deepfake in the Metaverse: Building a Practical<br>Management Framework<br>This study has its roots in the laws of social science and explores the complications between<br>technology, human behaviors and society\u2019s aftereffects. This research integrates criminological<br>theories with analysis of routine activities theory, Eysenck\u2019s criminology theory and insights<br>from the metaverse in exploring the link between technology, criminality and virtual spaces. The<br>other questions are whether these theories can be applied to deepfake-related crimes in the<br>metaverse; what makes people use illicit deepfakes; how to design a comprehensive mitigation<br>framework. Thus, the study uses a mixed-methods approach which includes qualitative expert<br>interviews and quantitative online open sources analysis. It touches on concepts from<br>PowerPoint presentations that talk about problems faced by marginalized communities thus<br>providing useful ideas for making policies and laws as well as technological safeguards for a<br>secure digital environment.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Cyber Defamation Through the Media: Comparative Study of<br>Indonesia, South Korea and Malaysia<br>This study is about the effects of cyber defamation on society and it compares the regulatory<br>frameworks in Indonesia, Malaysia and South Korea. Research methods that will be used are normative juridical by analyzing secondary data with library research and documentation<br>searches. The paper analyzes regulations regarding cyber defamation crimes through conceptual,<br>statutory, and comparative approaches. Therefore, these findings contribute towards an<br>understanding of the legal landscape thereby guiding policy makers as well as practitioners to<br>refine legislative policies.By addressing issues surrounding cybercrimes especially in relation to<br>electronic media, this study seeks to promote a safer online environment towards substantial<br>contributions on societal development amidst technological advances.<br>Journal of Cybersecurity<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>This research was aimed at exploring how APTs affect organizations in terms of availability,<br>integrity and confidentiality of information. This survey draws on 45 studies found both from<br>academia and industry following the principles for systematic review to demonstrate that APTs<br>propagate themselves laterally and attack systemic weaknesses. The study offers a fresh<br>perspective by incorporating vulnerability assessment, multi-stage attack related behaviors and<br>visualization techniques to enhance APT detection accuracy. Stressing on proactive measures,<br>this study offers knowledge for cyber security literature that underscores the importance of<br>securing networks as well as understanding the societal implications involved. In conclusion,<br>there is a need to develop a comprehensive strategy which can be used to protect organizations<br>against sophisticated cyber threats.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Citations<br>Prayitno, K. P., &amp; Bawono, I. R. (2023). View of cyber defamation through the media:<br>Comparative study of Indonesia, South Korea and Malaysia.<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/199\/75<\/p>\n\n\n\n<p class=\"has-text-align-left\">Stavola, J. &amp; Choi, K. (2023). Victimization by Deepfake in the Metaverse: Building a Practical<br>Management Framework. International Journal of Cybersecurity Intelligence &amp; Cybercrime: 6(2)<br>, . DOI:<br>https:\/\/doi.org\/10.52306\/2578-3289.1171<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Nur Ilzam Che Mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah, A systematic<br>literature review on advanced persistent threat behaviors and its detection strategy, Journal of<br>Cybersecurity, Volume 10, Issue 1, 2024, tyad023, https:\/\/doi.org\/10.1093\/cybsec\/tyad023<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article #1 Reviewing Cyber JournalsVictimization by Deepfake in the Metaverse: Building a PracticalManagement FrameworkThis study has its roots in the laws of social science and explores the complications betweentechnology, human behaviors and society\u2019s aftereffects. This research integrates criminologicaltheories with analysis of routine activities theory, Eysenck\u2019s criminology theory and insightsfrom the metaverse in exploring the link&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/calebbryant\/2024\/04\/16\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":27571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts\/366"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/users\/27571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/comments?post=366"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts\/366\/revisions"}],"predecessor-version":[{"id":367,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts\/366\/revisions\/367"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/media?parent=366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/categories?post=366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/tags?post=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}