Article Review #1 Principles of Social Sciences
Research Methods
The research question the article asks is “how incident reporting of suspicious behavior mediates relationships in the realm of cybersecurity incident management…” (Muthuswamy & Esakk, 2024). This means when incidents of cyber threats are reported in an organization, information is passed along through the cybersecurity team which makes the system more efficient.
The article refers to different studies done that indicate why reporting suspicious behavior is so crucial to the cybersecurity team. A key principle of science is to test theories, collect data, and gain knowledge about the world that we live in. “…the impact of evidence-based anti-malware training on employees’ risk perception and subsequent behaviours. Research indicates that cybersecurity training is pivotal in shifting workplace mindsets toward cybersecurity” (Muthuswamy & Esakk, 2024). The research the article uses proves the importance of educating and training employees on the best practices to reduce cyberthreats by incident reporting.
Social Science Concepts
The article is related to victim precipitation which is an explanation in social science that means to identify how the actions of a victim’s behaviors led them to a certain situation. When you apply this concept to cyber victimization it can help us to create tools to better protect people and make them more aware of threats or attacks. “Organizational security, especially within safety-critical systems and smart spaces, relies heavily on effective incident reporting mechanisms” (Muthuswamy & Esakk, 2024). From the article we know that an organization’s security depends on the reporting of incidents to be able to prevent other occurrences. We can use past behaviors to change and better technology. This keeps everyone safe and reduces the risk of more victims.
Another social science principle related to the article is determinism. It is key to understanding why individuals make the choices they do in cybersecurity. “..reinforces this argument by demonstrating how training and repeated reminders can influence secure behaviours in the workplace” (Muthuswamy & Esakk, 2024). This can allow an organization to know how someone was able to access a computer without authorization, then using this information for incident reports. This would help prevent similar situations from happening.
Challenges of Marginalized Groups
A challenge for marginalized groups could be their fear of repercussions if they report an incident that was not intentional. This could be a significant concern that would result in them not telling their organization of an incident causing it to get worse or happen to another employee.
Contributions to Society
The overall contribution of the studies in the article is impactful to society. When employees know how to handle threats from prior experience such as other reports, this will create a proactive approach for any other situation that could occur.
Conclusion
Ultimately, this article highlights the importance of having employees that can respond appropriately to incidents that happen within the organization and the best way to manage them to mitigate risks. Social science principles are mentioned and used throughout the article to help articulate and explain the author’s main point.
Reference
Muthuswamy, Vimala. Esakk, Suresh. 2024. Impact of Cybersecurity and AI’s Related Factors onIncident Reporting Suspicious Behaviour and Employees Stress: Moderating Role of Cybersecurity Training. Open Access.
Article Review #2 Privacy Threats in Relationships and the Principles of Social Sciences
Principles of Social Science
The article “Privacy Threats in Intimate Relationships”, explains the challenges of privacy violations with people close to you. It expresses how trust can be taken advantage of and shared access to technology can be misused by an individual. This article connects the abuse of power to social science principles. For example, determinism can explain the influence and underlying cause of the problem. When understanding the privacy violations being taken through an unbiased approach, you are able to analyze the patterns made, which is objectivity. Relativism is also an essential part of the article because it expresses how privacy varies by culture and relationship status. The closer you are with someone, the more likely you are to share more personal information or even data like usernames and passwords.
Research Questions and Methods
The research questions the article asks pertain to the violation of privacy that occurs through technology. What are the psychological and social impacts of privacy violations? Also, how can we design technology that mitigates privacy even in close relationships?
The research methods used in this article are from different disciplines such as sociology, psychology, and cybersecurity. This interdisciplinary approach allows researchers to better understand how intimate relationships are so susceptible to technological privacy concerns. There are surveys used, with analytical, empirical, and behavioral research.
Human Centered Cybersecurity Can Help
The goal of the article is to bring awareness to the harm that comes from privacy being violated from a close relationship. The article talks about creating technology as well as policies that would address this issue properly. One way to do that is to apply human centered cybersecurity to the topic at hand. More privacy features could be implemented on devices that help empower individuals to keep control of their access to their own device. As well as more information on why people shouldn’t be so quick to share information with one another and what it may cause in the long run.
Challenges of Marginalized Groups
A challenge for some may be their limited access to technology. Some people may have to share a device for financial reasons, leaving personal information available to anyone who has access to it. This creates a huge risk for someone’s privacy to be violated at home. Others could be in abusive relationships where their significant other doesn’t want things to be hidden from them so they may do manipulative things like check their phone and keep track of their personal data. Limited access to a support system or resources in this situation could make someone more vulnerable to privacy issues with technology.
Contributions to Society
The overall contribution of the studies in the article highlights the need for more privacy in intimate relationships regardless of the connection. It also signifies the privacy risk and the violation of personal information being taken from people. Some may think cybersecurity is for businesses but it is important at home as well. More effort should be put in to protect all users of technology. Passwords for social media accounts or entertainment are commonly shared among people, technology has somewhat adapted to this by creating a simple design where the guest can send a code to allow access to an account.
Reference
Karen Levy, Bruce Schneier, Privacy threats in intimate relationships, Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa006, https://doi.org/10.1093/cybsec/tyaa006