{"id":95,"date":"2025-09-21T01:16:37","date_gmt":"2025-09-21T01:16:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=95"},"modified":"2026-05-06T01:49:20","modified_gmt":"2026-05-06T01:49:20","slug":"cybersecurity-fundamentals","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cortinez\/cybersecurity-fundamentals\/","title":{"rendered":"Reviews"},"content":{"rendered":"\n<p>Benjamin Cortinez&nbsp;<\/p>\n\n\n\n<p>ODU&nbsp;<\/p>\n\n\n\n<p>24Feb2026&nbsp;<\/p>\n\n\n\n<p>CYSE 201S&nbsp;<\/p>\n\n\n\n<p>Dr. Jordan Quinn&nbsp;<\/p>\n\n\n\n<p>Article Review 1: The Interdisciplinary Evolution of Cybercrime and Digital Victimization&nbsp;<\/p>\n\n\n\n<p><strong>Principles of the Social Sciences:<\/strong>&nbsp;The editorial introduction by Kayser and Choi (2025) connects to social science principles like social structures and how humans act in digital spaces.&nbsp;Basically, the&nbsp;text uses Deviant Place Theory to show how someone\u2019s location or the digital sites they visit can make them more likely to be a victim. From a sociological view, the research sees cybercrime as more than just a computer problem. It is a result of human interaction, building trust with the wrong people, and how we define identity legally. By looking at how scammers use social rules about romance or how certain groups in Nigeria are hit harder, the work fits the social science goal of seeing how our environment and social labels change how people behave.&nbsp;<\/p>\n\n\n\n<p><strong>Research Overview: Questions, Hypotheses, and Variables<\/strong>: This editorial covers a few different studies, but the main research question is about how new digital tools like blockchain and&nbsp;open source&nbsp;intelligence change what it means to be a victim and how we hold people accountable. We can pick out some variables from these summaries. In the study about Nigerian internet users, the Independent Variable is where the users are&nbsp;located&nbsp;socially or geographically. The Dependent Variable is the actual rate and type of cybercrime they face. In the romance&nbsp;scam&nbsp;study, the Independent Variable is the use of&nbsp;high tech&nbsp;money laundering like mixers, while the Dependent Variable is the&nbsp;1.1 billion dollar&nbsp;loss and the fact that police cannot track the money. The general hypothesis here is that as digital tools get more anonymous, victimization goes up because it is harder for the law to catch anyone.&nbsp;<\/p>\n\n\n\n<p><strong>Research Methodology<\/strong>: The journal uses a mix of research methods to get the full picture. The first study uses technical blockchain forensics, which is a type of digital quantitative analysis used to follow money patterns. The second study uses a legal dogmatic and comparative method, which is a qualitative way of looking at laws and international agreements like the Budapest Convention. The third study looks at investigation patterns over a long time from 2014 to 2024, and the last study uses a survey of 924 internet users to get real numbers on how many people are being targeted.&nbsp;<\/p>\n\n\n\n<p><strong>Types of Data and Analysis Done<\/strong>: The data in these studies is all over the place, ranging from financial logs for Bitcoin or Ethereum to legal documents and surveys where people report their own experiences. The analysis includes thematic categorization, which means putting crimes into groups like cyber enabled versus cyber dependent. They also used forensic mapping to see how people hide cryptocurrency. The researchers used comparative analysis to see where Spanish law does not match up with international privacy rules. All of this is done to understand the Modus Operandi, or the specific way these criminals&nbsp;operate, rather than just looking at basic stats.&nbsp;<\/p>\n\n\n\n<p><strong>Connection to Course Concepts<\/strong>: The article ties back to ideas from&nbsp;the PowerPoints&nbsp;like Social Control and Inequality. The talk about criminal law being a last resort relates to Formal Social Control and the big debate over how much the government should be allowed to&nbsp;look into&nbsp;our digital lives. Also, the mention of how there is&nbsp;a low risk&nbsp;of getting caught but a high reward for the criminal sounds a lot like Rational Choice Theory. This is an idea often found in social science where people weigh the pros and cons before they decide to break the law.&nbsp;<\/p>\n\n\n\n<p><strong>Impact on Marginalized Groups<\/strong>: A big part of this article is about what is happening on the ground for marginalized or ignored groups. By focusing on the study in Umuahia North LGA in Nigeria, the authors highlight how people in the Global South are vulnerable to cyber abuse. This&nbsp;group is usually left out of cybersecurity&nbsp;research&nbsp;which mostly focuses on the West. This helps society by showing that cybercrime is not the same for everyone. It shows that being a victim is often tied to your economic status and whether your region has good laws in place. It argues for digital equity so that everyone gets the same protection from bad actors, no matter where they live.&nbsp;<\/p>\n\n\n\n<p><strong>Conclusion<\/strong>: To wrap things up, Kayser and Choi (2025) say that digital safety is not just a technical problem but a human rights and social science issue. These studies show that&nbsp;as long as&nbsp;it is easy to get away with cybercrime, we need everyone from tech experts to sociologists working together to fix it.&nbsp;By looking&nbsp;at groups that are usually ignored and questioning how public data is used, this journal helps create a better and&nbsp;more fair&nbsp;digital world for everyone.&nbsp;<\/p>\n\n\n\n<p><strong>References<\/strong>&nbsp;<\/p>\n\n\n\n<p>Kayser, C., and Choi, S. (2025). Editorial Introduction: International Journal of Cybersecurity Intelligence and Cybercrime, 8(2),&nbsp;1 3. https:\/\/vc.bridgew.edu\/ijcic\/vol8\/iss2\/1\/&nbsp;<\/p>\n\n\n\n<p>Article review #2&nbsp;<\/p>\n\n\n\n<p>Benjamin Cortinez&nbsp;<\/p>\n\n\n\n<p>Old Dominion university&nbsp;&nbsp;<\/p>\n\n\n\n<p>CYSE 201S&nbsp;<\/p>\n\n\n\n<p>7Apr2026&nbsp;<\/p>\n\n\n\n<p><strong>Introduction:<\/strong>&nbsp;For this article review we will be looking at \u201cSecurity enhanced Cloud Compute Using the Integration of Dense&nbsp;Belief&nbsp;Network and RK-AES&nbsp;Algorithm\u201d&nbsp;&nbsp;(Al-Safarini&nbsp;et al., 2025) and how it is dealing with complex algorithms finding a&nbsp;way to protect the cloud networks. The second article will be \u201cVishing and Smishing&nbsp;Perpetrators&nbsp;and&nbsp;Their Victims in Nigerian&nbsp;Slums\u201d&nbsp; (Adeyemo et al., 2026)&nbsp;that takes dives into a world where no matter the technology level a person might have&nbsp;social engineering is still possible with low tech.&nbsp;Both of these&nbsp;articles listed above give a glimpse into the world of security professionals and cybercriminals.&nbsp;<\/p>\n\n\n\n<p><strong>Relation\/ Foundations to Social Science:<\/strong>&nbsp; This review will&nbsp;directly link the two listed above articles by showing the disorganization in social science advocates that&nbsp;someones&nbsp;physical and social environment can influence the person more than just individual traits&nbsp;as seen in the article provided by Adeyemo et al., 2026 (which will now be&nbsp;referred&nbsp;to article #2).&nbsp;Which will&nbsp;be&nbsp;shown&nbsp;in&nbsp;the crimes&nbsp;that are necessary for survival.&nbsp;In the article by Al-Safarini&nbsp;et al., 2025&nbsp;( now&nbsp;referred to article&nbsp;#1)&nbsp;&nbsp;it&nbsp;shows how cloud computing is considered an essential digital need. It is&nbsp;required&nbsp;to&nbsp;maintain&nbsp;an economic and social exchange between different worlds that both&nbsp;require&nbsp;a secure infrastructure but also more importantly one that does not easily fall apart.&nbsp;<\/p>\n\n\n\n<p><strong>Research:&nbsp;<\/strong>&nbsp;The&nbsp;current study in cloud computing investigates if having a deeply hidden learning model can squeeze past the&nbsp;minimum security&nbsp;standard within the targeted infrastructure. Independent variable would be the type of security framework (AES-RK)&nbsp;and the dependent variable would be&nbsp;the performance system that intakes data for accuracy and detection rates. Article #2 investigates how&nbsp;the attackers gain trust and then turnaround and start vishing and smishing&nbsp;and how and which environmental factors&nbsp;can&nbsp;magnify the weak spot that&nbsp;gave them access.&nbsp;The independent variables are socio-economic status and the digital literacy&nbsp;of&nbsp; residents, while the dependent variable&nbsp;is the success rate of fraudulent&nbsp;interactions. Hypothesis would be that a cybercrime occurs as a legitimate trade. In article #2 we see how the&nbsp;in the slums, which has little to no infrastructure, does not have security and is a breeding ground for the crime we learn and read about.&nbsp;<\/p>\n\n\n\n<p><strong>Methods:<\/strong>&nbsp;&nbsp;The methods we see used to collect information in article #1 is the quantitative&nbsp;experimental method, which tests&nbsp;the person hypothesis by messing with the independent variable while also measuring how much those changes altered, if any, the dependent variable. What we see for article #2&nbsp;it seems that they&nbsp;used a qualitative cross-sectional design, a&nbsp;type&nbsp;of method that&nbsp;gathers&nbsp;in-depth information that is from interviews and or focus groups from a population or a certain point in time.&nbsp;<\/p>\n\n\n\n<p><strong>Relationship to Course Theories:&nbsp;<\/strong>Both papers are&nbsp;directly related&nbsp;to class concepts that include the Intrusion Detection System (IDS) and social engineering. As we see in the Nigerian slums (article&nbsp;#2), it provides the examples and details of actual vishing and smishing&nbsp;are able to&nbsp;get passed the firewalls.&nbsp;<\/p>\n\n\n\n<p><strong>Marginalized Group Challenges, Concerns and Contributions:&nbsp;<\/strong>&nbsp;Both&nbsp;articles show the communities and how they are weaker in some spots than others, but from different angles,&nbsp;via&nbsp;attackers&nbsp;vs defenders.&nbsp;In Article #2 we see the communities of slum inhabitants, who are&nbsp;not just seen as outcasts in a social way but&nbsp;also&nbsp;they are the main target of attacks due to their slim to&nbsp;none&nbsp;knowledge of digital literacy.&nbsp;Article #1 shows the importance of digital literacy by&nbsp;doubling down&nbsp;on the importance of security frameworks no matter how simple&nbsp;or intricate it is, but without the security system anybody or anything is easy picking for data breaches.&nbsp;<\/p>\n\n\n\n<p><strong>Societal Contributions and Conclusion:<\/strong>&nbsp;Studies like these or anything similar&nbsp;is&nbsp;able to help bring complex&nbsp;technology&nbsp;achievements into the world of human behavior. Cloud computing gives you a&nbsp;cheat sheet for&nbsp;insuring&nbsp;the infrastructure of being able to protect&nbsp;sensitive information. Article #2 shows the data of social intervention by saying that it does not stop at punishing criminals and that society needs&nbsp;to&nbsp;make an effort&nbsp;at implementing digital education and a type of \u201ciron dome\u201d around the&nbsp;higher risk areas&nbsp;comprised&nbsp;of the same&nbsp;high risk&nbsp;community. Overall security must be&nbsp;accomplished&nbsp;more than just one way. Article #1 shows that no matter how good&nbsp;a security system is, how advanced the encrypting is, (article #2)&nbsp;attackers will always see it as a challenge and&nbsp;attempt&nbsp;to get in.&nbsp;<\/p>\n\n\n\n<p><strong>Reference:<\/strong>&nbsp; References.&nbsp;Adeyemo, L.J.,&nbsp;Olabulo, T.Y., &amp; Peter, I.G. (2026). Vishing and smishing perpetrators and their victims in Nigerian slums. International Journal of Cybersecurity Intelligence and Cybercrime, 9(1), 23-43. Al-Safarini, M. Y., Al-Milli, N.,&nbsp;Maghrabi, L. A., &amp; Elian, M. (2025)&nbsp;<a href=\"https:\/\/vc.bridgew.edu\/cgi\/viewcontent.cgi?article=1208&amp;context=ijcic\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/vc.bridgew.edu\/cgi\/viewcontent.cgi?article=1208&amp;context=ijcic<\/a>&nbsp;<\/p>\n\n\n\n<p>Security enhanced cloud computing using the integration of dense belief&nbsp;network&nbsp;and RK-AES&nbsp;algorithm. International Journal of Cyber Criminology, 19(1), 154-179. 10.5281\/zenodo.476619108&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/459\/139\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Benjamin Cortinez&nbsp; ODU&nbsp; 24Feb2026&nbsp; CYSE 201S&nbsp; Dr. Jordan Quinn&nbsp; Article Review 1: The Interdisciplinary Evolution of Cybercrime and Digital Victimization&nbsp; Principles of the Social Sciences:&nbsp;The editorial introduction by Kayser and Choi (2025) connects to social science principles like social structures and how humans act in digital spaces.&nbsp;Basically, the&nbsp;text uses Deviant Place Theory to show how&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cortinez\/cybersecurity-fundamentals\/\">Read More<\/a><\/div>\n","protected":false},"author":31489,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/pages\/95"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/users\/31489"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/comments?post=95"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/pages\/95\/revisions"}],"predecessor-version":[{"id":357,"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/pages\/95\/revisions\/357"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/media?parent=95"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}