Article 1

In the first article, the topic that was on main focus was on Improving vulnerability remediation through better exploit prediction. The objective of this article was to show how the “information security field is still immature and struggling”. It exposed how no matter how many vulnerability scanners there are, an exploit is always found. In this article exploratory data analysis and predictive data analysis was used. You can see the predictive analysis when the authors brought up that they “aggregate data from a variety of sources, including a private dataset generated by a partner security firm that monitors more than 100 000 corporate networks (almost 200 billion observations of network traffic)”(Jay Jacobs, Sasha Romanosky, Idris Adjerid, Wade Baker, Improving vulnerability remediation through better exploit prediction, Journal of Cybersecurity). This shows that they use historical data to find a pattern of exploits still being found despite the vulnerability scanners used by these sample companies. This topic relates to the challenges, concerns and contributions of marginalized groups by exploiting how modern vulnerability scanners can be overwhelming and almost impossible to keep track of with a great mass of information being thrown at companies. This contributes to the effort of how organizations can assess vulnerabilities within their companies and how they can implement machine learning to help keep their vulnerabilities at bay. This article relates to the scientific method well because it goes over the basic parts of the process to make an exceptional theory that humans can not patch every exploit and vulnerability by themselves. In this article the authors used observational research to get a better understanding of how vulnerability scanners can show the different vulnerabilities but humans cannot keep up with them. This article does a great job on using Cognitive Theories and Cyber Offending to relay the topic of how inferior the human mind is in finding vulnerabilities in a firewall. They may not show specific motives of the cyber criminals in this article however they do go over how humans can process information throughout the article. This article also shows how the human factor in cyber security can allow vulnerabilities to be glossed over and be exploited.

In the second article I read, it went over the specific strategies and best practices that firms should adopt in compliance with business competition laws. This article goes into how most firms engage with competition laws and how they are not equally distributed throughout each firm. This article sheds light on how it is important for firms to stay up to date on changes in the business competition law and cybercrime landscape in Indonesia and to continuously evaluate and improve their compliance programs. This article uses archival research of Indonesia’s laws to generate hypotheses on why these business competition laws should be implemented. They go back as far as 1988 to bring up England’s business compliance laws to give an idea or set the precedence of what these laws should consist of. This article uses heavy amounts of casual analysis to give a cause and effect of what happens if these unethical practices are set in place. An effect stated consisted of “predatory pricing (leaving consumers no choice but to purchase at an exorbitant price), price fixing (forcing other competitors to charge identical  prices  for  products),  bid  rigging  (setting  up  a  situation  in  which  the consumer wins the purchase contract in advance), and dumping (selling a product at a very low price to force smaller companies out of the market)”(Hasbullah, M. A. 2022). This article addresses the struggles of smaller firms that are trying to be successful in Indonesia and the issues the consumers face in Indonesia.This article also uses cultural relativity to express the differences of the business laws but show the similarity that most countries do not align with the idea of monopolies. In this article the message of the importance of competition and how competition allows businesses to make better goods for consumers to indulge in.

Works Cited

Jay Jacobs, Sasha Romanosky, Idris Adjerid, Wade Baker, Improving vulnerability remediation through better exploit prediction, Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa015, https://doi.org/10.1093/cybsec/tyaa015

Hasbullah, M. A. (2022). Strategies and Best Practices Firms Should Adopt in Compliance with Business Competition Law: The Role of Cybercrime in Indonesian Perspective. International Journal of Cyber Criminology, 16(2), 87–103. https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/97/33