{"id":270,"date":"2023-12-05T02:36:10","date_gmt":"2023-12-05T02:36:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber300\/?p=270"},"modified":"2023-12-05T02:36:10","modified_gmt":"2023-12-05T02:36:10","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyber300\/2023\/12\/05\/article-review-2\/","title":{"rendered":"Article Review #2"},"content":{"rendered":"\n<p>Cyberattacks do not get the publicization they truly deserve and the public truly does not<br>understand the severity of them until it happen to them and it\u2019s too late. This article made great<br>points regarding cyberattacks, threats, and necessary support regarding cyber policies.<br>The article makes the reader think about how much they truly know about \u201ccyberattacks\u201d<br>and whether they truly understand the difference between an attack and a threat. It proves that<br>human interaction with technology and security is that when everything is running efficiently it\u2019s<br>all good but when an attack happens everyone panics and is confused\/frustrated as to how<br>could this happen not understanding the possibility percentage of an attack which could also<br>could be due to the lack of details that is given. To help support this, the article states \u201cPast<br>events show that in many cases, the public internalizes the details of an attack in its immediate<br>aftermath when media reports are heaviest. While later reports in the days and weeks following<br>an attack will include far more detailed information, the damage by this time has already been<br>done and the public is already scared and alert.\u201d When the media release these reports they<br>should give a full report but they must incorporate a social science tactic of parsimony so that<br>even the average individual can understand what happened and how to react appropriately.<br>In the article, the research method was a controlled survey to see how \u201crespondents\u201d<br>reacted to various attacks that happened which were lethal and nonlethal in Israel, and what<br>their ideas on cyber policies were afterward. The hypothesis of this experiment was that people<br>react differently due to the amount of information that is given to them and the amount of<br>exposure the incident gets. Data and analysis were measured on scales of 1-7 and ran through<br>an equation to get the group\u2019s total result. A question that was examined throughout the whole<br>experiment was after seeing these attacks what kind of support should we have behind<br>cybersecurity policies? The results from this experiment were highly expected, but it states \u201cthe<br>highest level of support for cybersecurity alerts was expressed by the group exposed to lethal<br>cyberattacks on average, while the other two groups showed lower levels of support for this<br>policy.\u201d<br>This was a very interesting topic to read up on and noticed many interesting facts<br>throughout it. As I was reading through the article I noticed how marginalized groups don\u2019t know<br>much regarding cyber policies or cyberattacks. A major concern I have regarding this issue is<br>how much of a disadvantage that puts marginalized groups at and we don\u2019t help. Overall this<br>study helps contribute to society because if marginalized groups read this article it may<br>encourage them to get involved and learn. It also contributes in a way of informing society about<br>the seriousness of cybersecurity and the policies they are trying to implement.<br>In conclusion, the article was very informative and made me think about policies and the<br>support we should put in to know them. Cybersecurity is important and in the future, we hope<br>cyberattacks and threats will be broadcast more with proper information so we can learn and<br>prepare better rather than panic!<br>Sources:<\/p>\n\n\n\n<p>Keren L G Snider, Ryan Shandler, Shay Zandani, Daphna Canetti, Cyberattacks,<br>cyber threats, and attitudes toward cybersecurity policies, Journal of Cybersecurity, Volume<br>7, Issue 1, 2021, tyab019, https:\/\/doi.org\/10.1093\/cybsec\/tyab019<br><\/p>\n\n\n\n<p>https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab019\/6382745?searchresult=1#40<br>6984045<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyab019\" target=\"_blank\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks do not get the publicization they truly deserve and the public truly does notunderstand the severity of them until it happen to them and it\u2019s too late. This article made greatpoints regarding cyberattacks, threats, and necessary support regarding cyber policies.The article makes the reader think about how much they truly know about \u201ccyberattacks\u201dand whether &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/cyber300\/2023\/12\/05\/article-review-2\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Article Review #2<\/span><\/a><\/p>\n","protected":false},"author":21638,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/posts\/270"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/users\/21638"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/comments?post=270"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/posts\/270\/revisions"}],"predecessor-version":[{"id":271,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/posts\/270\/revisions\/271"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/media?parent=270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/categories?post=270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber300\/wp-json\/wp\/v2\/tags?post=270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}