{"id":237,"date":"2024-12-09T04:44:13","date_gmt":"2024-12-09T04:44:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cybersecurity\/?page_id=237"},"modified":"2024-12-09T05:36:14","modified_gmt":"2024-12-09T05:36:14","slug":"article-review","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cybersecurity\/article-review\/","title":{"rendered":"Article reviews"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p class=\"has-text-align-left\">Seyvon Davis<br>October 1, 2024<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Impact of Cybersecurity and AI on Reporting Suspicious Behavior and Employee Stress<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">                                                           Introduction<br>The article &#8220;Impact of Cybersecurity and AI\u2019s Related Factors on Incident Reporting Suspicious<br>Behaviour and Employees Stress: Moderating Role of Cybersecurity Training&#8221; by Vimala Venugopal Muthuswamy and Suresh Esakki looks at how cybersecurity and artificial intelligence affect whether employees report suspicious activities and how this impacts their stress levels. This study is important because it shows how technology and people\u2019s actions in the workplace are linked.<br>                                            Relationship to Social Sciences<br>This topic is relevant to social sciences because it explores how people behave at work, especially with technology around them. The article explains that employees\u2019 feelings and behaviors can be influenced by their work environment and the tools they use. They suggest that good cybersecurity training can make employees feel more comfortable reporting problems and can also help lower their stress. This shows that training is really important for encouraging employees to speak up when they notice something unusual.<br>                                                     <\/p>\n\n\n\n<p class=\"has-text-align-left\">                                                    Research Methods<br>To find answers, the authors used surveys to collect information from employees in different companies. This method allowed them to gather a lot of data about how different factors affect reporting behavior and stress levels.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>                                                            Data Analysis<br>The results showed that employees who received good cybersecurity training were more likely to report suspicious activities and felt less stressed. This showed the need for effective training programs that help employees feel confident in speaking up.<br><\/p>\n\n\n\n<p>                                            Connection to Course Concepts<br>The study also connects to ideas we discussed in class, like how people view risks and how they behave in organizations. It demonstrates that training can change how employees perceive risks and react to them, which is important for making workplaces safer.<br><\/p>\n\n\n\n<p>                                                    Contributions to Society<br>Additionally, the article considers the challenges faced by different groups of employees. It points out that people from various backgrounds might experience different kinds of stress related to cybersecurity. This means training programs should be a part of and help everyone&#8217;s needs.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Conclusion<\/p>\n\n\n\n<p>In conclusion, Muthuswamy and Esakki&#8217;s article provides good information into how cybersecurity and AI affect employee behavior. It emphasizes that good training is important for improving reporting practices and reducing stress, leading to a safer workplace. This research helps us understand how to create a better work environment in a technology driven world.<\/p>\n\n\n\n<p class=\"has-text-align-center\">             References<br>Muthuswamy, V. V., &amp; Esakki, S. (Year). Impact of Cybersecurity and AI\u2019s Related Factors on<br>Incident Reporting Suspicious Behaviour and Employees Stress: Moderating Role of<br>Cybersecurity Training<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p>Seyvon Davis<br>CYSE-201S<br>11\/16\/24<\/p>\n\n\n\n<p class=\"has-text-align-center\">Article review #2<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">1. How the Topic Relates to Social Science Principles<br>Digital piracy is linked to social science because it involves understanding human behavior,<br>decision-making, and the way society views actions. People often pirate content because it\u2019s<br>cheaper or free, especially when legal content is too expensive. It also shows how culture and<br>technology influence people\u2019s choices, making piracy seem normal or easy to do in certain<br>environments.<br>2. Research Questions or Hypotheses<br>The hypothesis is that digital piracy happens because of issues like the high cost of digital content, the way technology makes piracy easier, and cultural beliefs that make it seem acceptable.<br>3. Research Methods Used<br>The study uses a method called qualitative research, which means it looks at existing studies and case examples instead of doing new experiments. It reviews past research and reports to see trends in digital piracy. The authors use this information to explain how piracy happens and what its effects are.<br>4. Types of Data and Analysis<br>The data in the article comes from previous research on piracy. This includes case studies and reports on how piracy affects creators and society. The article looks at patterns in piracy, like how technology makes it easier for people to steal content. The analysis focuses on understanding why piracy is so common and what can be done about it.<br>5. Digital Piracy<br>Digital piracy is considered deviant behavior, but many people don\u2019t see it as a big problem, especially in places where content is expensive. It also connects to criminology theories, like Routine Activities Theory, which says crime happens when there\u2019s a chance to commit it without much risk.<a href=\"https:\/\/docs.google.com\/document\/d\/1Q2KomJZDbxUuUron-MTpaqhzoc4R_Q_x\/edit?usp=drive_link&amp;ouid=100803860775166249682&amp;rtpof=true&amp;sd=true\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\">6. How it Relates to Marginalized Groups<br>The article explains how marginalized groups are affected by piracy. In poorer regions, people may pirate content because they can\u2019t afford it. At the same time, creators from disadvantaged backgrounds may lose money when their work is pirated. This shows that piracy affects both consumers and creators, especially in low-income communities.<br>7. Contributions of the Study to Society<br>This study helps society by explaining why piracy happens and what its effects are. It suggests solutions like making digital content more affordable and educating people about the harm piracy causes. The study shows that solving the piracy problem requires both addressing technology and ensuring fair access to content, especially for people in poorer areas.<br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Work Cited<br>Author(s). (Year). Digital piracy: A review of its history, causes, and societal impact. International<br>Journal of Cybercrime Studies. Retrieved from<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/267\/9<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seyvon DavisOctober 1, 2024 Impact of Cybersecurity and AI on Reporting Suspicious Behavior and Employee Stress IntroductionThe article &#8220;Impact of Cybersecurity and AI\u2019s Related Factors on Incident Reporting SuspiciousBehaviour and Employees Stress: Moderating Role of Cybersecurity Training&#8221; by Vimala Venugopal Muthuswamy and Suresh Esakki looks at how cybersecurity and artificial intelligence affect whether employees report&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cybersecurity\/article-review\/\">Read More<\/a><\/div>\n","protected":false},"author":27467,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/237"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/users\/27467"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/comments?post=237"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/237\/revisions"}],"predecessor-version":[{"id":262,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/237\/revisions\/262"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/media?parent=237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}