{"id":336,"date":"2024-04-21T15:48:00","date_gmt":"2024-04-21T15:48:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/?p=336"},"modified":"2024-04-21T15:48:00","modified_gmt":"2024-04-21T15:48:00","slug":"cyse-201s-15","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/2024\/04\/21\/cyse-201s-15\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p><br>                                                 Article Review #1 &#8211; Bugs in our Pockets<br>How the topic relates to the principles of the social sciences<br>The topic of this article relates to the principles of the social sciences because it focuses<br>on keeping the government in check, and protecting ourselves from unethical behavior from law<br>enforcement or government agencies.<br>The study&#8217;s research questions or hypotheses<br>This study was looking at how effective and safe CSS technology is for everyone to have on<br>their personal devices. More specifically, safe in regards to explicit imagery or videos, and how<br>to prevent that material from being spread. They also looked at things regarding hope to stop<br>mass spread of explicit materials, after they are sent out initially.<br>The types of research methods used<br>The type of research methods used were just using the technology in question, and doing a<br>thorough examination of what they find when they observe the software. They also explored the<br>technology by monitoring how it worked, after installing it on their personal devices.<br>The types of data and analysis done<br>The types of data and analysis done were based on sensitive imagery, and how the technology is<br>able to prevent those from being distributed to mass amounts of people. They also analyzed<br>potential downsides of CSS, in a software sense. They did this by looking at the amount of<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>storage that would be necessary on each personal device, and how it would affect stopping<br>images from being transmitted.<br>How concepts from the PowerPoint presentations relate to the article<br>A major concept from the PowerPoint for this module was behavioral theory, and I can<br>see that certain behaviors that big companies see other big companies doing, might be present in<br>their ideas. This means that if Apple (the main company the article looked at) sees Samsung<br>doing something, they might want to do the same, so they will be sure they will not be left<br>behind in the technological race.<br>How the topic relates to the challenges, concerns and contributions of certain groups<br>The topic relates to the challenges, concerns, and contributions of groups such as children who<br>are victims of sexual abuse or exploitation, as well as those affected by \u201crevenge porn\u201d(Oxford<br>University Press).<br>The overall contributions of the studies to society<br>Overall, the study is a great example of why we should not so easily trust every new piece of<br>technology that is introduced to us, since the findings of this research show that CSS has the<br>potential to be very dangerous.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>                                                                     References<br>Oxford University Press. (2024, January 27). Bugs in our Pocket. Oxford Academic. Retrieved<br>February 11, 2024, from<br>https:\/\/academic.oup.com\/cybersecurity\/article\/10\/1\/tyad020\/7590463?searchresult=1<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1 &#8211; Bugs in our PocketsHow the topic relates to the principles of the social sciencesThe topic of this article relates to the principles of the social sciences because it focuseson keeping the government in check, and protecting ourselves from unethical behavior from lawenforcement or government agencies.The study&#8217;s research questions or hypothesesThis study&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cybersecurityep\/2024\/04\/21\/cyse-201s-15\/\">Read More<\/a><\/div>\n","protected":false},"author":28419,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/posts\/336"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/users\/28419"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/comments?post=336"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/posts\/336\/revisions"}],"predecessor-version":[{"id":337,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/posts\/336\/revisions\/337"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/media?parent=336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/categories?post=336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/tags?post=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}