Article Review #1

Cybersecurity is a broad and complex topic and often is subjective regarding identifying cybercrime or what constitutes a cyber-criminal. It is well-known that human error is one of the most effective volatilities for cybercriminals to exploit, as humans are generally unpredictable and can often be deceived by social engineering. The authors of “The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence,” Sinchul Back and Jennifer LaPrade, go into great detail regarding the many human factors and nuances of cybersecurity. The article makes many points about the dangers of human error and the weakness of human psychology while acknowledging that training can mitigate but not eliminate these vulnerabilities (Back, S., & LaPrade, J., 2019). The Authors make a point to ask what risks can be associated with society’s integration with technology and question what can be done to mitigate said risks.

This article adequately represents relativism in several ways, such as presenting how individuals perceive risk and how different cultures or demographics may be considered vulnerable targets for cybercriminals. This was discussed when the authors mention a study in which the researchers concluded, “Using mixed methods, the researchers conducted a perception analysis and found respondents were more likely to share images with romantic partners and preferred sending non-intimate images” (Back, S., & LaPrade, J., 2019). The researchers found that many people refrained from sending sexually elicit images. However, there was still a certain demographic who sent or have sent these images and are, hence, potentially vulnerable. This article also has ample Objectivity as the authors do not blatantly call out victims of cybercrimes or recommend punishments for cybercriminals. Instead, the authors educate the readers on the potential dangers of specific actions while giving examples of how some individuals attempt to minimize risk. Another example of the social science principles portrayed in this article is determinism, as it discusses the lack of awareness in cyberspaces and individuals choosing to ignore social standards that would have otherwise protected the victims. For instance, it is noted that “Respondents also believed sharing intimate images without consent was motivated by bullying, revenge, or a desire to “show off ” and could indicate or be signs of abusive behavior” (Back, S., & LaPrade, J., 2019). This is significant because it ultimately comes down to personal choice. The victim usually chooses to create or send the image initially, and then the receiving party decides to use the images in a harmful way. However, it may not always be intentional. While it is also entirely possible that the victim did not know about the creation or distribution of the mentioned sexually explicit images, all scenarios result from one or more parties choosing to act in a certain way.

There are many research types utilized throughout this article. For example, the Authors used empirical data regarding people’s willingness to send sexually explicit images and the required parameters for them to feel safe doing so. There is also conceptual research as the authors use hypothetical scenarios such as potential technological risks and which groups may be more vulnerable. There is also a literature review and qualitative data used as the authors cite the works of other researchers, including the direct opinions of individuals related to the topic. While different types of research are present in this article, they played a far less significant role, or they were somewhat left to interpretation.

In conclusion, this article does an adequate job of presenting potential reasons for individuals committing cyber crimes or choosing to harass others while at the same time allowing the reader to make their own conclusions as to whether certain risks are worth taking and what actions should be avoided. This article is connected to what has been discussed in class so far, as it covers topics such as human nature and cybersecurity. The article makes the same conclusion that many observers and victims have made of cyber-attacks. The only ethical way to mitigate the risks presented by human error is to educate individuals on the potential risks associated with technology and ensure that technology users can avoid potentially harmful situations.

Works Cited

Back, S., & LaPrade, J. (2019). The future of cybercrime prevention strategies: Human factors and a holistic approach to cyber intelligence. International Journal of Cybersecurity Intelligence & Cybercrime2(2), 1-4.