{"id":197,"date":"2024-10-03T00:31:51","date_gmt":"2024-10-03T00:31:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/?p=197"},"modified":"2024-10-03T00:31:51","modified_gmt":"2024-10-03T00:31:51","slug":"article-review-1-cyber-threats-and-cyber-policies","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/2024\/10\/03\/article-review-1-cyber-threats-and-cyber-policies\/","title":{"rendered":"Article Review #1 &#8211; Cyber threats and Cyber policies"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Introduction<\/strong><\/h2>\n\n\n\n<p>Cybersecurity is an extremely substantial topic. There are a large number of journals and articles that discuss many different aspects of cybersecurity. Oxford University Press published a journal called <em>Journal of Cybersecurity. Journal of Cybersecurity <\/em>published an article titled \u201cCyberattacks, cyber threats, and attitudes toward cybersecurity policies.\u201d In this article, the authors, Keren L G Snider, Ryan Shandler, Shay Zandani, and Daphna Canetti, examine the connection between cyberattacks and public support for intrusive cybersecurity policies. This topic relates heavily to the principles of the social sciences. The principles of social sciences focus on ethics, objectivity, and the study of individuals in a social environment. This article contains all of those focus points of social sciences. In this article, the authors asked the questions: \u201cdoes exposure to cyberattacks influence public support for intrusive cybersecurity policies\u201d and \u201chow do perceptions of cyber threats mediate this relationship?\u201d(<em>Journal of Cybersecurity<\/em>, Volume 7, Issue 1, 2021).&nbsp; They then conducted an experiment in order to get answers to these questions. This experiment emphasizes the principles of the social sciences as it analyzes how different information can alter individuals\u2019 opinions and perceptions.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Their questions and hypothesis<\/strong><\/h2>\n\n\n\n<p>As I stated previously, the authors are trying to answer the questions: \u201cdoes exposure to cyberattacks influence public support for intrusive cybersecurity policies\u201d and \u201chow do perceptions of cyber threats mediate this relationship?\u201d (<em>Journal of Cybersecurity<\/em>, Volume 7, Issue 1, 2021). Before they conducted the experiment, they stated their hypothesis. The hypothesis they stated is \u201cExposure to lethal or nonlethal cyberattacks will lead to greater support for adopting cybersecurity policies compared with people who were not exposed to any cyberattack\u201d (<em>Journal of Cybersecurity<\/em>, Volume 7, Issue 1, 2021).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Research methods, data, and analysis<\/strong><\/h2>\n\n\n\n<p>In order to test their hypotheses, they conducted a controlled survey experiment that exposed individuals to simulated news reports about major cyberattacks. The lethal treatment group viewed a feature report discussing several lethal cyberattacks, while the nonlethal treatment group broadcast a collection of stories pertaining to nonlethal cyber incidents. The control group did not watch any news report. Each group completed a survey before and after viewing the news reports. This survey consisted of a series of questions asking the individuals about their attitudes towards cybersecurity. The results of the experiment supported the authors\u2019 hypotheses. It proved that people\u2019s opinions on cyber policies are altered by their experience with cyberattacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Article\u2019s connection to Powerpoint presentations<\/strong><\/h2>\n\n\n\n<p>The article relates to the Powerpoint presentations that we have been reviewing in class as it contains the surveys and experiments that are discussed in the presentations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Challenges and concerns<\/strong><\/h2>\n\n\n\n<p>This topic is not directly related to any specific group of people. However, individuals that watch the news and research cyberattacks may be more affected by this topic.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contributions of the studies to society<\/strong><\/h2>\n\n\n\n<p>The studies that were conducted in this article have a positive impact on society. These studies give a gauge on how society will be more supportive of cyber policies if they were more informed of the potential threats.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Works Cited<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab019\/6382745?searchresult=1\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab019\/6382745?searchresult=1<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Cybersecurity is an extremely substantial topic. There are a large number of journals and articles that discuss many different aspects of cybersecurity. Oxford University Press published a journal called Journal of Cybersecurity. Journal of Cybersecurity published an article titled&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/2024\/10\/03\/article-review-1-cyber-threats-and-cyber-policies\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28263,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/posts\/197"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/users\/28263"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"predecessor-version":[{"id":198,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/posts\/197\/revisions\/198"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}