{"id":198,"date":"2024-10-03T00:33:02","date_gmt":"2024-10-03T00:33:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/?p=198"},"modified":"2024-12-09T03:29:13","modified_gmt":"2024-12-09T03:29:13","slug":"dante-sasaki","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/2024\/10\/03\/dante-sasaki\/","title":{"rendered":"Article review #1"},"content":{"rendered":"\n<p>Dante Sasaki<\/p>\n\n\n\n<p>10\/1\/2024<\/p>\n\n\n\n<p><strong>How privacy threats can expose personal information in intimate relationships<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Introduction<\/h1>\n\n\n\n<p>The main purpose of this is because your information might not be so private. All of the people in your personal circle like your families, romantic partnerships, close friends, and caregiving relationships. All of these types of people know some of the very personal information to you and can use this as leverage over you.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Principles of social science<\/h1>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 principles I\u2019ll talk about are ethical considerations, the interdisciplinary approach, and post-positivism. Ethical considerations are used in this article because they used surveys to get information from the people that are willing to answer these questions truthfully. The interdisciplinary approach tries to get a better understanding on the psychological and sociological portions of social trends. Lastly, post-positivism influences people\u2019s decisions on giving out other people\u2019s personal information and invading others privacy based on their perceptions they have of someone.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Hypothesis<\/h1>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The hypothesis that they came up with is that your personal information is mostly shared by intimate relationships and they effect you more than most other threats. The article says \u201cThese threats are so common as to be treated as routine and often overlooked, but they are experienced much more frequently\u2014and often with greater direct impact on victims\u2019 lives\u2014than many of the threats that dominate the security discussion.\u201d (<em>Journal of Cybersecurity<\/em>, Volume 6, Issue 1, 2020) it is overlooked because your relationships that you have might tell you and then you forgive them or they don\u2019t tell you at all.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Research method and data<\/h1>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; They used surveys to find the data used for their hypothesis. Using surveys as a research method can be a good resource because you can get a very diverse group of people for different results. &nbsp;Some questions and results from the article are \u201cForty-eight percent looked through phone records and text messages, and 16% tracked teens\u2019 locations via their cell phones; half reported knowing the password to their teenager\u2019s email account.\u201d(<em> <\/em><em>Journal of Cybersecurity<\/em>, Volume 6, Issue 1, 2020) These are some very high numbers for how much your privacy is being breached by your relationships.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">How concepts relate to class<\/h1>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The social science research method used for the article was surveys. Surveys are useful so you can get a true answer from people.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">How the topic relates to challenges, concerns, and contributions of marginalized groups<\/h1>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; One of the marginalized groups that are being targeted in this article are mainly children. One of the issues is that parents might accidentally give out information due to scams. I would say that another marginalized group would be people with disabilities. This is because of people with disabilities who have their privacy invaded by their caregivers.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Overall contributions of the studies of society<\/h1>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; This study really helps people understand that the people that are the closest to them are the ones that are mostly spreading their information or anything that is personal for them.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Finally, your privacy can be at risk basically with anyone. The only ways you might be able to reduce these issues are by not sharing accounts with people, not leaving your phone out with it on, keeping secure passwords that nobody knows, etc.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Work Cited<\/h1>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/academic.oup.com\/cybersecurity\/article\/6\/1\/tyaa006\/5849222?searchresult=1\n<\/div><\/figure>\n\n\n\n<p>Karen Levy, Bruce Schneier, Privacy threats in intimate relationships,&nbsp;<em>Journal of Cybersecurity<\/em>, Volume 6, Issue 1, 2020, tyaa006,&nbsp;<a href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyaa006\">https:\/\/doi.org\/10.1093\/cybsec\/tyaa006<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dante Sasaki 10\/1\/2024 How privacy threats can expose personal information in intimate relationships Introduction The main purpose of this is because your information might not be so private. All of the people in your personal circle like your families, romantic&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/2024\/10\/03\/dante-sasaki\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29737,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":4},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/wp-json\/wp\/v2\/posts\/198"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/wp-json\/wp\/v2\/users\/29737"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/wp-json\/wp\/v2\/comments?post=198"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/wp-json\/wp\/v2\/posts\/198\/revisions"}],"predecessor-version":[{"id":211,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/wp-json\/wp\/v2\/posts\/198\/revisions\/211"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/wp-json\/wp\/v2\/media?parent=198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/wp-json\/wp\/v2\/categories?post=198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-dsasa001\/wp-json\/wp\/v2\/tags?post=198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}