Article Review
Article Review 1
The Future and Current Problems in the Cyber Environment
Aiden Johnson
CYSE201S
Article review 1
Diwakar Yalpi
9/28/25
The Relationship of the Study to the Social Sciences
The reason this topic relates to the social sciences is that it focuses on scams, digital
identity, and cyber victimization, which require an understanding of the human aspect to
comprehend why they occur. The analysis in the article focuses on four studies that investigate
cybercrime, governance, and digital threats to society (Kayser, C. S., Dearden, T., Parti, K., &
Choi, S., 2025).
This article’s research question addresses the “necessity of a multidisciplinary approach
to address modern digital threats, bridging technical forensics, legal theory, and empirical
research” (Kayser et al, 2025, p.1). The hypothesis proposes that more knowledge of the
Changing the space of cybercrime is paramount to understanding these new and complex threats
(Kayser et al, 2025).
The independent variable (IV) is to understand what actions we can take to lower the risk
of harm in the cyber environment. The dependent variable (DV) is the safety and rights of online
users. In other words, the harm that was caused by actions we had done in the cyber
environment (Kayser, 2025).
Article Analysis
In the first study, Lim & Choi (2025) used a technical analysis to understand blockchain.
(a virtual database), where scammers use cryptocurrencies to scam people out of money.
Because of this, there is no tracking for the money.
The second study (Kayser et al. 2025) quoted (González-García Viñuela, 2025) to
identify the legal side of analysis, “looking at the invasion of digital identity on a criminal law side, with a focus on what is happening in Spain,” (p.1) But it also focuses on the impact of a
unified response around the world when it comes to cybercrimes (Kayser et al. 2025).
The third study is an analysis of Open Source Intelligence (OSINT). “Which
found that users and other people were having potential problems, privacy problems, and bad use
and collection of data on BellingCat, which is an OSINT website” (Pitman & Walsh, 2025). The
Data spanned from 2014 to 2024, during which time people experienced problems in the regions
of the United States and Russia (Kayser et al. 2025). The people pushed for better legislation to
protect OSINT websites and forums, aiming to keep users safe on these platforms (Kayser et al.
2025).
The final study uses the analysis of both qualitative and quantitative data, which looks
into the Deviant Place Theory, “which says that people in a high-risk environment may have a
high risk of victimization, even if personal behaviors are not a problem” (Grant & Gilreath,
2025). In this study, researchers recruited 924 internet users from Nigeria to assess whether they
could modify categories of cyber offenses (Kayser et al. 2025). They reclassified cyber misuse as
something encouraged by technology, and not by the need for technology to understand the
connection between them (Kayser et al. 2025). The authors studied the connection between
violent crime and property crime (Grant & Gilreath, 2025).
The study showed that the theory was accurate and that victimization rates are high in
this context for cybercrime (Kayser et al. 2025). The study also found that “there should be more
diligence for policymakers to reduce the cybervictimization here, and that more study and
research needs to be conducted in the region on the problem” (Kayser et al. 2025, p.2).
Relationship to PowerPoint
Concepts from the CYSE201 (Module) PowerPoint include victimization and aspects of
the Big Five personality traits. The first case involves blockchain and scammers. Scammers learn
to use tricks to trick users into giving them their money through the use of the Big Five
personality traits. The Big Five personality traits that scammers commonly exhibit here are
agreeableness, extraversion, and openness to experience.
Openness to experience is an individual who is willing to take risks, such as engaging in
activities that can put them at risk. They also tend to show agreeableness, sharing information
with scammers, and making themselves more vulnerable. They are also extraversion, which is
talking to new or more people than they should.
The goals of the article are to help marginalized groups
The topic relates to the challenges, concerns, and contributions of marginalized groups.
This article explores an understudied area in the world, with a focus on Nigeria and its
challenges related to cybercrime victimization (Kayser et al. 2025). And the lack of studies and
policymakers in this area of cybercrime victimization (Kayser et al. 2025). The study’s overall
contributions to society are that it addresses problems faced by marginalized groups in the cyber
environment. It would be much better if we were more united on laws regarding cyber offenses,
rather than having every place have its own rules that don’t communicate with each other about
the laws (Kayser et al. 2025). It also discussed open-source intelligence, a significant trend
enabled by the internet. And what data, privacy, and risk are shared for a big or a bad thing
(Kayser et al. 2025). And what skills scammers use to earn the trust of people so that they can
get their money, and what money the scammers are most likely to want (Kayser, 2025).
Conclusion
In conclusion, this is an excellent article. It has some excellent points that will be
significant in the future, as well as a few that are significant now. People need to understand the
motives, theories, and principles regarding victims and professionals of cybersecurity because,
for now, they will not go away.
References
González-García Vinuela, M. (2025). The Legal Response to the Intrusion into Digital
Identity in Social Media. International Journal of Cybersecurity Intelligence &
Cybercrime, 8(2). International Journal of Cybersecurity Intelligence & Cybercrime.
https://doi.org/10.52306/2578-3289.1221
Grant, M., & Gilreath, T. (2025). Deviant place theory and adolescent victimization:
Latent class profiles and mental health disparities in schools. APHA – APHA 2025
Annual Meeting and Expo; APHA.
https://apha.confex.com/apha/2025/meetingapp.cgi/Paper/578822
Kayser, C. S., Dearden, T., Parti, K., & Choi, S. (2025). Navigating the Digital Frontier:
New Perspectives on Cybercrime and Governance. International Journal of Cybersecurity
Intelligence & Cybercrime, 8(2). International Journal of Cybersecurity Intelligence &
Cybercrime. https://doi.org/10.52306/2578-3289.1222
Lim, A., & Choi, K. (2025). Modus Operandi and Blockchain Analysis of Romance
Scams: Cryptocurrency-Driven Victimization. International Journal of Cybersecurity
Intelligence and Cybercrime, 8(2). International Journal of Cybersecurity Intelligence &
Cybercrime. https://doi.org/10.52306/2578-3289.1220
Nzeakor, O. F., Okafor, R. N., & Nwoke, C. N. (2025). A Study of Pattern of Cybercrime
Abuse of Individual Internet Users in Umuahia North LGA, Abia State of South-eastern
Nigeria. International Journal of Cybersecurity Intelligence & Cybercrime, 8(2).
International Journal of Cybersecurity Intelligence & Cybercrime.
https://doi.org/10.52306/2578-3289.1183
Article Review 2
Article 2 Review: Cyberbullying on social media
Student Name: Aiden Johnson
School of Cybersecurity, Old Dominion University
CYSE201S, Cybersecurity and Social Science
Instructor Name: Diwakar Yalpi
11/15/25
The relationship of topic to principles of the social sciences.
The topic of cyberbullying relates to the social sciences because cyberbullying is one of
The most significant points in the relationship between cybersecurity and social sciences are.
Cyberbullying is a health concern as it relates to social media (Ray et al., 2024). The study
provided a comprehensive review of published papers between the years of 2007 and 2022 and
found inconsistencies of how cyberbullying is “defined and reported in terms of prevalence and
impact” (Ray et al., 2024).
Study analysis of research questions, hypotheses, independent variable, and
dependent variable
Provided in the study are four research questions. The first is, “How is cyberbullying
defined in literature” (Ray et al., 2024)?” The second states, “What factors are making
cyberbullying a problem, and can these factors be broken down so that people can understand
them?” (Ray et al. 24) and the third asks, “Can personality traits make an impact on how likely
you are to get bullied online”, and the final question states, “How do experiences that can be
involved or indirect cause the amount you get bullied online? “(Ray et al., 2024).
The hypothesis of the study proposes the explanation of cyberbullying and its true
definition, and how does it impacts people. The Independent Variable is to identify gaps in the
literature on cyberbullying, and the Dependent Variable is the impact on people because of
cyberbullying.
Research methodology of the study
The research methods provide an overview of the methodology that includes search
strategies, selecting relevant and irrelevant data to consider for the study, and guidelines for using
Preferred Reporting Items for Systematic Reviews (Ray et al., 2024). The methods of the study include the areas of positional, interview, critical review, meta-analysis, policy simulation, and
statistical methods (Ray et al., 2024).
Types of data and analysis
The types of data analysis are both qualitative and quantitative. There are surveys to
cover several topics, numbers, and values. These surveys collect qualitative data from the people
taking them. The surveys have covered anything from the details of who is getting affected by
cyberbullying, and through the statistical data analysis, they can see who is more likely to be
affected by cyberbullying online.
Relationship of concepts from PowerPoint to the article.
There are many concepts in the PowerPoint about cyberbullying. The article for sure
talked about what things are posted online to cause cyberbullying, like hurtful pictures and
videos, posing personal or false information about other people, doxing, and threatening. These
are all things discussed in the article. It also discussed the big five personality traits, which are
the same as in the personality theories, and this was a significant point in the PowerPoint on how
people think and what they do online. The article discussed openness to experience,
agreeableness, extraversion, conscientiousness, and neuroticism, and explained each.
Relationship of the topic to the challenges, concerns, and contributions of marginalized
groups
The study refers to how females are more likely to be impacted by cyberbullying. Males
are the ones who perpetrate cyberbullying against others (Ray et al., 2024). People’s ages also
affect them, especially young individuals and adolescents (Ray et al., 2024). One of the surveys
reported that young individuals reported that 42% of them have experienced cyberbullying on
Instagram, 37% on Facebook, and 31% on Snapchat (Ray et al., 2024). In the same survey, 71%
of respondents believed these companies need to do more to stop cyberbullying (Ray et al.,
2024). In other surveys with Arab students in the university, they said that 91% said that
cyberbullying happened online, with Instagram being the worst at 55.5% and Facebook at 38%
being the most (Ray et al., 2024). And their views are like those of LGBTQ+ people, who have a
significant chance of being impacted by cyberbullying (Ray et al., 2024). And minority groups
also have a greater chance of being affected by cyberbullying (Ray et al., 2024).
Overall contributions of the study to society
It’s hard to say whether the articles or studies have a way to contribute to society without
further exploration. As all this data comes from one source, the article needs to be supported by
additional information and research in the field of cybersecurity and social science to confirm or
refute the findings. Cyberbullying is a new phenomenon that is happening and is only growing
because of social media. The authors raise some good points, especially the need to further
explore this area.
Conclusion
This study is an excellent article or source for identifying the problems with
cyberbullying and why it happens. The importance of exploring this area and its effects on the
population of social media users can help to understand the social impact and why it affects some
and not others. Still, the ones that get affected by it can have life-threatening social problems due
to cyberbullying attacks. Many of the attackers don’t target just one person; it varies from person
to person, and it can be a global attack unaware to the person.
The most significant point I learn from the article and will always think about after
reading through the article is that everyone plays an essential role in the area of cyberbullying.
A person can be a defender who stops the attack, or a bystander who does nothing about it. Most people fall into the category of defender, but many fall into the category of reinforcer and
encourage cyberbullying (Ray et al., 2024). Some people assist in cyberbullying by engaging
with the bully or being the bully themselves (Ray et al., 2024). This makes me think that a
broader understanding of cyberbullying is needed because it is not a simple term, and it requires
us to understand how to identify it to stop cyberbullying. The social impact is devastating for the
people being bullied, especially the younger populations who are constantly using social media.
References
Ray, G., McDermott, C. D., & Nicho, M. (2024). Cyberbullying on social media: Definitions,
prevalence, and impact challenges. Journal of Cybersecurity, 10(1).
https://doi.org/10.1093/cybsec/tyae026