{"id":250,"date":"2025-12-04T19:22:43","date_gmt":"2025-12-04T19:22:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/?page_id=250"},"modified":"2025-12-04T19:58:24","modified_gmt":"2025-12-04T19:58:24","slug":"test2-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/test2-2\/test2-1\/","title":{"rendered":"Article Review"},"content":{"rendered":"\n<p><strong>Article Review 1\u00a0<\/strong><\/p>\n\n\n\n<p><strong>The Future and Current Problems in the Cyber Environment<\/strong><br>Aiden Johnson<br>CYSE201S<br>Article review 1<br>Diwakar Yalpi<br>9\/28\/25<br><\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p><strong>The Relationship of the Study to the Social Sciences<\/strong><\/p>\n\n\n\n<p>The reason this topic relates to the social sciences is that it focuses on scams, digital<br>identity, and cyber victimization, which require an understanding of the human aspect to<br>comprehend why they occur. The analysis in the article focuses on four studies that investigate<br>cybercrime, governance, and digital threats to society (Kayser, C. S., Dearden, T., Parti, K., &amp;<br>Choi, S., 2025).<\/p>\n\n\n\n<p><br>This article&#8217;s research question addresses the \u201cnecessity of a multidisciplinary approach<br>to address modern digital threats, bridging technical forensics, legal theory, and empirical<br>research\u201d (Kayser et al, 2025, p.1). The hypothesis proposes that more knowledge of the<br>Changing the space of cybercrime is paramount to understanding these new and complex threats<br>(Kayser et al, 2025).<\/p>\n\n\n\n<p><br>The independent variable (IV) is to understand what actions we can take to lower the risk<br>of harm in the cyber environment. The dependent variable (DV) is the safety and rights of online<br>users. In other words, the harm that was caused by actions we had done in the cyber<br>environment (Kayser, 2025).<\/p>\n\n\n\n<p><br><strong>Article Analysis<\/strong><br>In the first study, Lim &amp; Choi (2025) used a technical analysis to understand blockchain.<br>(a virtual database), where scammers use cryptocurrencies to scam people out of money.<br>Because of this, there is no tracking for the money.<\/p>\n\n\n\n<p><br>The second study (Kayser et al. 2025) quoted (Gonz\u00e1lez-Garc\u00eda Vi\u00f1uela, 2025) to<br>identify the legal side of analysis, \u201clooking at the invasion of digital identity on a criminal law side, with a focus on what is happening in Spain,\u201d (p.1) But it also focuses on the impact of a<br>unified response around the world when it comes to cybercrimes (Kayser et al. 2025).<\/p>\n\n\n\n<p><br>The third study is an analysis of Open Source Intelligence (OSINT). \u201cWhich<br>found that users and other people were having potential problems, privacy problems, and bad use<br>and collection of data on BellingCat, which is an OSINT website\u201d (Pitman &amp; Walsh, 2025). The<br>Data spanned from 2014 to 2024, during which time people experienced problems in the regions<br>of the United States and Russia (Kayser et al. 2025). The people pushed for better legislation to<br>protect OSINT websites and forums, aiming to keep users safe on these platforms (Kayser et al.<br>2025).<\/p>\n\n\n\n<p><br>The final study uses the analysis of both qualitative and quantitative data, which looks<br>into the Deviant Place Theory, \u201cwhich says that people in a high-risk environment may have a<br>high risk of victimization, even if personal behaviors are not a problem\u201d (Grant &amp; Gilreath,<br>2025). In this study, researchers recruited 924 internet users from Nigeria to assess whether they<br>could modify categories of cyber offenses (Kayser et al. 2025). They reclassified cyber misuse as<br>something encouraged by technology, and not by the need for technology to understand the<br>connection between them (Kayser et al. 2025). The authors studied the connection between<br>violent crime and property crime (Grant &amp; Gilreath, 2025).<\/p>\n\n\n\n<p><br>The study showed that the theory was accurate and that victimization rates are high in<br>this context for cybercrime (Kayser et al. 2025). The study also found that \u201cthere should be more<br>diligence for policymakers to reduce the cybervictimization here, and that more study and<br>research needs to be conducted in the region on the problem\u201d (Kayser et al. 2025, p.2).<\/p>\n\n\n\n<p><strong>Relationship to PowerPoint<\/strong><\/p>\n\n\n\n<p><br>Concepts from the CYSE201 (Module) PowerPoint include victimization and aspects of<br>the Big Five personality traits. The first case involves blockchain and scammers. Scammers learn<br>to use tricks to trick users into giving them their money through the use of the Big Five<br>personality traits. The Big Five personality traits that scammers commonly exhibit here are<br>agreeableness, extraversion, and openness to experience.<\/p>\n\n\n\n<p><br>Openness to experience is an individual who is willing to take risks, such as engaging in<br>activities that can put them at risk. They also tend to show agreeableness, sharing information<br>with scammers, and making themselves more vulnerable. They are also extraversion, which is<br>talking to new or more people than they should.<\/p>\n\n\n\n<p><br><strong>The goals of the article are to help marginalized groups<\/strong><br>The topic relates to the challenges, concerns, and contributions of marginalized groups.<br>This article explores an understudied area in the world, with a focus on Nigeria and its<br>challenges related to cybercrime victimization (Kayser et al. 2025). And the lack of studies and<br>policymakers in this area of cybercrime victimization (Kayser et al. 2025). The study&#8217;s overall<br>contributions to society are that it addresses problems faced by marginalized groups in the cyber<br>environment. It would be much better if we were more united on laws regarding cyber offenses,<br>rather than having every place have its own rules that don\u2019t communicate with each other about<br>the laws (Kayser et al. 2025). It also discussed open-source intelligence, a significant trend<br>enabled by the internet. And what data, privacy, and risk are shared for a big or a bad thing<br>(Kayser et al. 2025). And what skills scammers use to earn the trust of people so that they can<br>get their money, and what money the scammers are most likely to want (Kayser, 2025).<\/p>\n\n\n\n<p><strong>Conclusion<br><\/strong>In conclusion, this is an excellent article. It has some excellent points that will be<br>significant in the future, as well as a few that are significant now. People need to understand the<br>motives, theories, and principles regarding victims and professionals of cybersecurity because, <br>for now, <strong>t<\/strong>hey will not go away.<\/p>\n\n\n\n<p><strong>References<\/strong><br>Gonz\u00e1lez-Garc\u00eda Vinuela, M. (2025). The Legal Response to the Intrusion into Digital<br>Identity in Social Media. International Journal of Cybersecurity Intelligence &amp;<br>Cybercrime, 8(2). International Journal of Cybersecurity Intelligence &amp; Cybercrime.<br>https:\/\/doi.org\/10.52306\/2578-3289.1221<br>Grant, M., &amp; Gilreath, T. (2025). Deviant place theory and adolescent victimization:<br>Latent class profiles and mental health disparities in schools. APHA &#8211; APHA 2025<br>Annual Meeting and Expo; APHA.<br>https:\/\/apha.confex.com\/apha\/2025\/meetingapp.cgi\/Paper\/578822<br>Kayser, C. S., Dearden, T., Parti, K., &amp; Choi, S. (2025). Navigating the Digital Frontier:<br>New Perspectives on Cybercrime and Governance. International Journal of Cybersecurity<br>Intelligence &amp; Cybercrime, 8(2). International Journal of Cybersecurity Intelligence &amp;<br>Cybercrime. https:\/\/doi.org\/10.52306\/2578-3289.1222<br>Lim, A., &amp; Choi, K. (2025). Modus Operandi and Blockchain Analysis of Romance<br>Scams: Cryptocurrency-Driven Victimization. International Journal of Cybersecurity<br>Intelligence and Cybercrime, 8(2). International Journal of Cybersecurity Intelligence &amp;<br>Cybercrime. https:\/\/doi.org\/10.52306\/2578-3289.1220<br>Nzeakor, O. F., Okafor, R. N., &amp; Nwoke, C. N. (2025). A Study of Pattern of Cybercrime<br>Abuse of Individual Internet Users in Umuahia North LGA, Abia State of South-eastern<br>Nigeria. International Journal of Cybersecurity Intelligence &amp; Cybercrime, 8(2).<br>International Journal of Cybersecurity Intelligence &amp; Cybercrime.<br>https:\/\/doi.org\/10.52306\/2578-3289.1183<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-content\/uploads\/sites\/39390\/2025\/12\/annotated-Article20review2023120Aiden20Johnson.docx-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Article20review2023120Aiden20Johnson.docx-2.\"><\/object><a id=\"wp-block-file--media-61904455-cb92-422b-a5b4-97524c4944a2\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-content\/uploads\/sites\/39390\/2025\/12\/annotated-Article20review2023120Aiden20Johnson.docx-2.pdf\">annotated-Article20review2023120Aiden20Johnson.docx-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-content\/uploads\/sites\/39390\/2025\/12\/annotated-Article20review2023120Aiden20Johnson.docx-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-61904455-cb92-422b-a5b4-97524c4944a2\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Article Review <\/strong>2<\/p>\n\n\n\n<p><strong>Article 2 Review: Cyberbullying on social media<\/strong><br>Student Name: Aiden Johnson<br>School of Cybersecurity, Old Dominion University<br>CYSE201S, Cybersecurity and Social Science<br>Instructor Name: Diwakar Yalpi<br>11\/15\/25<\/p>\n\n\n\n<p><strong>The relationship of topic to principles of the social sciences.<\/strong><br>The topic of cyberbullying relates to the social sciences because cyberbullying is one of<br>The most significant points in the relationship between cybersecurity and social sciences are.<br>Cyberbullying is a health concern as it relates to social media (Ray et al., 2024). The study<br>provided a comprehensive review of published papers between the years of 2007 and 2022 and<br>found inconsistencies of how cyberbullying is \u201cdefined and reported in terms of prevalence and<br>impact\u201d (Ray et al., 2024).<\/p>\n\n\n\n<p><br><strong>Study analysis of research questions, hypotheses, independent variable, and<br>dependent variable<\/strong><br>Provided in the study are four research questions. The first is, \u201cHow is cyberbullying<br>defined in literature\u201d (Ray et al., 2024)?\u201d The second states, \u201cWhat factors are making<br>cyberbullying a problem, and can these factors be broken down so that people can understand<br>them?\u201d (Ray et al. 24) and the third asks, \u201cCan personality traits make an impact on how likely<br>you are to get bullied online\u201d, and the final question states, \u201cHow do experiences that can be<br>involved or indirect cause the amount you get bullied online? \u201c(Ray et al., 2024).<br>The hypothesis of the study proposes the explanation of cyberbullying and its true<br>definition, and how does it impacts people. The Independent Variable is to identify gaps in the<br>literature on cyberbullying, and the Dependent Variable is the impact on people because of<br>cyberbullying.<\/p>\n\n\n\n<p><br><strong>Research methodology of the <\/strong>study<br>The research methods provide an overview of the methodology that includes search<br>strategies, selecting relevant and irrelevant data to consider for the study, and guidelines for using<br>Preferred Reporting Items for Systematic Reviews (Ray et al., 2024). The methods of the study include the areas of positional, interview, critical review, meta-analysis, policy simulation, and<br>statistical methods (Ray et al., 2024).<\/p>\n\n\n\n<p><br><strong>Types of data and analysis<\/strong><br>The types of data analysis are both qualitative and quantitative. There are surveys to<br>cover several topics, numbers, and values. These surveys collect qualitative data from the people<br>taking them. The surveys have covered anything from the details of who is getting affected by<br>cyberbullying, and through the statistical data analysis, they can see who is more likely to be<br>affected by cyberbullying online.<\/p>\n\n\n\n<p><br><strong>Relationship of concepts from PowerPoint to the article.<\/strong><\/p>\n\n\n\n<p>There are many concepts in the PowerPoint about cyberbullying. The article for sure<br>talked about what things are posted online to cause cyberbullying, like hurtful pictures and<br>videos, posing personal or false information about other people, doxing, and threatening. These<br>are all things discussed in the article. It also discussed the big five personality traits, which are<br>the same as in the personality theories, and this was a significant point in the PowerPoint on how<br>people think and what they do online. The article discussed openness to experience,<br>agreeableness, extraversion, conscientiousness, and neuroticism, and explained each.<\/p>\n\n\n\n<p><br><strong>Relationship of the topic to the challenges, concerns, and contributions of marginalized<br>groups<br><\/strong>The study refers to how females are more likely to be impacted by cyberbullying. Males<br>are the ones who perpetrate cyberbullying against others (Ray et al., 2024). People&#8217;s ages also<br>affect them, especially young individuals and adolescents (Ray et al., 2024). One of the surveys<br>reported that young individuals reported that 42% of them have experienced cyberbullying on<br>Instagram, 37% on Facebook, and 31% on Snapchat (Ray et al., 2024). In the same survey, 71% <\/p>\n\n\n\n<p>of respondents believed these companies need to do more to stop cyberbullying (Ray et al.,<br>2024). In other surveys with Arab students in the university, they said that 91% said that<br>cyberbullying happened online, with Instagram being the worst at 55.5% and Facebook at 38%<br>being the most (Ray et al., 2024). And their views are like those of LGBTQ+ people, who have a<br>significant chance of being impacted by cyberbullying (Ray et al., 2024). And minority groups<br>also have a greater chance of being affected by cyberbullying (Ray et al., 2024).<\/p>\n\n\n\n<p><br><strong>Overall contributions of the study to society<\/strong><br>It&#8217;s hard to say whether the articles or studies have a way to contribute to society without<br>further exploration. As all this data comes from one source, the article needs to be supported by<br>additional information and research in the field of cybersecurity and social science to confirm or<br>refute the findings. Cyberbullying is a new phenomenon that is happening and is only growing<br>because of social media. The authors raise some good points, especially the need to further<br>explore this area.<\/p>\n\n\n\n<p><br><strong>Conclusion<\/strong><br>This study is an excellent article or source for identifying the problems with<br>cyberbullying and why it happens. The importance of exploring this area and its effects on the<br>population of social media users can help to understand the social impact and why it affects some<br>and not others. Still, the ones that get affected by it can have life-threatening social problems due<br>to cyberbullying attacks. Many of the attackers don\u2019t target just one person; it varies from person<br>to person, and it can be a global attack unaware to the person.<br>The most significant point I learn from the article and will always think about after<br>reading through the article is that everyone plays an essential role in the area of cyberbullying.<br>A person can be a defender who stops the attack, or a bystander who does nothing about it. Most people fall into the category of defender, but many fall into the category of reinforcer and<br>encourage cyberbullying (Ray et al., 2024). Some people assist in cyberbullying by engaging<br>with the bully or being the bully themselves (Ray et al., 2024). This makes me think that a<br>broader understanding of cyberbullying is needed because it is not a simple term, and it requires<br>us to understand how to identify it to stop cyberbullying. The social impact is devastating for the<br>people being bullied, especially the younger populations who are constantly using social media.<\/p>\n\n\n\n<p><strong>References<\/strong><br>Ray, G., McDermott, C. D., &amp; Nicho, M. (2024). Cyberbullying on social media: Definitions,<br>prevalence, and impact challenges. Journal of Cybersecurity, 10(1).<br>https:\/\/doi.org\/10.1093\/cybsec\/tyae026<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-content\/uploads\/sites\/39390\/2025\/12\/annotated-Article20review20220Aiden20Johnson.docx-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Article20review20220Aiden20Johnson.docx-1.\"><\/object><a id=\"wp-block-file--media-a5aec875-8dd5-428f-9f08-4c7487d71f81\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-content\/uploads\/sites\/39390\/2025\/12\/annotated-Article20review20220Aiden20Johnson.docx-1.pdf\">annotated-Article20review20220Aiden20Johnson.docx-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-content\/uploads\/sites\/39390\/2025\/12\/annotated-Article20review20220Aiden20Johnson.docx-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a5aec875-8dd5-428f-9f08-4c7487d71f81\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Article Review 1\u00a0 The Future and Current Problems in the Cyber EnvironmentAiden JohnsonCYSE201SArticle review 1Diwakar Yalpi9\/28\/25 The Relationship of the Study to the Social Sciences The reason this topic relates to the social sciences is that it focuses on scams,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/test2-2\/test2-1\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":24877,"featured_media":0,"parent":251,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/pages\/250"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/users\/24877"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/comments?post=250"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/pages\/250\/revisions"}],"predecessor-version":[{"id":277,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/pages\/250\/revisions\/277"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/pages\/251"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/media?parent=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}