{"id":364,"date":"2025-04-30T02:33:10","date_gmt":"2025-04-30T02:33:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/?page_id=364"},"modified":"2025-04-30T02:33:10","modified_gmt":"2025-04-30T02:33:10","slug":"article-review-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/article-review-1\/","title":{"rendered":"Article Review 1"},"content":{"rendered":"\n<p><br><strong>Title: Privacy Threats in Intimate Relationships<\/strong><\/p>\n\n\n\n<p><strong><br><\/strong><em><strong>Introduction<\/strong><\/em><br>The article that I chose is titled \u201cPrivacy Threats in Intimate Relationships\u201d. This article<br>deep dives into different types of personal or \u201cintimate relationships and how people that<br>you have relationships with can also invade your privacy as well.<br>How the topic relates to the principles of the social sciences<br>This article relates to the social sciences through sociology because the article talks<br>about how personal interaction relates to privacy invasion. Another principle is<br>psychology, because people that are in intimate relationships may justify having access<br>to private information because of the preexisting personal relationship<\/p>\n\n\n\n<p><br><strong><em>Research Methods Used &amp; Data and Analysis<\/em><\/strong><br>Throughout the article multiple case studies are used to further support the topic. It also<br>includes many examples of privacy violations in intimate relationships. Throughout the<br>article the multiple types of relationships are documented and has examples provided,<br>such as friends, caregivers, parents and minor children to name a few.<\/p>\n\n\n\n<p><br><strong><em>Topic In relation to the class<\/em><\/strong><br>I was able to see how the article relates to the course material by referencing the<br>module 4 PowerPoint. It was mentioned how technology and psychology are<br>interconnected. It also mentioned how psychological factors increase the risk of<br>victimization. Also sometimes victims may not even realize that they play a part in their<br>own victimization, such as children that are being victimized by their parents or elderly<br>parent and their child.<\/p>\n\n\n\n<p><strong><em>How the topic relates to marginalized groups<\/em><\/strong><br>Marginalized groups are those that are at a disadvantage due to multiple factors such<br>as age, financial status, race, and sexual orientation.<\/p>\n\n\n\n<p><br><strong><em>Contributions to society<\/em><\/strong><br>The information provided brought awareness to the existence of privacy invasion in<br>relationships. Sometimes what we may see as \u201cnormal\u201d could be manipulation and a<br>violation against someone. The article also mentions different ways to prevent this from<br>happening and how to educate the public as well as provide assistance and laws that<br>could help someone that is experiencing this.<\/p>\n\n\n\n<p><br><strong><em>Conclusion<\/em><\/strong><br>This article provided a great explanation of how people can experience privacy invasion<br>in personal relationships. It also explored the different types of relationships, provided<br>examples of each and also ways that people in these situations can protect their<br>personal info and have more privacy.<\/p>\n\n\n\n<p><br><em>Citations<\/em><br>Levy, Karen, and Bruce Schneier.<br>Privacy Threats in Intimate Relationships | Journal of<br>Cybersecurity | Oxford Academic, 31 May 2020,<br>academic.oup.com\/cybersecurity\/article\/6\/1\/tyaa006\/5849222.<br>https:\/\/academic.oup.com\/cybersecurity\/article\/6\/1\/tyaa006\/5849222?searchresult=1<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title: Privacy Threats in Intimate Relationships IntroductionThe article that I chose is titled \u201cPrivacy Threats in Intimate Relationships\u201d. This articledeep dives into different types of personal or \u201cintimate relationships and how people thatyou have relationships with can also invade your privacy as well.How the topic relates to the principles of the social sciencesThis article relates&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":30517,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages\/364"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/users\/30517"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/comments?post=364"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages\/364\/revisions"}],"predecessor-version":[{"id":365,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages\/364\/revisions\/365"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/media?parent=364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}