Article Review 1-

Article Reviews on Cybersecurity and Cyber Crimes:

Keshawn Thomas

Department of Cybersecurity, Old Dominion University

 CYSE 201S Cybersecurity and the Social Sciences 

Professor Diwakar Yalpi

February 16th, 2025

Article Reviews on Cybersecurity and Cyber Crimes:                                    

Relationship to the Principles of Social Sciences

In cybersecurity politics in Egypt, it touches on many principles in social sciences, such as political science, sociology, and economics. The manipulation of uncertainty in cybersecurity refers to how states or political actors exert control over information, communication, and technology. But Egypt’s government has been known to limit internet access, monitor digital communications, and impose control over cybersecurity infrastructure. Most of the activities represent the use of power in a political context, as the state looks to regain sovereignty and control in the face of challenges both domestic and international, also in the digital realm. By the nature of cybersecurity, it manages risks and uncertainties in the digital era. The manipulation of uncertainty might include utilizing information asymmetry, where the government or big parties have a lot more knowledge than the public, and they justify surveillance or different policies. In the article, they examined the theoretical basis of digital politics, surveillance, and innovative resistance.

Research Questions, Hypothesis, & Methods

Many of these frameworks allow us to examine the political consequences of digital technology, including the creative methods people use to resist and challenge digital authority, as well as the impact of surveillance on personal freedom. We can effectively navigate the digital. The type of research method that was used was the methodology that relies on a diverse range of primary and secondary sources, comprising the news articles in Arabic and English, reports from national and international digital rights organizations, and surveillance technology frameworks. Along with the insights gathered from one of the authors’ personal experiences as an Egyptian citizen living in Cairo, these materials are augmented with the three interviews with prominent Egyptian cybersecurity experts and activists.

Data & Analysis

The data and analysis that was spoken about in the article was the three interviews. The interviews were carried out in person and through emails and VOIPs, then transcribed and analyzed informally. The interview questions collected information on various topics, including the following: Egypt’s laws and stakeholders concerning cybersecurity; regional and international partnership regarding cybersecurity in Egypt. Wherever the interview data were cross-referenced with  open source information and additional field research beyond the limits of the article. 

Relationship To The Powerpoint

There are many concepts from class that could be included in the article, but I think one that stands out the most is the surveys and cybersecurity research it talked about identifying who to interview can be a problem if the researcher wants to interview/survey criminals/hackers (Diwakar Yalpi, PowerPoint, Page 5). It talked about how the three interviews were semi-structured in the article. Another concept for me would be the Experiments session, which asked about types of questions: “Do certain characteristics of individuals increase the likelihood of unsafe practices when using technology?” (Diwakar Yalpi, PowerPoint, Page 8). Also in the article, it spoke about technology allowing large-scale access to telephone networks, which sometimes is an unsafe practice using technology (Bassant Hassib,2021, Manipulating uncertainty:Cybersecurity Politics in Egypt).

Relationship to the Challenge, Concerns & Contributions

Egypt faces difficult concerns when dealing with cybercrime. Which includes the crazy evolution of cyberthreats, which can outpace the development of defensive measures. There’s also a need for different training and resources for law enforcement. Again, Egypt faces difficult challenges as well, which is a major issue: the rapid advancement of technology, which makes it hard to keep up with the different cyber threats. Also there is a need for more training and resources for law enforcement.

Conclusion 

    The article has examined the development of cybersecurity policies, practices, and technologies in Egypt following the January 25, 2011 revolution. It has been suggested that the evolution of cybersecurity in Egypt has been significantly influenced by ingrained uncertainty regarding the political activists employed. Also, the article presents two theoretical contributions. Initially, it has built upon and expanded research regarding uncertainty in contentious politics. While also we guarantee that cybersecurity concepts uphold and safeguard the types of uncertainty we cherish.

References

Hassib, B., & Shires, J. (2021, February 16). Manipulating uncertainty: Cybersecurity politics in Egypt | Journal of Cybersecurity | Oxford academic. Oxford Academic. https://academic.oup.com/cybersecurity/article/7/1/tyaa026/6137887