{"id":208,"date":"2025-04-25T20:30:33","date_gmt":"2025-04-25T20:30:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/?page_id=208"},"modified":"2025-04-26T15:39:01","modified_gmt":"2025-04-26T15:39:01","slug":"article-reviews","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/article-reviews\/","title":{"rendered":"Article Review 1"},"content":{"rendered":"\n<p><strong>Article Review 1-<\/strong> <\/p>\n\n\n\n<p><strong>Article Reviews on Cybersecurity and Cyber Crimes:<\/strong><\/p>\n\n\n\n<p>Keshawn Thomas<\/p>\n\n\n\n<p>Department of Cybersecurity, Old Dominion University<\/p>\n\n\n\n<p>&nbsp;CYSE 201S Cybersecurity and the Social Sciences&nbsp;<\/p>\n\n\n\n<p>Professor Diwakar Yalpi<\/p>\n\n\n\n<p>February 16th, 2025<\/p>\n\n\n\n<p><strong>Article Reviews on Cybersecurity and Cyber Crimes:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Relationship to the Principles of Social Sciences<\/strong><\/h1>\n\n\n\n<p>In cybersecurity politics in Egypt, it touches on many principles in social sciences, such as political science, sociology, and economics. The manipulation of uncertainty in cybersecurity refers to how states or political actors exert control over information, communication, and technology. But Egypt\u2019s government has been known to limit internet access, monitor digital communications, and impose control over cybersecurity infrastructure. Most of the activities represent the use of power in a political context, as the state looks to regain sovereignty and control in the face of challenges both domestic and international, also in the digital realm. By the nature of cybersecurity, it manages risks and uncertainties in the digital era. The manipulation of uncertainty might include utilizing information asymmetry, where the government or big parties have a lot more knowledge than the public, and they justify surveillance or different policies. In the article, they examined the theoretical basis of digital politics, surveillance, and innovative resistance.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Research Questions, Hypothesis, &amp; Methods<\/strong><\/h1>\n\n\n\n<p>Many of these frameworks allow us to examine the political consequences of digital technology, including the creative methods people use to resist and challenge digital authority, as well as the impact of surveillance on personal freedom. We can effectively navigate the digital. The type of research method that was used was the methodology that relies on a diverse range of primary and secondary sources, comprising the news articles in Arabic and English, reports from national and international digital rights organizations, and surveillance technology frameworks. Along with the insights gathered from one of the authors\u2019 personal experiences as an Egyptian citizen living in Cairo, these materials are augmented with the three interviews with prominent Egyptian cybersecurity experts and activists.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Data &amp; Analysis<\/strong><\/h1>\n\n\n\n<p>The data and analysis that was spoken about in the article was the three interviews. The interviews were carried out in person and through emails and VOIPs, then transcribed and analyzed informally. The interview questions collected information on various topics, including the following: Egypt\u2019s laws and stakeholders concerning cybersecurity; regional and international partnership regarding cybersecurity in Egypt. Wherever the interview data were cross-referenced with&nbsp; open source information and additional field research beyond the limits of the article.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Relationship To The Powerpoint<\/strong><\/h1>\n\n\n\n<p>There are many concepts from class that could be included in the article, but I think one that stands out the most is the surveys and cybersecurity research it talked about identifying who to interview can be a problem if the researcher wants to interview\/survey criminals\/hackers (Diwakar Yalpi, PowerPoint, Page 5). It talked about how the three interviews were semi-structured in the article. Another concept for me would be the Experiments session, which asked about types of questions: \u201cDo certain characteristics of individuals increase the likelihood of unsafe practices when using technology?\u201d (Diwakar Yalpi, PowerPoint, Page 8). Also in the article, it spoke about technology allowing large-scale access to telephone networks, which sometimes is an unsafe practice using technology (Bassant Hassib,2021, Manipulating uncertainty:Cybersecurity Politics in Egypt).<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Relationship to the Challenge, Concerns &amp; Contributions<\/strong><\/h1>\n\n\n\n<p>Egypt faces difficult concerns when dealing with cybercrime. Which includes the crazy evolution of cyberthreats, which can outpace the development of defensive measures. There\u2019s also a need for different training and resources for law enforcement. Again, Egypt faces difficult challenges as well, which is a major issue: the rapid advancement of technology, which makes it hard to keep up with the different cyber threats. Also there is a need for more training and resources for law enforcement.<\/p>\n\n\n\n<p><strong>Conclusion&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;<\/strong>&nbsp;The article has examined the development of cybersecurity policies, practices, and technologies in Egypt following the January 25, 2011 revolution. It has been suggested that the evolution of cybersecurity in Egypt has been significantly influenced by ingrained uncertainty regarding the political activists employed. Also, the article presents two theoretical contributions. Initially, it has built upon and expanded research regarding uncertainty in contentious politics. While also we guarantee that cybersecurity concepts uphold and safeguard the types of uncertainty we cherish.<\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<p>Hassib, B., &amp; Shires, J. (2021, February 16). Manipulating uncertainty: Cybersecurity politics in Egypt | Journal of Cybersecurity | Oxford academic. Oxford Academic. https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyaa026\/6137887<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review 1- Article Reviews on Cybersecurity and Cyber Crimes: Keshawn Thomas Department of Cybersecurity, Old Dominion University &nbsp;CYSE 201S Cybersecurity and the Social Sciences&nbsp; Professor Diwakar Yalpi February 16th, 2025 Article Reviews on Cybersecurity and Cyber Crimes:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Relationship to&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/article-reviews\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30360,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/wp-json\/wp\/v2\/pages\/208"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/wp-json\/wp\/v2\/users\/30360"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/wp-json\/wp\/v2\/comments?post=208"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/wp-json\/wp\/v2\/pages\/208\/revisions"}],"predecessor-version":[{"id":212,"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/wp-json\/wp\/v2\/pages\/208\/revisions\/212"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sspring25\/wp-json\/wp\/v2\/media?parent=208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}