{"id":313,"date":"2026-04-28T14:31:53","date_gmt":"2026-04-28T14:31:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/?page_id=313"},"modified":"2026-04-28T14:46:40","modified_gmt":"2026-04-28T14:46:40","slug":"article-review","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/cyse-201s\/article-review\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Article Review #1: Cybersecurity and Banks\u2019 Financial Performance During COVID-19<\/strong><\/h2>\n\n\n\n<p><strong>Introduction \/ BLUF<\/strong><\/p>\n\n\n\n<p>Al-Sartawi et al. (2025) examined the relationship between banks&#8217; cybersecurity strategies and financial performance at Gulf Cooperation Council (GCC)-listed banks during the COVID-19 pandemic. In short, Al-Sartawi et al. (2025) showed a statistically positive association between cybersecurity strategy and financial performance. That is, they showed that higher levels of cybersecurity strategy were positively and significantly associated with improvements in Return On Assets (ROA). The study shows that cybersecurity has become a critical strategic factor in achieving economic stability and institutional credibility.<\/p>\n\n\n\n<p><strong>Relation \/ Connection to Social Science Principles<\/strong><\/p>\n\n\n\n<p>Multiple social science principles appear in this study. Both human behavior and institutional governance directly affect cybersecurity. For example, the composition and structure of boards of directors can determine whether an institution will successfully implement cybersecurity. Furthermore, the interconnectedness of social systems is evidenced by the fact that the COVID-19 pandemic caused many institutions to rapidly transform digitally. The rapid transition to technology increased cybersecurity risks, which negatively affected the financial performance of the banks studied in the paper. The researchers used empirical methodology to assess for quantifiable relationships, which demonstrates the systematic and empirically-based nature of social science research.<\/p>\n\n\n\n<p><strong>Research Question \/ Hypothesis \/ Independent and Dependent Variables<\/strong><\/p>\n\n\n\n<p>This study addressed two primary research questions: What was the level of cybersecurity implemented by GCC-listed banks during COVID-19? How did the level of cybersecurity implemented by the banks studied relate to their financial performance? The authors proposed that higher levels of cybersecurity would be positively correlated to financial performance. Cybersecurity Level (CL) is the independent variable, and was assessed using a structured checklist. Return on Assets (ROA) and Earnings Per Share (EPS) are the dependent variables. The control variables included board independence, board size, IT governance, the number of females on the board, firm size, leverage, and firm age.<\/p>\n\n\n\n<p><strong>Types of Research Methods Used<\/strong><\/p>\n\n\n\n<p>The researchers utilized quantitative methodologies in the study. They obtained data from 41 GCC-listed banks using sources such as Bloomberg, annual reports, Yahoo Finance, and stock exchange platforms. The cybersecurity levels of the banks were evaluated using a binary checklist completed by the banks&#8217; ICT and security managers. Multiple linear regression, fixed-effects panel regression, and Structural Equation Modeling (SEM) were used by the researchers to assess the relationship between cybersecurity and financial performance.<\/p>\n\n\n\n<p><strong>Types of Data and Analysis Used<\/strong><\/p>\n\n\n\n<p>The data used in the study consisted of numerical financial indicators and binary cybersecurity implementation assessments. The researchers used statistical analysis on the data, including descriptive statistics, Pearson correlation matrices, regression models, Variance Inflation Factor (VIF) tests, Durbin-Watson tests, Cook-Weisberg tests, and SEM analysis. The results showed a statistically significant positive relationship between cybersecurity levels and ROA. This suggests that organizations practicing more robust cybersecurity strategies will exhibit greater operational efficiency and profitability.<\/p>\n\n\n\n<p><strong>Connections to Course Concepts<\/strong><\/p>\n\n\n\n<p>The study relates to course concepts of cybersecurity governance, institutional trust, and risk management. The study provides support to the concept that cybersecurity is a socio-technical issue, influenced by the actions of leaders, governance, and regulatory systems. Additionally, the study provides evidence for the discussion of how crises such as COVID-19 generate changes in digital behavior and increases in institutional vulnerabilities; therefore, organizations must develop and apply structured cybersecurity frameworks.<\/p>\n\n\n\n<p><strong>Connections to Marginalized Groups<\/strong><\/p>\n\n\n\n<p>While the study does not specifically address marginalized groups, it does discuss the implications of expanding digital banking during COVID-19. Since society is becoming increasingly reliant on digital banking, individuals lacking in digital literacy and\/or access to secure digital technologies may be disproportionately harmed by these developments. The study also discusses the importance of diversity in cybersecurity leadership and institutional resilience by incorporating female board membership into the analysis.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Overall, the study demonstrated empirically that investing in cybersecurity will positively affect financial performance, especially in times of crisis. Additionally, the study enhanced our understanding of cybersecurity as both an economic and social issue. The findings of the study support the development of stronger regulatory frameworks for cybersecurity and the requirement for standardized cybersecurity disclosure requirements. The study also highlighted the significance of cybersecurity in preserving financial stability and generating public trust.<\/p>\n\n\n\n<p><strong>Reference<\/strong><\/p>\n\n\n\n<p>Al-Sartawi, A. M. A. M., Sanad, Z., Shehadeh, M., &amp; Binsaddig, R. (2025). Cybersecurity and banks performance: Evidence from Gulf Cooperation Council. International Journal of Cyber Criminology, 19(1), 54\u201371. <a href=\"https:\/\/doi.org\/10.5281\/zenodo.47661903\">https:\/\/doi.org\/10.5281\/zenodo.47661903<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/444\/132\">https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/444\/132<\/a><\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Article Review #2: Exploring the Psychological Profile of Cybercriminals for Improved Cybercrime Prevention<\/strong><\/h2>\n\n\n\n<p><strong>Introduction \/ BLUF<\/strong><\/p>\n\n\n\n<p>Cybercrime has been recognized as a major problem in today&#8217;s world, but because of the relatively new nature of cybercrime, the majority of current methods of cybercrime prevention are based on technology rather than understanding the motivations behind those who commit cybercrimes. Trinh et al. (2025) indicate that cybercrimes have numerous behavioral origins relative to the individual committing the cybercrime with respect to their degree of technical expertise and the extent of their impulsive and narcissistic behaviors.<\/p>\n\n\n\n<p><strong>Relation \/ Connection to Social Science Principles<\/strong><\/p>\n\n\n\n<p>This paper utilizes basic principles of social science including human behavior, institutional structure, and global systems to identify the cybercrime issue. Utilizing Routine Activity Theory and Deterrence Theory, the authors will utilize the social sciences to explain why motivated offenders take advantage of digital opportunities where there are weak guardianships in place. This research has established cybercrime as a social construction that exists as a result of opportunity (digital), regulatory environment, societal norms of the population at risk, and presence\/absence of alternative opportunities.<\/p>\n\n\n\n<p><strong>Research Question \/ Hypothesis \/ Independent and Dependent Variables<\/strong><\/p>\n\n\n\n<p>A comprehensive review of the psychological attributes of cybercriminals was conducted to establish the implications of cybercrime prevention based upon the psychological attributes of cybercriminals. Since this was a systemic review, no direct experimental independent or dependent variables were measured. However, there are several psychologically-based traits (narcissism and impulsivity) that could explain why some individuals commit cybercrimes, and thus represent the outcome variable that all of the literature reviewed examined.<\/p>\n\n\n\n<p><strong>Types of Research Methods Used<\/strong><\/p>\n\n\n\n<p>The systematic literature review described above used PRISMA methodology to select peer-reviewed studies of cybercriminal behavior. Authors evaluated 1200 studies; selected 45 peer-reviewed studies published between 2010 and 2023. Authors identified the data sources for the studies as follows: PubMed, IEEE Xplore, Google Scholar, ACM Digital Library, and Web of Science. Authors used EndNote, Excel, and NVivo to evaluate and organize the results of the literature review.<\/p>\n\n\n\n<p><strong>Types of Data and Analysis Used<\/strong><\/p>\n\n\n\n<p>Authors evaluated qualitative and quantitative data from previous studies to collect the data for the current study. Authors used thematic synthesis and quality evaluation using PRISMA and CASP guidelines to analyze the findings of the study. As noted in the results section of the article, authors identified common psychological patterns of offending behavior, and authors identified the potential for an increased threat to security from AI-based attacks and IoT vulnerabilities.<\/p>\n\n\n\n<p><strong>Connections to Course Concepts<\/strong><\/p>\n\n\n\n<p>Findings of this study relate to some of the course materials relating to socio-technical systems, governance, and the human aspects of cybersecurity. Moreover, findings of this study support the view that while cybersecurity can be viewed as a purely technical concept, it is fundamentally a behavioral and institutional concept. Similarities to the course materials relating to the topics of risk, deterrence, and guardianship in the digital environment are found in the application of criminological theory.<\/p>\n\n\n\n<p><strong>Connections to Marginalized Groups<\/strong><\/p>\n\n\n\n<p>Cybercrime can result in both psychological and financial harm to its victims, resulting in stress, anxiety, and reputational damage to victims. In terms of the two most vulnerable populations to being victimized by cybercrime, those include older adults, as well as users with little or no digital knowledge, recommendations for creating educational programs and policies that will protect vulnerable groups were identified within this research.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>In conclusion, this study has greatly contributed to our understanding of cybercrime from a multi-disciplinary and psychological standpoint. This study also provided evidence of how cybercrime prevention methods require a combination of law enforcement practices; technological solutions; and, behavioral science applications. The authors of this study have used their fields of study of criminology; psychology; and, computer security (cybersecurity) to develop a framework for creating policy and providing practical methods for preventing cybercrime.<\/p>\n\n\n\n<p><strong>Reference<\/strong><\/p>\n\n\n\n<p>Trinh, D. T., Dinh, T. C. H., &amp; Tran, T. N. K. (2025). Exploring the psychological profile of cybercriminals: A comprehensive review for improved cybercrime prevention. International Journal of Cyber Criminology, 19(1), 114\u2013137. <a href=\"https:\/\/doi.org\/10.5281\/zenodo.47661906\">https:\/\/doi.org\/10.5281\/zenodo.47661906<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/452\/133\">https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/452\/133<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1: Cybersecurity and Banks\u2019 Financial Performance During COVID-19 Introduction \/ BLUF Al-Sartawi et al. (2025) examined the relationship between banks&#8217; cybersecurity strategies and financial performance at Gulf Cooperation Council (GCC)-listed banks during the COVID-19 pandemic. In short, Al-Sartawi et al. (2025) showed a statistically positive association between cybersecurity strategy and financial performance. That&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/cyse-201s\/article-review\/\">Read More<\/a><\/div>\n","protected":false},"author":31499,"featured_media":0,"parent":300,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/pages\/313"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/users\/31499"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/pages\/313\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/pages\/313\/revisions\/319"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/pages\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/demarcosivery-armstrong\/wp-json\/wp\/v2\/media?parent=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}