Article Reviews

Article 1 Review: Discrimination and Cyberbulling against Women in Iraq: Exploring Social Media and Perceived Norms

Authored by: Saleh Hussain Ali, Toman Alkhafagy, Majeed Alkhafaji, Mohamed Amer Alseidi, Jalal Jabbar Aleiwi, Ahmed Fadhil Farhan, Sarah Hassan Jalil, Mohammed Kadhim Abbas Al-Maeeni, Salem Dawood Salman

Article Link: https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/190/72

In this study, the author investigates the prevalence of discrimination and cyberbullying against women in Iraq, placing a particular focus on how cultural and societal attitudes shape online behavior. The research questions aim to determine the extent of these issues and explore the role of social media, internet education, perceived norms, and social beliefs in the context of cyberbullying and discrimination. By examining personal experiences and perceptions through semi-structured interviews with Iraqi women, the author adopts a qualitative research design grounded in the principles of interpretivism philosophy, utilizing purposive sampling and an inductive research approach.

The findings shed light on the challenges faced by women in Iraq online, highlighting the pervasive cyberbullying and harassment they endure. Furthermore, the study underscores the link between cyberbullying and factors such as illiteracy, lack of resources, and the absence of contemporary criminal legislation. Concepts discussed in class, such as reinforcement sensitivity, and behavioral theories are crucial to the understanding the dynamics at play.

The study delves into the broader societal implications, connecting the struggles of women in Iraq to the challenges faced by marginalized groups. It emphasizes the need for improved educational resources for both men and women, advocating for legislative action to deter online misconduct. The research contends that addressing cyberbullying is not only about empowering individuals with knowledge but also requires a commitment to legislative measures by the government to ensure online safety.

In conclusion, this research contributes to the understanding of how cyberbullying and harassment through social media are wielded as tools to maintain control over marginalized individuals, particularly women in the Middle East. Through further exploration of this area, we can develop strategies to create safe online platforms, fostering a more inclusive digital environment. This study underscores the vital role of the social sciences in addressing contemporary challenges, advocating for informed policies to protect marginalized groups and contribute to the well-being of society.

Article 2: Cybersecurity When Working from Home During COVID-19: Considering the Human Factors

Authored by: Monica T. Whitty, Nour Moustafa, and Marthie Grobler

Article Link: https://academic.oup.com/cybersecurity/article/10/1/tyae001/7588826

The surge in remote work due to COVID-19 has highlighted a critical gap in cybersecurity – the human element. The article “Cybersecurity when working from home during COVID-19: considering the human factors” by Monica T. Whitty, Nour Moustafa, and Marthie Grobler delves into this topic, applying social science principles to understand how individual and social factors influence cybersecurity behaviors in remote work environments.

This article aligns with social psychology by examining how psychological states (stress, anxiety) and sociological aspects (shared workspaces) impact employees’ cybersecurity practices. The authors formulated research questions by hypothesizing human factors influence cybersecurity awareness and adherence to secure practices when working remotely.

The specific research methods employed by the study are not explicitly stated in the article. However, it’s likely the researchers utilized a survey design. This would involve distributing questionnaires to a sample group of remote workers to gather data on their experiences and the factors influencing their cybersecurity decisions. The data collected would likely be a combination of quantitative and qualitative. Quantitative data would include numerical responses on cybersecurity practices, such as password strength or frequency of software updates. Qualitative data would involve the psychological and social factors impacting those practices. This could involve open-ended questions about stress levels, feelings of isolation, or challenges faced due to shared workspaces. Analysis of this data would involve statistical tests to identify correlations between these human factors and the reported cybersecurity behaviors.

The concepts discussed in a social learning theory class would be particularly relevant to this article. Social learning theory states individuals learn through observing and interacting with others. This study investigates how social factors, including observing colleagues’ cybersecurity practices in a shared workspace, might influence an individual’s own cybersecurity behaviors.

While the article doesn’t directly address the challenges faced by marginalized groups, it does allude to the concept of the “digital divide.” This refers to the gap between those who have access to technology and the internet, and those who do not. Marginalized communities, due to socioeconomic factors, might have limited access to secure technology or reliable internet connections. This digital divide could indirectly increase their cybersecurity risks while working remotely.

The overall contribution of this study lies in its exploration of the human element within cybersecurity, particularly in the context of remote work. By highlighting the role of psychological and social factors, the research informs the development of more effective cybersecurity training and awareness programs. Training that considers these human factors can be tailored to address the specific anxieties or challenges faced by remote workers, ultimately leading to improved cybersecurity practices.

Future research could build upon this study by exploring additional human factors, such as fatigue or burnout, that might impact cybersecurity decision-making. Additionally, investigations into how organizations can create a remote work culture that prioritizes cybersecurity while also addressing the well-being of their employees would be valuable. By acknowledging the human element and its influence on cybersecurity behaviors, the study paves the way for the development of more effective strategies to protect information and systems in our increasingly digital world.

 

Career Paper

Introduction

Cyber policy and strategy planners play a crucial role in safeguarding digital infrastructures, mitigating cyber threats, and shaping cybersecurity policies. As professionals in this field, they navigate complex landscapes of technology, politics, economics, and society to develop comprehensive strategies that ensure the security and resilience of organizations against cyber threats. While technical expertise is essential, the effective execution of their responsibilities also relies heavily on insights from social science research principles. This paper explores the significance of social science in the daily routines of cyber policy and strategy planners, emphasizing its role in addressing societal concerns and safeguarding marginalized groups.

Understanding Human Behavior and Decision Making

One of the fundamental aspects of cybersecurity is understanding human behavior and decision making. Social science research provides valuable insights into human psychology, sociology, and economics, which are crucial for cyber policy and strategy planners. By understanding how individuals perceive and respond to cyber threats, these professionals can design more effective policies and strategies. For instance, behavioral psychological principles as discussed in Ajzen’s article the Theory of Planned Behavior inform the development of online safety habits. The theory suggests that promoting positive attitudes, subjective norms (beliefs about what others expect), and perceived behavioral control (ease of performing a behavior) can encourage secure behaviors, such as using strong passwords or regularly updating software.

Moreover, social science research helps cyber policy planners anticipate the socio-political implications of cybersecurity decisions. For example, implementing certain security measures might inadvertently infringe on privacy rights or disproportionately impact marginalized communities. By integrating social science perspectives, policy planners can proactively address these concerns and ensure that cybersecurity initiatives align with ethical and societal norms (Denning, 2019).

Inclusivity and Diversity

Cybersecurity is not immune to issues of inclusivity and diversity. Marginalized groups, including women, minorities, and individuals from low-income backgrounds, may face unique cybersecurity challenges and barriers to access. Social science research sheds light on these disparities and provides insights into how cyber policy and strategy can be crafted to be more inclusive and equitable.

For instance, studies have shown that women and minorities are underrepresented in the cybersecurity workforce (Osborne, 2023). By leveraging social science research on diversity and inclusion, cyber policy planners can develop initiatives to promote diversity in the field, such as targeted recruitment efforts, inclusive training programs, and support networks for underrepresented groups. Additionally, considering the needs and perspectives of diverse communities is essential for designing cybersecurity policies that effectively protect all segments of society.

Ethical and Legal Considerations

Ethical and legal considerations are paramount in cyber policy and strategy planning. Social science research informs professionals in this field about the ethical implications of their decisions and helps them navigate complex legal frameworks. For example, research in ethical theory provides guidance on balancing competing interests, such as security and privacy, in cybersecurity policies.

Furthermore, understanding the societal impact of cybersecurity policies is crucial for ensuring accountability and transparency. Social science principles of governance and public policy help cyber policy planners engage with stakeholders, solicit feedback from affected communities, and assess the broader societal implications of their strategies. By incorporating these perspectives, professionals can develop policies that are not only effective in addressing cyber threats but also uphold democratic values and protect civil liberties.

Conclusion

In conclusion, cyber policy and strategy planners rely on social science research and principles to effectively fulfill their responsibilities. By understanding human behavior, promoting inclusivity and diversity, and considering ethical and legal considerations, professionals in this field can develop policies and strategies that are not only technically sound but also socially responsible. By integrating social science perspectives into their daily routines, cyber policy and strategy planners contribute to building a safer, more resilient digital ecosystem for all members of society, including marginalized groups.

 

References:

Ajzen, I., Joyce, N., Sheikh, S., & Cote, N. G. (2011). Knowledge and the Prediction of Behavior: The Role of Information Accuracy in the Theory of Planned Behavior. Basic and Applied Social Psychology, 33(2), 101–117. https://doi.org/10.1080/01973533.2011.568834

Denning, D. E. (2006). Information warfare and security. Addison-Wesley. 

Osborne, C. (2023, September 27). Women to hold 30 percent of cybersecurity jobs globally by 2025. Cybercrime Magazine. https://cybersecurityventures.com/women-in-cybersecurity-report-2023/