Article Review #1 and #2

Article Review 1

Jace kindred
October 2, 2024
Christos A Makridis, Do data breaches damage reputation? Evidence from 45 companies
between 2002 and 2018, Journal of Cybersecurity, Volume 7, Issue 1, 2021, tyab021,
https://doi.org/10.1093/cybsec/tyab021
Article I choose

Article 1# the damage of Data breaches
In this article the author questions what type of damage do data breaches do to a company
not just on a financial level but on a reputation level. Depending on the size of your
company the backlash you might receive from a data breach might be minimal to even
beneficial depending on how small your company is. The media attention might bring more
eyes to your company that otherwise would not even know your company at all. The way
data was collected was “data from the CoreBrand Index with all publicly traded companies
contained in Compustat from the Center for Research in Security Prices, which measures
financial and other firm characteristics”(Makridis 2021). Tables were used to show the data
of these companies before and after data breaches happened to them. This article and what
is shows relates to what we have learned in class about data breaches, and the impact they
might have on a person or even the company it self like when we talked about the
Crowdstrike data breach and the companies it affected not only financially but also the
reputation of these companies the average person will think if a company allowed a data
breach like this to happen once they might let it happen again. This article only really
concerns one marginalized group and that is small businesses. The article talks about how
data breaches affect small businesses way more than big businesses because a small
company or business has not built up that trust or the capital to go through a data breach
like a bigger business has. Small businesses can also benefit from data breaches if
handling the extra media attention might drive more eyes onto the business. This article
relates to social science by going through the scientific method to come up with these
conclusions a hypothesis was made then data was collected to see whether the data would
prove or disprove the hypothesis. In conclusion this article contributes to society by
answering the question on how impactful data breaches are to companies by showing that
“only the largest and most salient data breaches are associated with declines in intangible
capital, whereas others are associated with statistically insignificant, but economically
meaningful, increases in intangible capital.”

Article review 2

Jace kindred
11/17/2024
Teodor Sommestad, Henrik Karlzén, The unpredictability of phishing susceptibility: results
from a repeated measures experiment, Journal of Cybersecurity, Volume 10, Issue 1, 2024,
tyae021, https://doi.org/10.1093/cybsec/tyae021

Article review #2 Phishing attacks susceptibility

Review Of Article
In the article researchers wanted to understand what made someone more likely to fall victim to
phishing scam emails. The researchers proposed three hypotheses on what might influence the
likelihood of someone falling victim to this scam. One is what is represented in the email. The
second one is the number of changes to the email to personalize it to the recipient and number
of influence techniques added to the email. The research methods used to test the hypothesis
were simulated phishing emails sent to participants (Sommestad 2024). There were 102
participants. The data provided by the simulated emails supported the first hypothesis, the
second hypothesis was half supported and the third hypothesis was not supported by the results
of the data from the datasets provided by the simulated phishing emails. Some questions
regarding the experiment were that there was no bias and that results were hindered by the
small sample size.

How It Relates To Class
The topic of phishing attacks relates to the social sciences; one of the sciences it relates to is
the science of psychology. Phishing attacks most of the time use a sense of fear by saying
things like “your account will be deactivated if you don’t click here” which is a psychological ploy
to invoke a quick response. It also relates to the Sciences Sociology when phishing attacks try
to impersonate people or companies you might trust by trying to pose as them. The concept of
victimization theory that we went over in class from the powerpoint relates to the article because
in the article the researchers hope to find out why some people are more susceptible to phishing
attacks then other and that is what victimization theory is all about why some people are more
likely to have a crime committed against them then others.

Conclusion
Phishing attacks discussed in the article attacks Marginalized groups like the elderly and low
income individuals. For the elderly phishing attacks prey on them because they are less tech
savvy and don’t also check the details of who might being sending the email people trying to do
phishing attacks will often try to make the email they are using try to match a trusted individual
and or company and a less savvy tech people like the elderly might not see the that the email is
wrong. For the low income individuals, group phishing attacks often attack by saying in the
phishing email “ your bank has been hacked click here to recover your money” for someone
who is struggling financially this might lead them to act more impulsively and not check where
the email is actually from. Overall this article contributes to society by helping understand
phishing attacks better and providing the framework for better experiments to run in the future to
help gain an even better understanding of phishing attacks.