{"id":123,"date":"2024-12-11T02:24:36","date_gmt":"2024-12-11T02:24:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2024-12-11T03:11:41","modified_gmt":"2024-12-11T03:11:41","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/epjkind\/cyse-301\/","title":{"rendered":"Article Review #1 and #2"},"content":{"rendered":"\n<p>Article Review 1 <\/p>\n\n\n\n<p class=\"has-text-align-left\">Jace kindred<br>October 2, 2024<br>Christos A Makridis, Do data breaches damage reputation? Evidence from 45 companies<br>between 2002 and 2018, Journal of Cybersecurity, Volume 7, Issue 1, 2021, tyab021,<br>https:\/\/doi.org\/10.1093\/cybsec\/tyab021<br>Article I choose<\/p>\n\n\n\n<p class=\"has-text-align-center\">Article 1# the damage of Data breaches<br>In this article the author questions what type of damage do data breaches do to a company<br>not just on a financial level but on a reputation level. Depending on the size of your<br>company the backlash you might receive from a data breach might be minimal to even<br>beneficial depending on how small your company is. The media attention might bring more<br>eyes to your company that otherwise would not even know your company at all. The way<br>data was collected was \u201cdata from the CoreBrand Index with all publicly traded companies<br>contained in Compustat from the Center for Research in Security Prices, which measures<br>financial and other firm characteristics\u201d(Makridis 2021). Tables were used to show the data<br>of these companies before and after data breaches happened to them. This article and what<br>is shows relates to what we have learned in class about data breaches, and the impact they<br>might have on a person or even the company it self like when we talked about the<br>Crowdstrike data breach and the companies it affected not only financially but also the<br>reputation of these companies the average person will think if a company allowed a data<br>breach like this to happen once they might let it happen again. This article only really<br>concerns one marginalized group and that is small businesses. The article talks about how<br>data breaches affect small businesses way more than big businesses because a small<br>company or business has not built up that trust or the capital to go through a data breach<br>like a bigger business has. Small businesses can also benefit from data breaches if<br>handling the extra media attention might drive more eyes onto the business. This article<br>relates to social science by going through the scientific method to come up with these<br>conclusions a hypothesis was made then data was collected to see whether the data would<br>prove or disprove the hypothesis. In conclusion this article contributes to society by<br>answering the question on how impactful data breaches are to companies by showing that<br>\u201conly the largest and most salient data breaches are associated with declines in intangible<br>capital, whereas others are associated with statistically insignificant, but economically<br>meaningful, increases in intangible capital.\u201d<\/p>\n\n\n\n<p>Article review 2 <\/p>\n\n\n\n<p>Jace kindred<br>11\/17\/2024<br>Teodor Sommestad, Henrik Karlz\u00e9n, The unpredictability of phishing susceptibility: results<br>from a repeated measures experiment, Journal of Cybersecurity, Volume 10, Issue 1, 2024,<br>tyae021, https:\/\/doi.org\/10.1093\/cybsec\/tyae021<br><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Article review #2 Phishing attacks susceptibility<br><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Review Of Article<br><\/strong>In the article researchers wanted to understand what made someone more likely to fall victim to<br>phishing scam emails. The researchers proposed three hypotheses on what might influence the<br>likelihood of someone falling victim to this scam. One is what is represented in the email. The<br>second one is the number of changes to the email to personalize it to the recipient and number<br>of influence techniques added to the email. The research methods used to test the hypothesis<br>were simulated phishing emails sent to participants (Sommestad 2024). There were 102<br>participants. The data provided by the simulated emails supported the first hypothesis, the<br>second hypothesis was half supported and the third hypothesis was not supported by the results<br>of the data from the datasets provided by the simulated phishing emails. Some questions<br>regarding the experiment were that there was no bias and that results were hindered by the<br>small sample size.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>How It Relates To Class<br><\/strong>The topic of phishing attacks relates to the social sciences; one of the sciences it relates to is<br>the science of psychology. Phishing attacks most of the time use a sense of fear by saying<br>things like \u201cyour account will be deactivated if you don&#8217;t click here\u201d which is a psychological ploy<br>to invoke a quick response. It also relates to the Sciences Sociology when phishing attacks try<br>to impersonate people or companies you might trust by trying to pose as them. The concept of<br>victimization theory that we went over in class from the powerpoint relates to the article because<br>in the article the researchers hope to find out why some people are more susceptible to phishing<br>attacks then other and that is what victimization theory is all about why some people are more<br>likely to have a crime committed against them then others.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Conclusion<\/strong><br>Phishing attacks discussed in the article attacks Marginalized groups like the elderly and low<br>income individuals. For the elderly phishing attacks prey on them because they are less tech<br>savvy and don&#8217;t also check the details of who might being sending the email people trying to do<br>phishing attacks will often try to make the email they are using try to match a trusted individual<br>and or company and a less savvy tech people like the elderly might not see the that the email is<br>wrong. For the low income individuals, group phishing attacks often attack by saying in the<br>phishing email \u201c your bank has been hacked click here to recover your money\u201d for someone<br>who is struggling financially this might lead them to act more impulsively and not check where<br>the email is actually from. Overall this article contributes to society by helping understand<br>phishing attacks better and providing the framework for better experiments to run in the future to<br>help gain an even better understanding of phishing attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review 1 Jace kindredOctober 2, 2024Christos A Makridis, Do data breaches damage reputation? Evidence from 45 companiesbetween 2002 and 2018, Journal of Cybersecurity, Volume 7, Issue 1, 2021, tyab021,https:\/\/doi.org\/10.1093\/cybsec\/tyab021Article I choose Article 1# the damage of Data breachesIn this article the author questions what type of damage do data breaches do to a companynot&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/epjkind\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":30195,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/users\/30195"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/pages\/123\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}