Article Reviews

Michelle Zimmer
September 26, 2025

Article Review #01
Role of Personality Traits in Cybersecurity Behavior


How the topic relates to the principles of the social sciences:
The article regarding the research done explores the role of personality traits as they pertain to cybersecurity- the study of personality traits falls under the realm of social sciences. 

The study's research question, hypotheses, IV [Independent Variable] and DV [Dependent Variable]:
The question that this article addresses is how do the big five personality traits affect employees cybersecurity behavior? The hypotheses explored is the following: Each of the big five personality traits has a significant influence on cybersecurity behavior. The independent variable in this study would be personality traits, while the dependent variable would be cybersecurity behavior and awareness.

Types of research methods used:
This study used the quantitative research approach to examine the impact of big five personality traits on cybersecurity behavior, and attitudes towards compliance, with cyber security behavior as a mediator and perceived security risk as a moderator. (Ghaleb, Sattarov, 2025).

Types of data and analysis done:
For this study, 259 employees in various programs of diverse organizational departments served as the sample. The measurement tools were taken from empirically validated and commonly applied scales of earlier empirical studies. The Big 5 personality traits are as follows: Agreeableness, conscientiousness, extraversion, neuroticism, and openness. These big five personality traits were assessed using standardized 45 items. (Ghaleb, Sattarov, 2025).

In this study, cybersecurity behavior was measured using a 10 item scale focusing on both preventive and promotive security actions, while cybersecurity compliance attitudes were assessed with 4 items reflecting the respondents’ alignment and willingness to adhere to security protocols. (Ghaleb, Sattarov, 2025). Perceived security and privacy risk were measured using 3 items, with emphasis on the cognitive evaluation of potential security threats and their implications. (Ghaleb, Sattarov, 2025).

For data analysis, Structural Equation Modeling (SEM) was performed using STATA software, particularly due to it’s capabilities for dealing with intricate model structures, multiple paths of mediation and moderation, and latent constructs. (Ghaleb, Sattarov, 2025).

Analysis in this study was completed in two steps: using a confirmatory factor analysis first to check the validity and reliability of the measurement model. Next, the model was evaluated to test the direst, indirect, and interaction effects of the hypothesized relationships. This method of testing allowed for testing of several paths at once and gave a high level understanding of the structural linkages among personality traits, cybersecurity behavior, compliance attitudes, and perceived risk. (Ghaleb, Sattarov, 2025).

How concepts from the PowerPoint presentations relate to the article:
The concept from one of the PowerPoint presentations from the class that most closely relates to this article is the theory of personality and cyber offending, found in the module 5 PowerPoint. This slide of the PowerPoint is dedicated to the big five personality traits, which is the focus of the article’s study. (Ghaleb, Sattarov, 2025).

How the topic relates to the challenges, concerns and contributions of marginalized groups:
This article regarding the big five personality traits might relate to the challenges, concerns, and contributions of marginalized groups by shedding some light on particular risks that come with neuroticism. Neuroticism is a trait often found in individuals with extensive trauma, particularly stemming from childhood. Unfortunately, this early childhood trauma often manifests as mental disorders, which can be classified as disabilities if the disorder is severe enough. 
Perhaps this study could assist those with mental illness related disabilities in targeting their risk factors according to their personality traits in order to promote cyber safety. 

Overall contributions of the study to society:
This study contributes to the studies of society by delving further into the effects of personality on cybersecurity behaviors and awareness. The big five personality traits have already been studied relatively extensively in relation to other social areas, so this study has deepened our understanding even further by investigating personality traits in regards to cybersecurity.

In addition, this study provides insight on how we as a society can potentially further protect ourselves and our businesses from cyber threats through recognizing and understanding the role of personality traits on cyber risk, and what actions can be taken to reduce an individual’s risk according to their personality traits. 

Conclusion: 
	In conclusion, this study focused on the effect of the big five personality traits on both cybersecurity and threat awareness, and found that there was a measurable correlation between each of the five personality traits and cybersecurity behaviors. At times, the link between personality traits and cybersecurity behaviors is nuanced. The study followed a large sample of employees in various programs, tracking their personality traits and following their attitudes, beliefs, and behaviors regarding cybersecurity. 


Bibliography
Ghaleb, M. M. S., & Sattarov, A. (2025). Perceived Security Risks and Cybersecurity Compliance  Attitude: Role  of Personality  Traits and Cybersecurity Behavior. International Journal of Cyber Criminology, 19(1). https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/438/124 







Article Review #02: A Study of Cybercrimes Affecting Female Students of Kashmir University

Student Name: Michelle Zimmer
School of Cybersecurity, Old Dominion University
CYSE 201S: Cybersecurity and the Social Sciences
Instructor Name: Diwakar Yalpi
Date: November 03, 2025 

Introduction/BLUF
	This study aims to understand cybercrimes targeting female students of Kashmir university. The study displays a heightened risk for females to be exposed to cybercrime (notably including sexual harassment and abuse), as well as the real physical, social, and psychological consequences of cyber victimization. Emphasis is placed on the need for targeted interventions to increase cybersecurity awareness as well as specific interventions to reduce cybercrime targeting females.



Relation/Connection to Social Science Principles
	One of the scientific principles that can be observed in this article is the principle of relativism. This principle is displayed in the section of the article that reviews the reasons and consequences of cybercrimes. The article states that due to the widespread use of mobile technology, and the lack of awareness regarding cyber laws, have both worked to heighten women’s vulnerability in cyber space. Changes in use of mobile technology have led to an increase in cyber crime.

Research Question /Hypothesis/ Independent Variable/Dependent Variable
• Research Question: This study poses the question of the extent to which females in a University in Kashmir are both exposed to and effected by cybercrimes, as well as the contributing factors to increased cybercrime against females.
• Hypothesis: The hypothesis of this study is that female students at Kashmir University face significant psychological impacts due to cybercrimes, and that these impacts vary depending on the type of cybercrime as well as the level of social support available to the victims.
• Independent Variable: Types of cybercrimes experienced by female students.
• Dependent Variable: Psychological impact on female students.



Types of Research Methods used
	The study used both quantitative and qualitative data in its methods of research. Quantitative data was gathered through structured questionnaires to assess both the prevalence and impact of cybercrimes. In addition, qualitative data was collected via in-depth interviews and focus group discussions to explore personal experiences and emotional responses to cybercrime incidents.

Types of Data Analysis used
The study utilized both quantitative and qualitative data analysis techniques, applying statistical methods to questionnaire responses, and thematic analysis to interview and focus group data.

Connections to other Course Concepts
The study delves into the topic of cyber victimization amongst a particular subset of people, with some interest placed in the connection between the victim’s behaviors and the degree and frequency of cyber victimization. This relates to the concept of victim precipitation found in module 4 of the course, which expands on the idea of the ways victims may contribute to their victimization either wittingly or unwittingly. As always, it’s important to note that victim precipitation is not victim blaming, as the responsibility and blame for crimes always fall on the perpetrator rather than the victim.


Connections to the Concerns or contributions of Marginalized Groups
	The main focus of this article is on the cyber victimization of women, whom are frequently and systemically marginalized and made vulnerable to attack both on a societal and interpersonal level. 

Overall societal contributions of the study/Conclusion
The societal implications of this study might be greater awareness both of the increased
rate in which females are subject to sex-based cybercrime, as well as the ways that cybercrime targeted against women might be reduced. In addition, the study highlights the importance of societal support as a means of assisting victim’s path to healing.
 
Reference
Yaqoob, S. S., & Sheikh, A. H. (2025, October 6). Unmasking the silent threat: Understanding cybercrimes targeting female students of Kashmir University—a mixed-method analysis | journal of cybersecurity | oxford academic. Journal of Cybersecurity. 

Article Link: Unmasking the silent threat: understanding cybercrimes targeting female students of Kashmir university—a mixed-method analysis | Journal of Cybersecurity | Oxford Academic