Article Review 1

The article that I have chosen is from the International Journal of Cybersecurity Intelligence and Cybercrime. The article is named, “The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence”.

In summary, this article goes over why human behavior can impact us as humans from further developing our skills or techniques in cybercrime. It finally goes over the how. By taking a holistic approach, how can we create more strategies with advancing technologies that are comprehensive enough to build on the knowledge we already have about human behavior. The question throughout the cybersecurity world and in this article is just that. How can human behavior affect us getting targeted and how can we supply everyone with a perfect solution that they would listen to?

       When relating this topic to our social sciences it hits every spot. The study articles done by Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, and Elizabeth Englander was named, “fear of cybercrime in social media”. After reading this we understand that with the emerging technologies, the effect on humans would mean that almost everywhere we look we would be submerged or connected to them. Whether its new vehicles, products around the house, or our devices we carry every day. Though we do have new innovated ways for humans to stay protected from these emerging technologies, the human element plays too big of a role. Humans’ failure in taking the steps to better their security is the reason many humans fall victim to a cyber-attack. Also, depending on what you put out of yourself or information about yourself, this can impact how you will be cyber-victimized.

The theory in this article is that all things must progress at the same time. If technology is ahead than humans will be struggling to analysis these advanced systems. If humans are ahead, then there will be a pause of things so they can get up to date on technology. Though it is said that if all things are progressing the same then we might be able to mitigate the cyber risks we face in society. Though this is all what this article is, theories or considerations. In the first two research they used predictors and perception analysis. Now, there is never an easy way to do true research when it comes to humans committing crimes or doing things for a certain reason in the cyber world. I think that a lot of the time these researchers must do multiple studies to take their next step in research. Do these studies does help though, we can sort of see peoples’ intentions but never what led up to what they did. Finally, all this research and studies have opened a huge exploratory foundation for generations to come and build off.            

  A good amount of what we hear about in class can be traced to this article. Topics likes determinism, importance of human factors, always being proactive but being reactive when needed, and diversifying the community to hear others point of view. In our first study with Seong-Sik Lee’s research, determinism is present within the research. “Sociodemographic factors, opportunity factors, and social context factors can possibly influence or be reason someone commits verbal abuse, sexual harassment, privacy infringement, hacking/malware, and property damage”. The key for humans is to be able to detect when they are getting attacked in some way and report it, so no crazy damage is done. Though for humans, to be able to do this they must go through proven prevention training and build their awareness skills. It is said that doing so will improve human’s vulnerabilities to cybercrime. Also, it was suggested in the article that an alert system that is internet-based should be added to places like an organization or government with a lot of important data. This would allow for these places to rapidly get rid of what ever is attacking them, continue to work, and not account for any loss information. Lastly, it is said that they are not only doing this research to solve something. Instead, they are simply trying to “open a door”, to others. Enhancing and building off other people’s knowledge is the gateway to building strategies in the cyber world. Especially those that look different than most of the cyber community. Not only researchers but everyone in the cybersecurity space is looking for more opinions.

Leave a Reply

Your email address will not be published. Required fields are marked *