{"id":287,"date":"2025-01-06T20:12:47","date_gmt":"2025-01-06T20:12:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jacobasare\/?page_id=287"},"modified":"2025-12-06T22:53:28","modified_gmt":"2025-12-06T22:53:28","slug":"article-reviews","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jacobasare\/article-reviews\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<p class=\"has-text-align-center\"><strong>Final ePortfolio<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Old Dominion University<\/p>\n\n\n\n<p class=\"has-text-align-center\">Jacob Asare: Cybersecurity Undergraduate<\/p>\n\n\n\n<p class=\"has-text-align-center\">CYSE 201S<\/p>\n\n\n\n<p class=\"has-text-align-center\">Professor: Diwakar Yalpi<\/p>\n\n\n\n<p class=\"has-text-align-center\">December 5, 2025<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-2 wp-block-group-is-layout-flex\">\n<p class=\"has-text-align-center\"><strong>Article Review #1<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Enhancing Cybersecurity through Organizational Behavior and Trust<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Old Dominion University<\/p>\n\n\n\n<p class=\"has-text-align-center\">Jacob Asare: Cybersecurity Undergraduate<\/p>\n\n\n\n<p class=\"has-text-align-center\">CYSE 201S<\/p>\n\n\n\n<p class=\"has-text-align-center\">Professor: Diwakar Yalpi<\/p>\n\n\n\n<p class=\"has-text-align-center\">September 27, 2025<\/p>\n<\/div>\n\n\n\n<p><strong>BLUF (Bottom Line Up Front)<\/strong><\/p>\n\n\n\n<p>Ghaleb and Pardaev (2025) examine how internal organizational and psychological factors like organizational culture, cybersecurity awareness, employee involvement, and trust in management, influence employee compliance with information security policies. Their findings highlight the importance of human behavior and social systems in building resilient cybersecurity frameworks, especially in production companies.<\/p>\n\n\n\n<p><strong>Connection to the Fundamentals of Social Science<\/strong><\/p>\n\n\n\n<p>The study reflects social science principles by exploring how employee behavior is shaped by organizational norms and leadership. It emphasizes the human aspect of cybersecurity, reinforcing the idea that secure practices result from social environments, not just technology. This aligns with the social sciences&#8217; focus on institutions, culture, and group behavior.<\/p>\n\n\n\n<p><strong>Research Question, Hypotheses, IVs, and DV<\/strong><\/p>\n\n\n\n<p>The central question is: What factors influence employees&#8217; cybersecurity compliance behavior? The study tested six hypotheses. Independent variables include organizational culture, awareness, involvement, and trust in leadership. The dependent variable is compliance behavior, with trust in management also acting as a mediating variable.<\/p>\n\n\n\n<p><strong>Research Methods Used<\/strong><\/p>\n\n\n\n<p>The authors used a quantitative approach which involved structured surveys distributed to 261 employees in production companies. Pre-tested scales ensured measurement reliability. This method reflects standard social science practices for studying behavior in organizational settings.<\/p>\n\n\n\n<p><strong>Data and Analysis<\/strong><\/p>\n\n\n\n<p>The researchers used Structural Equation Modeling (SEM) in STATA to analyze the data. All six hypotheses were supported, confirming the model&#8217;s validity. The results show that culture, awareness, and trust significantly enhance compliance behavior (Ghaleb &amp; Pardaev, 2025).<\/p>\n\n\n\n<p><strong>Relating to Course Ideas<\/strong><\/p>\n\n\n\n<p>This study demonstrates three key scientific principles applied to cybersecurity research. First, it exemplifies <strong>empiricism<\/strong>, which is the principle that knowledge must be based on systematic, observable evidence rather than speculation (Bhattacherjee, 2012). Ghaleb and Pardaev (2025) collected measurable data from 261 employees through structured surveys to observe actual compliance behaviors in real organizational settings. Second, the research reflects <strong>determinism<\/strong>, the principle that specific causes produce specific effects. The authors systematically tested how organizational culture, awareness, and trust in management causally influence compliance behavior, using Structural Equation Modeling to establish these cause-and-effect relationships. Third, the study applies <strong>parsimony<\/strong> by focusing on a limited set of key variables rather than attempting to explain compliance through an overly complex model. This simplified yet comprehensive approach makes the findings more practical and actionable for organizations.<\/p>\n\n\n\n<p>The study also aligns with several course modules, including Principles of Social Sciences and Cybersecurity by linking employee behavior to institutional culture and workplace norms, and Human Factors by showing how cybersecurity awareness and employee involvement reduce security risks by addressing human error. The authors employ an Interdisciplinary Social Science Lens by combining organizational behavior, psychology, and information systems, while their emphasis on trust in leadership as a mediator highlights how psychological principles influence employee responses to security protocols (Ghaleb &amp; Pardaev, 2025).<\/p>\n\n\n\n<p><strong>Marginalized Groups: Challenges and Contributions<\/strong><\/p>\n\n\n\n<p>While the Researchers did not directly addressed this, the study has implications for equity. Employees from marginalized groups may lack access to training or trust in management. Inclusive cultures can help close this gap and support overall compliance.<\/p>\n\n\n\n<p><strong>Societal Contributions<\/strong><\/p>\n\n\n\n<p>This study offers practical, human-centered strategies for improving cybersecurity. It contributes to safer workplaces by showing that awareness, trust, and culture are key to compliance, making it relevant for any organization aiming to strengthen internal security.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Ghaleb and Pardaev (2025) demonstrate that effective cybersecurity is as much about people as it is about technology. Their research provides a useful model for organizations to strengthen compliance through culture, awareness, and leadership trust.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Ghaleb, M. M. S., &amp; Pardaev, J. (2025). Controlling cyber crime through information security compliance behavior: Role of cybersecurity awareness, organizational culture and trust in management. International Journal of Cyber Criminology, 19(1), 1\u201315. <a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/437\/123\">https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/437\/123<\/a> <\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-3 wp-block-group-is-layout-flex\">\n<p class=\"has-text-align-center\">Article Review #2<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Exploring the Psychological Profile of Cybercriminals: A Comprehensive Review for Improved Cybercrime Prevention<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Old Dominion University<\/p>\n\n\n\n<p class=\"has-text-align-center\">Jacob Asare: Cybersecurity Undergraduate<\/p>\n\n\n\n<p class=\"has-text-align-center\">CYSE 201S<\/p>\n\n\n\n<p class=\"has-text-align-center\">Professor: Diwakar Yalpi<\/p>\n\n\n\n<p class=\"has-text-align-center\">November 3, 2025<\/p>\n<\/div>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>This paper reviews Exploring the Psychological Profile of Cybercriminals: A Comprehensive Review for Improved Cybercrime Prevention by Trinh, Dinh, and Tran (2025), published in the International Journal of Cyber Criminology. The authors conduct a systematic review examining psychological traits of cybercriminals and their implications for prevention and cybersecurity policy. The article bridges psychology, criminology, and information security, offering an interdisciplinary approach to understanding digital deviance and advancing cybercrime prevention strategies.<\/p>\n\n\n\n<p><strong>BLUF (Bottom Line Up Front)<\/strong><\/p>\n\n\n\n<p>Trinh et al. (2025) synthesize findings from 45 studies, screened from 1,200, under PRISMA guidelines. They identify narcissism, impulsivity, and technical proficiency as common traits among cyber offenders. The authors argue that current legal frameworks overlook psychological motivations behind cyber offenses and call for integrating psychological insights into cybersecurity policies. They conclude that addressing both human and technical factors is essential to achieving digital safety.<\/p>\n\n\n\n<p><strong>Relation to Principles of the Social Sciences<\/strong><\/p>\n\n\n\n<p>This study demonstrates three key scientific principles applied to cybercrime research. First, it exemplifies <strong>skepticism<\/strong>, the principle of critically questioning claims and requiring rigorous evidence before accepting conclusions (Bhattacherjee, 2012). Trinh et al. (2025) screened 1,200 studies but accepted only 45 that met strict inclusion criteria, demonstrating systematic doubt and careful evaluation rather than accepting all available research. Second, the research reflects <strong>objectivity<\/strong> by using PRISMA guidelines to minimize researcher bias in study selection and analysis. This standardized protocol ensures that personal preferences or preconceptions do not influence which studies are included or how findings are interpreted. Third, the study applies <strong>generalizability<\/strong> by synthesizing findings across multiple independent studies, diverse cultural contexts, and various cybercrime types such as hacking, fraud, and identity theft. This approach allows the authors to make broader claims about cybercriminal psychology that extend beyond any single study or population, strengthening the applicability of their findings to real-world prevention strategies.<\/p>\n\n\n\n<p><strong>Research Question, Hypotheses, and Variables<\/strong><\/p>\n\n\n\n<p>The key research question asks: What psychological traits characterize cybercriminals, and how can these insights improve prevention strategies?<\/p>\n\n\n\n<ul>\n<li>Hypothesis: Cybercriminals show unique traits, especially narcissism and impulsivity, influencing their offenses.<\/li>\n\n\n\n<li>IVs: Personality traits such as narcissism, impulsivity, and cognitive empathy.<\/li>\n\n\n\n<li>DV: Engagement in and type of cybercriminal behavior. This framework connects personality dimensions to behavioral outcomes.<\/li>\n<\/ul>\n\n\n\n<p><strong>Research Methods, Data, and Analysis<\/strong><\/p>\n\n\n\n<p>Using a systematic review methodology consistent with PRISMA, 45 of 1,200 screened studies met inclusion criteria. The authors employed rigorous screening procedures including database searches across multiple platforms (PubMed, PsycINFO, Scopus), established clear inclusion\/exclusion criteria, and conducted quality assessments of selected studies. Data were synthesized qualitatively using thematic analysis to identify recurring psychological patterns across different cybercrime types (hacking, fraud, identity theft), demographic groups (age, gender), and cultural contexts. The triangulation of findings from multiple empirical sources strengthened the reliability and validity of their conclusions. The systematic approach allowed the researchers to identify consistent patterns such as elevated narcissism scores and reduced cognitive empathy among offenders, while also noting variations based on offense type and cultural background (Trinh et al., 2025).<\/p>\n\n\n\n<p><strong>Connection to Course Concepts<\/strong><\/p>\n\n\n\n<p>This study connects to four key course concepts. First, it directly applies <strong>Psychology Research, Human Factors, and Cybersecurity<\/strong> principles by using psychological experiments and empirical studies to address cybersecurity research questions about offender motivation and behavior. The authors explain how psychological principles, specifically personality traits and cognitive empathy deficits can be used to address cybercrime and help develop prevention strategies targeting offender psychology (Trinh et al., 2025). Second, the research demonstrates <strong>Cybersecurity and the Social Dimensions of Data Science<\/strong> by examining how cybercrime affects various parts of the social system including families (identity theft victims), peer networks (social engineering), schools and colleges (student hackers), and nations (state-sponsored cyber-attacks). Third, the study employs an <strong>interdisciplinary social science lens<\/strong> by integrating psychology, criminology, law, and policy to understand cybercriminal behavior comprehensively. Fourth, it emphasizes <strong>human factors<\/strong> as central to cyber threats, showing that technical security measures alone are insufficient without understanding the psychological motivations driving cybercriminal behavior (Trinh et al., 2025).<\/p>\n\n\n\n<p><strong>Marginalized Groups: Challenges and Concerns<\/strong><\/p>\n\n\n\n<p>Although not the main focus, the study suggests that individuals with limited digital literacy face greater victimization risks, such as identity theft and scams. Addressing these disparities requires equitable cybersecurity education and protection efforts.<\/p>\n\n\n\n<p><strong>Critical Evaluation<\/strong><\/p>\n\n\n\n<p>A strength of the study is its interdisciplinary scope and integration of psychology with policy implications. The systematic design enhances validity through broad inclusion. However, the absence of quantitative meta-analysis and limited cultural discussion suggest areas for further study.<\/p>\n\n\n\n<p><strong>Societal Contributions<\/strong><\/p>\n\n\n\n<p>The research promotes psychologically informed cybersecurity frameworks and improved offender profiling. It emphasizes global cooperation among policymakers and professionals while supporting prevention programs that address behavioral motivations to reduce cybercrime.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Trinh et al. (2025) demonstrate that understanding offender psychology is vital for prevention. By integrating social science and cybersecurity, the study provides a human-centered framework for safer digital environments.<\/p>\n\n\n\n<p><strong>Reference<\/strong><\/p>\n\n\n\n<p>Trinh, D. T., Dinh, T. C. H., &amp; Tran, T. N. K. (2025). Exploring the psychological profile of cybercriminals: A comprehensive review for improved cybercrime prevention. International Journal of Cyber Criminology, 19(1), 1\u201315. <a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/452\/133\">https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/452\/133<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Final ePortfolio Old Dominion University Jacob Asare: Cybersecurity Undergraduate CYSE 201S Professor: Diwakar Yalpi December 5, 2025 Article Review #1 Enhancing Cybersecurity through Organizational Behavior and Trust Old Dominion University Jacob Asare: Cybersecurity Undergraduate CYSE 201S Professor: Diwakar Yalpi September 27, 2025 BLUF (Bottom Line Up Front) Ghaleb and Pardaev (2025) examine how internal organizational&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jacobasare\/article-reviews\/\">Read More<\/a><\/div>\n","protected":false},"author":29145,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jacobasare\/wp-json\/wp\/v2\/pages\/287"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jacobasare\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jacobasare\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobasare\/wp-json\/wp\/v2\/users\/29145"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jacobasare\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jacobasare\/wp-json\/wp\/v2\/pages\/287\/revisions"}],"predecessor-version":[{"id":392,"href":"https:\/\/sites.wp.odu.edu\/jacobasare\/wp-json\/wp\/v2\/pages\/287\/revisions\/392"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jacobasare\/wp-json\/wp\/v2\/media?parent=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}