{"id":300,"date":"2024-12-09T03:21:12","date_gmt":"2024-12-09T03:21:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/?page_id=300"},"modified":"2025-05-03T01:15:02","modified_gmt":"2025-05-03T01:15:02","slug":"article-review","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/article-review\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">Article Review 1<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><strong>Article Review: Cybersecurity and AI<\/strong><br><strong>Factors on Incident Reporting<\/strong><br>Jarrell Jackson<br>October 2, 2024<br><strong>Introduction<\/strong><br>This review examines the article Impact of Cybersecurity and AI&#8217;s Related Factors on<br>Incident Reporting Suspicious Behaviour (Muthuswamy &amp; Esakki, 2024), exploring its<br>relevance to the principles of social science and its contribution to understanding the<br>relationship between cybersecurity, AI, and employee behavior.<br><strong>Principles of Social Science<\/strong><br>The study demonstrates several social science principles. First, Empiricism is<br>reflected in the collection of data from employees regarding incident reporting and stress<br>levels, grounding the research in observable behavior. Relativism is evident in recognizing<br>that the impact of AI on stress and reporting behavior varies across different organizations.<br>Skepticism is applied in questioning assumptions about the efficacy of AI and cybersecurity<br>training without empirical evidence. Additionally, the study adheres to Ethical Neutrality,<br>objectively evaluating the benefits and risks of AI without promoting any specific ethical<br>stance.<br><strong>Research Questions and Hypotheses<\/strong><br>The study aimed to understand how incident reporting of suspicious behavior and<br>cybersecurity training influences stress and readiness for AI adoption. Eight hypotheses<br>were formulated, testing relationships between variables like Cyber Security Incident<br>Management (CSIM), Cyber Security Awareness (CSA), and perceived AI threats (PTA). The<br>key hypotheses explored whether incident reporting reduces employee stress and whether<br>cybersecurity training enhances reporting behavior.<br><strong>Research Methods and Data<\/strong><br>The study employed a cross-sectional survey method, collecting self-reported data<br>from employees in various organizations. This method allows for snapshot insights into<br>attitudes and behaviors. Data was analyzed using statistical methods to examine<br>correlations between stress levels, incident reporting, and AI adoption intentions.<br><strong>Data Analysis<\/strong><br>The article relies on quantitative analysis, using hypothesis testing to evaluate<br>relationships between variables. This approach aligns with the principle of Objectivity, as<br>the authors use measurable data to support their conclusions, avoiding subjective bias.<br><strong>Concepts from Class<\/strong><br>The study&#8217;s focus on AI integration connects to Determinism, as it examines how<br>certain factors like CSA and CSIM shape employee behavior and stress. Furthermore, the<br>research emphasizes Parsimony, aiming to explain complex behaviors with<br>straightforward relationships between cybersecurity variables.<br>Marginalized Groups and Societal Contributions<br>The article touches on concerns for marginalized groups, particularly regarding<br>employment displacement from AI. It suggests organizations should address these<br>concerns with ethical guidelines and training. The study contributes to society by offering<br>strategies to reduce employee stress and enhance cybersecurity, promoting safer AI<br>integration.<br><strong>Conclusion<\/strong><br>This research underscores the importance of cybersecurity awareness and<br>structured incident reporting to mitigate stress and enhance AI readiness. It reflects core<br>social science principles like empiricism and objectivity, providing both theoretical insights<br>and practical applications.<br><strong>References<\/strong><br>Muthuswamy, V. V., &amp; Esakki, S. (2024, January). International Journal of Cyber<br>CriminologyVol 18 Issue 1 January \u2013June 202483\u00a9 2024 International Journal of<br>Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons<br>Attribution-NonCommercial-ShareAlike4.0 International (CC BY-NC-SA 4.0)<br>LicenseImpact of Cybersecurity and AI\u2019s Related Factors on Incident Reporting<br>Suspicious Behaviour and Employees Stress: Moderating Role of Cybersecurity<br>Training. cybercrimejournal.<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/ar<br>ticle\/view\/330\/99.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Article Review 2<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><strong>Article Review #2: Understanding AI in Cybercrime<\/strong><br>Name: Ja\u2019rrell Jackson<br>Date: November 17, 2024<br><strong>Introduction<\/strong><br>The article I choose for the second review is \u201cUnderstanding the Use of Artificial<br>Intelligence in Cybercrime\u201d by Choi, Dearden, and Parti (2024). This article talks about<br>how people are using AI to commit crimes, like creating fake videos and tricking others<br>online. Let\u2019s see how this connects to social science, research methods, and how it might<br>affect society.<br><strong>Principles of the Social Sciences<\/strong><br>This article connects to social science because it looks at how people and technology<br>interact. For example, it talks about how AI tools are being used for both good and bad,<br>which shows determinism things happen for a reason. It also makes you think critically<br>about technology, which ties into skepticism. The authors look at why certain crimes<br>happen and how technology plays a role in them.<br><strong>Research Questions and Methods<\/strong><br>The researchers asked things like, &#8216;How is AI being used for cybercrimes?&#8217; and &#8216;What can<br>we do to stop it?&#8217; To figure this out, they used different methods. For example, one study<br>used real-world case studies from healthcare to see how hackers target certain systems.<br>Another study used interviews and data to look at AI tools like large language models<br>(LLMs) and how they could be misused.<br><strong>Data and Analysis<\/strong><br>They collected information from a mix of case studies, interviews, and technical tools.<br>They looked at patterns in cybercrime and used frameworks like the VIVA framework to<br>figure out why some targets are more appealing to criminals. They also tested ideas like<br>the Cyber-RAT model to see how people\u2019s online habits might make them more<br>vulnerable.<br><strong>Connections to Course Concepts<\/strong><br>The article I choose connects well with what we are talking about in class, especially<br>when it comes to ethical neutrality. The researchers didn\u2019t try to say AI is all good or all<br>bad they just focused on how it\u2019s being used. It also connects to the idea of using<br>different fields, like technology, psychology, and sociology, to solve problems.<br><strong>Marginalized Groups<\/strong><br>While I was reading the article I was thinking about which marginalized groups might be<br>affected by this. I came up with the conclusion that, smaller companies or communities<br>that don\u2019t have the money for strong cybersecurity could be easier targets. This really<br>shows how important it is to make sure everyone has access to necessary resources to be<br>able to stay safe online.<br><strong>Societal Contributions<\/strong><br>One of the big takeaways from this is that this research can help people understand the<br>risks of AI and how to they can be able to protect against them. This is just about<br>stopping crime but it\u2019s also about teaching people and creating the very much needed<br>rules to keep people safe. The article gives ideas for making policies and educating<br>people to be more aware of the dangers.<br><strong>Conclusion<\/strong><br>So, in the end, this article shows how AI is being used in ways we might not have<br>expected, both good and bad. It also gives some solid ideas on how to handle these<br>issues. For me, it was a good reminder that we need to always keep learning and<br>changing how we do things to stay ahead of these new challenges that come forth with<br>the rise of technology.<br><strong>References<\/strong><br>Choi, S., Dearden, T., &amp; Parti, K. (2024). Understanding the Use of Artificial Intelligence<br>in Cybercrime. \u201cInternational Journal of Cybersecurity Intelligence &amp; Cybercrime, 7\u201d<br>(2), 1-3. https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/1<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review 1 Article Review: Cybersecurity and AIFactors on Incident ReportingJarrell JacksonOctober 2, 2024IntroductionThis review examines the article Impact of Cybersecurity and AI&#8217;s Related Factors onIncident Reporting Suspicious Behaviour (Muthuswamy &amp; Esakki, 2024), exploring itsrelevance to the principles of social science and its contribution to understanding therelationship between cybersecurity, AI, and employee behavior.Principles of Social&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jarrelljackson\/article-review\/\">Read More<\/a><\/div>\n","protected":false},"author":27482,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/pages\/300"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/users\/27482"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/pages\/300\/revisions"}],"predecessor-version":[{"id":341,"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/pages\/300\/revisions\/341"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jarrelljackson\/wp-json\/wp\/v2\/media?parent=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}