{"id":364,"date":"2025-04-28T02:32:28","date_gmt":"2025-04-28T02:32:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jlowm004\/?page_id=364"},"modified":"2025-04-28T02:46:31","modified_gmt":"2025-04-28T02:46:31","slug":"article-review","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jlowm004\/article-review\/","title":{"rendered":"Article Review"},"content":{"rendered":"\n<p><strong>Article 1<\/strong><\/p>\n\n\n\n<p>Jay Michael Lowmack<br>February 16, 2025<br>Understanding Simulations in Economics for Cybersecurity Decision-making<br>This paper offers a comprehensive understanding of the framework that utilizes<br>simulations in economic cybersecurity decision-making making, which emphasizes their<br>potential to manage risk and uncertainty while addressing the common failures that can<br>arise due to concepts like bookkeeping and abstractions<br>Relation to Social Science and Concepts<br>It connects to these three Social Science concepts: behavioral decision theory,<br>economic and social impact, and Technological change and society. Each of these<br>concepts relates in many ways. For example, technological change and society relate to<br>how up-to-date the systems are, what technological upgrades and changes were made<br>to them, and the influences of policies. This is even mentioned in the following quote<br>\u201cCybersecurity is crucial for protecting tangible and intangible assets in modern society.<br>However, achieving it is challenging, e.g. because of rapid technological development<br>[1], cognitive limitations [2], lack of a skilled workforce [3], a plethora of stakeholders [4],<br>and for many other reason\u2026 This hampers the ability of organizations to make rational,<br>evidence-based decisions (see, e.g. [18\u201321]) to safeguard their digital ecosystems,<br>even though we do not claim that all stakeholders need detailed quantitative data to<br>make evidence-based policies.&#8221;( Kianpour &amp; Franke, 2025).<br>Research Questions, Methods, and Simulation Data<br>Analysis:<br>Research questions:<br>\u2022 Focusing on how the simulations can improve decision-making in<br>economics involving cybersecurity can help identify questions and<br>hypotheses. These hypotheses must explore the effectiveness of the<br>simulation to ensure it is worth using and to enhance its abilities about<br>probabilities and consequences, particularly under the risk of uncertainty.<br>Data and Analysis:<br>\u2022 Simulation data is used to analyze the information found to explore<br>potential outcomes in cybersecurity for decision-making. This is done by<br>analyzing simulation models to understand how these models predict the<br>outcomes and complex relationships between threats, vulnerabilities, and<br>decision outcomes.<br>Research methods used:<\/p>\n\n\n\n<ul>\n<li>Simulation modeling: Replicating real-world cybersecurity decision-making<br>scenarios helps analyze complex systems and evaluate potential<br>outcomes under different conditions, risks, and uncertainty.<\/li>\n\n\n\n<li>Inductive Analysis: This is when data generated from predefined models<br>are examined to discover new insights rather than conforming theories<br>and hypotheses that were made.<br>Being able to distinguish two different types of knowledge:<br>\u2022 To understand decision-making frameworks, distinctions between two<br>types of knowledge are critical. This is shown through the following quote<br>\u201cDecision theory traditionally distinguishes between two kinds of<br>knowledge needed for decision-making: knowledge of the<br>possible consequences in different scenarios and knowledge of<br>the probabilities of those scenarios. Despite its apparent simplicity, this<br>framework, depicted in Fig. 1 enables rich and subtle analysis of different<br>decision situations\u201d (Kianpour &amp; Franke, 2025).<br>Impact and Contributions to Society:<br>Simulations in economic decision-making for cybersecurity can potentially<br>significantly impact the future. It can offer practical solutions to manage risks and<br>uncertainty. They can contribute to the broader societal understanding of cybersecurity,<br>helping decision-makers assess and improve their strategies for protecting critical<br>systems in this complex field.<br>Conclusion<br>In conclusion, the importance of simulation-based frameworks in the economics<br>of cybersecurity decision-making is shown in many ways. These ways are social<br>sciences and their concepts, questions, methods, data, and societal impact. This is<br>shown by how simulation models can help us understand how these models predict<br>threats, vulnerabilities, and decision outcomes.<\/li>\n<\/ul>\n\n\n\n<p>Work Cited<br>Kianpour, M., &amp; Franke, U. (2025). The use of simulations in economic cybersecurity decision-making.<br>Journal of Cybersecurity, 11(1). https:\/\/doi.org\/10.1093\/cybsec\/tyaf003<\/p>\n\n\n\n<p><strong>Article 2<\/strong><\/p>\n\n\n\n<p>Jay Michael Lowmack<br>April 6, 2025<br>The connection between AI and cybercrimes, explored through the examination of risks, impacts, and<br>potential solutions<br>This paper provides an understanding of the connection between AI and cybercrime by<br>highlighting the risks and societal impacts of Crimes driven by AI, such as deepfakes and social<br>engineering attacks., It also emphasizes the urgent need for preventive measures, policies, and<br>frameworks that can protect vulnerable individuals from these attacks or threats.<br>AI\u2019s role in the world of cybercrime and the urgent<br>need for protective measures:<br>\u2022 Evolving Cybercrime Strategies:<br>o Study: \u201cIntegrated Model of Cybercrime Dynamics (IMCD) designed to analyze the<br>complex interactions between individual traits, online behaviors, environmental<br>influences, and the re- sulting cybercrime activities, both in terms of offending and<br>victimization (Smith, 2024). The study details the model\u2019s conceptual foundations for<br>ongoing research in cybercrime and highlights the model\u2019s flexibility that supports<br>diverse applications, including policy, education, and intervention strategies.\u201d (Choi,<br>Deaden, &amp; Parti, 2024).<br>o Explanation: The Integrated Model of Cybercrime Dynamics (IMCD) illustrates how<br>these online behaviors and environmental factors collectively contribute to the<br>development of cybercrime. Through a flexible framework for research and application<br>in policies, education, and intervention, it can inform the development of protective<br>measures.<br>\u2022 Proactive measures that must be used:<br>o Protective measures that can be used to prevent cybercrimes are awareness, training,<br>implementation of AI-driven security solutions, and polices. These measures can help<br>people recognize and respond to the occurrence of one of these attacks. Also, this can<br>lead to less manipulation of AI.<br>The impact on those in society as well as those in<br>marginalized groups:<br>\u2022 The rising vulnerability for those in marginalized groups:<\/p>\n\n\n\n<p>o Marginalized groups like the elderly and low-income individuals are more susceptible to<br>cybercrime due to their limited information and resources to protect themselves from<br>these threats.<br>\u2022 The manipulation that occurs through social engineering and its impact on the public\u2019s trust:<br>o Through social engineering, cybercriminals can exploit people&#8217;s trust by leading them<br>down a path that reduces their confidence in various apps and devices.<br>The primary purpose of this article:<br>\u2022 The purpose of this article is to show as well as explore the connections between AI and<br>cybercrime by focusing on the technologies that are exploited by these cybercriminals and what<br>the necessary measures are to prevent them.<br>Conclusion:<br>In conclusion, AI has become a tool in cybercrime, making the digital space increasingly more dangerous<br>over time. Therefore, leading to studies and proactive protection plans to keep vulnerable groups like<br>the elderly and low-income individuals safe from these threats. As time passes, more research and<br>awareness help foster a more vigorous defense against these ever-evolving threats.<br>Work Cited<br>Choi, S., Dearden, T., &amp; Parti, K. (2024). Understanding the use of artificial intelligence in cybercrime.<br>International Journal of Cybersecurity Intelligence &amp; Cybercrime, 7(2). https:\/\/doi.org\/10.52306\/2578-<br>3289.1185. Accessed April 6, 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article 1 Jay Michael LowmackFebruary 16, 2025Understanding Simulations in Economics for Cybersecurity Decision-makingThis paper offers a comprehensive understanding of the framework that utilizessimulations in economic cybersecurity decision-making making, which emphasizes theirpotential to manage risk and uncertainty while addressing the common failures that canarise due to concepts like bookkeeping and abstractionsRelation to Social Science and ConceptsIt&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jlowm004\/article-review\/\">Read More<\/a><\/div>\n","protected":false},"author":29866,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/pages\/364"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/users\/29866"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/comments?post=364"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/pages\/364\/revisions"}],"predecessor-version":[{"id":375,"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/pages\/364\/revisions\/375"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jlowm004\/wp-json\/wp\/v2\/media?parent=364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}