{"id":333,"date":"2025-09-29T02:21:15","date_gmt":"2025-09-29T02:21:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/juniorjohnson\/?page_id=333"},"modified":"2025-09-29T02:23:29","modified_gmt":"2025-09-29T02:23:29","slug":"article-review-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/juniorjohnson\/article-review-1\/","title":{"rendered":"Article Review 1"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Article Review #1: The Legal Response to the Intrusion into Digital Identity in Social Media<\/h1>\n\n\n\n<p>Junior (Preston) K. Johnson<br>9\/28\/2025<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>In \u201cThe Legal Response to the Intrusion into Digital Identity in Social Media,\u201d Mar\u00eda Gonz\u00e1lez\u2011Garc\u00eda Vinuela examines how law currently addresses violations of digital identity on social media platforms. The article is published in International Journal of Cybersecurity Intelligence &amp; Cybercrime, Volume 8, Issue 2, in 2025. Gonz\u00e1lez\u2011Garc\u00eda Vinuela analyses legal frameworks, challenges in enforcement, and proposals to better protect individuals from identity intrusion in the digital sphere.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Relation to Social Science Principles<\/h2>\n\n\n\n<p>This study connects strongly to social science principles, particularly in its focus on how laws, institutions, and social norms evolve in response to technology. It situates digital identity not merely as a technical issue, but as a social construct tied to individual self\u2011conception, trust, power relations, privacy rights, and social justice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Research Question, Hypotheses, Independent &amp; Dependent Variables<\/h2>\n\n\n\n<p>The guiding research question is: How effective are current legal responses to digital identity intrusion on social media, and what improvements are needed? The implied hypotheses are that existing frameworks are insufficient, enforcement is hampered by jurisdictional and definitional ambiguities, and victims\u2019 rights are unevenly protected. The independent variable is the legal\/regulatory framework, while the dependent variable is the degree of protection afforded.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Research Methods Used<\/h2>\n\n\n\n<p>The article uses qualitative research methods such as case law analysis, review of statutes and legal doctrine, and possibly comparative legal analysis across jurisdictions. The strength lies in interpretative, doctrinal scholarship.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Types of Data &amp; Analysis<\/h2>\n\n\n\n<p>Data consists of legal documents such as statutes, case rulings, regulatory codes, and legal commentary. The analysis is textual and interpretive, examining legal language, reasoning, gaps, and practical enforcement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Relation to Concepts from PowerPoint Presentations<\/h2>\n\n\n\n<p>Several course concepts tie in: principles like least privilege and privacy by design; criminological theories like routine activities theory in cybercrime; and Social Learning Theory\u2019s view that norms are learned in digital spaces.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Relation to Challenges, Concerns, and Contributions of Marginalized Groups<\/h2>\n\n\n\n<p>Marginalized groups are often more vulnerable to identity intrusion due to lack of resources or legal access. They may suffer reputational harm or harassment disproportionately and face barriers in seeking justice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Overall Contributions to Society<\/h2>\n\n\n\n<p>The article highlights legal gaps, informs policymakers, and suggests reforms that could strengthen protections for individuals\u2019 digital identities. It ultimately contributes to safeguarding dignity, privacy, and security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Gonz\u00e1lez\u2011Garc\u00eda Vinuela\u2019s article underscores that while legal tools exist to protect digital identity, deficiencies remain in clarity, enforcement, and cross\u2011jurisdictional effectiveness. The study stresses the need for updated laws and stronger mechanisms, especially for vulnerable populations. Such scholarship is essential for ensuring digital identity protection as social media becomes central to daily life.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Works Cited<\/h2>\n\n\n\n<p>Gonz\u00e1lez\u2011Garc\u00eda Vinuela, Mar\u00eda. \u201cThe Legal Response to the Intrusion into Digital Identity in Social Media.\u201d International Journal of Cybersecurity Intelligence &amp; Cybercrime, vol. 8, no. 2, 2025, doi:10.52306\/2578\u20113289.1221. https:\/\/vc.bridgew.edu\/ijcic\/vol8\/iss2\/3\/.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1: The Legal Response to the Intrusion into Digital Identity in Social Media Junior (Preston) K. Johnson9\/28\/2025 Introduction In \u201cThe Legal Response to the Intrusion into Digital Identity in Social Media,\u201d Mar\u00eda Gonz\u00e1lez\u2011Garc\u00eda Vinuela examines how law currently addresses violations of digital identity on social media platforms. The article is published in International&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/juniorjohnson\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":31436,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/juniorjohnson\/wp-json\/wp\/v2\/pages\/333"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/juniorjohnson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/juniorjohnson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/juniorjohnson\/wp-json\/wp\/v2\/users\/31436"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/juniorjohnson\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/juniorjohnson\/wp-json\/wp\/v2\/pages\/333\/revisions"}],"predecessor-version":[{"id":337,"href":"https:\/\/sites.wp.odu.edu\/juniorjohnson\/wp-json\/wp\/v2\/pages\/333\/revisions\/337"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/juniorjohnson\/wp-json\/wp\/v2\/media?parent=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}