Article reviews

Article Review #1
By. Khaleiq Sutton

Cyber Criminology

Intro to Cyber Criminology

Cyber criminology can be described and expressed in diverse ways focusing on how
technology can influence criminal behavior that plays into it. A way it can be described is
from social science, as the principles of social science can help understand the person’s
motive behind cybercrime before it happens. Including their personal traits, the individual,
and their influence to be able to get why the person is doing what they are doing from past
life experiences. It can be pretentious as to what is the person’s motive and general benefit
from committing cybercrime. With many motives it can be concluded that cyberattacks
are as difficult to understand as to why and what the person gains from doing it and the
damage it can cause from the attack.

Information about Cyberattacks

For individual reasons and concerns there has been research to notify as to handle and
control the numerous cyberattacks that happen. From knowledge from different articles, it
can be shown that cybercrime is something that is a major issue that can be fixed and
resolved but it is still a major issue that many people and companies face today. With a
wide spread of cyberattacks people have demanded heightened policies for protection
from preventing cyberattacks. From trying to maintain a clean policy to prevent another
cyberattack the demands peaked from the aftermath of the 2021 Colonial Pipeline and
SolarWinds cyberattack. With lacking cybersecurity information, it caused a setback for
many enterprises not only in the U.S. but also around the world. As for example, in 2020, 40
U.S. states and territories introduced more than 280 cybersecurity related bills and
resolutions. As something of such has happened similar in Europe and Israel.

Conclusion

Even with all the outbreaks that happen technology is still evolving to prevent future
outbreaks. As cybercrime is an everlasting challenge with today’s methods and other
motives it makes it less imperative for cybercriminals to hack people, organizations, and
politics. With new systems being in place and other methods to fight back the cyber-
attacks that happen today it helps individuals acknowledge that their confidential
information is secure from users online.

In-Text Citations

Fauzi, M. A., Yeng, P., Yang, B., & Rachmayani, D. (2021). Examining the Link Between
Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia. In Proceedings of

Article Review #2 By. Khaleiq Sutton

Relationship concepts indulging in social science

Principles of Social Science


Social science is the idea of someone being characterized to the understanding of being
described of changes in human behavior, social behavior, and cultural behavior as described in
our power presentations. With this article it provides how relationships can compare to the social
differences also involving family concepts of having hidden private secrets from another. It
describes all types of different relationships given on how close you are to them can hide social
behavioral questions giving from relationship status by means some of those secrets are hidden
on our devices, resulting in our device having the power over us. With these given examples it
explains the risk of your privacy being compromised from inside your device.


Research questions of Social Science


Based on the information provided is brings aware questions of what you should and
should not talk online being that one day it may come across the wrong person that is not
intended to find out. Being better or worse a hacker can use your private information to
blackmail for money or any other idea.


Research methods to avoid an occurrence


To many people to avoid a common occurrence of this degree it is not an easy task. From
many different research methods of authority many offer a privacy invasion including having
privacy boundaries to what you discuss before you tell someone online to know the consequence
of what you’re talking about can come back in the future and can be used against you. Also
monitor how much you trust someone with holding private information seeing if they can keep a
secret or can’t.


Data Analysis of Social Science


From many sources there have been reports of many threats of people invading
someone’s private information. In one survey there’s has been 31% participants that has come
upfront of secretively of going through another person’s phone without their consent in the past
year. It was provided that many parents check their children browsing history and social media
platforms to monitor their social behavior online.


Challenges and Concerns


The provided information can give you a sense of why its important to always be ahead
of what you’re doing online for not only the future but also how it can affect your mental healthin the future. Being aware of what you’re getting yourself into is always a good factor that
everyone should have from many threats that can appose online.


Conclusion


This information can make you observe the overall meaning of why being aware with a
sense of sensibility is always important when using your device. Demonstrating of what you say
online matters even if when you say it or describe it in a way don’t matter in the moment of time.


In-Text Citations


Karen Levy, Bruce Schneier, Privacy threats in intimate relationships, Journal of
Cybersecurity, Volume 6, Issue 1, 2020, tyaa006, https://doi.org/10.1093/cybsec/tyaa006