{"id":274,"date":"2025-03-31T04:00:20","date_gmt":"2025-03-31T04:00:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mahad\/?p=274"},"modified":"2025-03-31T04:00:20","modified_gmt":"2025-03-31T04:00:20","slug":"article-review-2-cybersecurity-literacy-programs-for-marginalized-communities-bridging-the-gap-in-digital-security","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mahad\/2025\/03\/31\/article-review-2-cybersecurity-literacy-programs-for-marginalized-communities-bridging-the-gap-in-digital-security\/","title":{"rendered":"Article Review #2: Cybersecurity Literacy Programs for Marginalized Communities: Bridging the Gap in Digital Security"},"content":{"rendered":"\n<p>Mahad Ahmad<br>March 30, 2025<br><strong>Introduction<\/strong><br>The digital divide has long been recognized as a barrier to equitable access to technology.<br>The article Cybersecurity Literacy Programs for Marginalized Communities: Bridging the<br>Gap in Digital Security examines how marginalized communities are more vulnerable to<br>cyber threats due to limited digital literacy. This review will explore the article&#8217;s alignment<br>with social science principles, its research questions, methodologies, data analysis, and<br>its contributions to understanding cybersecurity challenges faced by these groups.<br><strong>Relation to Social Science Principles<\/strong><br>The article intersects with social science by examining how socio-economic factors such<br>as income level, education, and geographic location affect cybersecurity risks in<br>marginalized communities. It applies sociological frameworks to show how systemic<br>inequalities contribute to digital vulnerabilities, highlighting the role of social structures in<br>shaping access to technology and security (Ghosh, Diyasi, &amp; Dey, 2025, p. 4).<br><strong>Research Questions and Hypotheses<\/strong><br>The article poses two primary research questions: How do socio-economic factors<br>influence the likelihood of cyber incidents in marginalized communities? And, what is the<br>effectiveness of current cybersecurity literacy programs for these populations? The authors<br>hypothesize that lower income levels, rural residency, and limited digital literacy<br>significantly increase the risk of cyber incidents among marginalized groups (Ghosh et al.,<br>2025, p. 6).<br><strong>Research Methods<\/strong><br>The study uses a mixed-methods approach. Quantitative data was collected through<br>surveys to assess the prevalence of cyber incidents and the digital literacy levels across<br>various demographic groups. Additionally, qualitative data was gathered via case studies of<br>existing cybersecurity literacy programs, such as Cyber Safe for All in Kenya and<br>PMGDISHA in India, to evaluate their cultural relevance and effectiveness (Ghosh et al.,<br>2025, p. 8).<br><strong>Data and Analysis<\/strong><br>The quantitative data was analyzed using logistic regression to identify correlations<br>between socio-economic variables and experiences with cyber incidents. The findings<br>suggest that individuals with lower incomes, residing in rural areas, and with limited digital<br>literacy are at a significantly higher risk of cyber threats (Ghosh et al., 2025, p. 10).<br>Qualitative analyses of literacy programs indicate that culturally tailored and localized<br>approaches are more effective at raising cybersecurity awareness than generic, one-sizefits-all methods (Ghosh et al., 2025, p. 12).<br><strong>Connection to Course Concepts<\/strong><br>The article\u2019s findings resonate with course discussions on the digital divide and the<br>importance of inclusive technological education. It highlights how socio-economic<br>disparities extend into the digital realm, exacerbating vulnerabilities and requiring targeted,<br>inclusive interventions to address these challenges (Ghosh et al., 2025, p. 14).<br>Impact on Marginalized Groups<br>Marginalized communities often face compounded challenges, including economic<br>hardship and limited educational access. These factors contribute to a lack of<br>cybersecurity awareness, making individuals more vulnerable to threats such as phishing,<br>malware, and identity theft. The article emphasizes the need for accessible, culturally<br>relevant, and tailored cybersecurity literacy programs to help these communities (Ghosh et<br>al., 2025, p. 16).<br><strong>Conclusion<\/strong><br>This article provides valuable insights into the intersection of socio-economic factors and<br>cybersecurity vulnerabilities. By advocating for culturally sensitive literacy programs, it<br>offers important recommendations for policymakers, educators, and organizations seeking<br>to improve digital security among marginalized populations (Ghosh et al., 2025, p. 18).<br>References<br>Ghosh, A., Diyasi, S., &amp; Dey, Dr. (2025). Cybersecurity Literacy Programs for Marginalized<br>Communities: Bridging the Gap in Digital Security. 10.5281\/zenodo.14740268.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mahad AhmadMarch 30, 2025IntroductionThe digital divide has long been recognized as a barrier to equitable access to technology.The article Cybersecurity Literacy Programs for Marginalized Communities: Bridging theGap in Digital Security examines how marginalized communities are more vulnerable tocyber threats due&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/mahad\/2025\/03\/31\/article-review-2-cybersecurity-literacy-programs-for-marginalized-communities-bridging-the-gap-in-digital-security\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30064,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/posts\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/users\/30064"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":277,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/posts\/274\/revisions\/277"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}