{"id":304,"date":"2023-02-03T19:05:52","date_gmt":"2023-02-03T19:05:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/?p=304"},"modified":"2023-04-11T17:37:56","modified_gmt":"2023-04-11T17:37:56","slug":"cyse-201s-article-reviews","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/2023\/02\/03\/cyse-201s-article-reviews\/","title":{"rendered":"CYSE 201S Article 1 Review"},"content":{"rendered":"\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\">Have you ever wondered, what are the losses of a business when a cyber attack occurs? Or how do you better prepare yourself and others against phishing scams? Well, these two questions are also from two different reliable cybersecurity journals found in \u201cThe Journal of Cybersecurity.\u201d These two journals go into depth and detail about the questions I asked. To begin, I am going to review the first journal I read which was about phishing, then I am going to review the second journal I read which was about the loss of a business when a cyber attack occurs.<br>    <\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\">To start, the title of the first journal article I read was called \u201cCategorizing human phishing difficulty: a Phish Scale.\u201d Overall, a group of people saw that phishing awareness training programs just weren\u2019t as accurate as they should be. They hypothesized that click rates should be expected to be different based on the difficulty of the phishing email and the department of the organization. Thus, they created the Phish Scale, so chief information security officers (CISO) can change the difficulty of phishing emails depending on the department, and it will help explain why they had such high\/low click rates.<br>     <\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\">This journal relates to the principle of determinism in social science through the lens of cybersecurity because determinism is defined as \u201ca principle of science that means the behavior is caused, determined, or influenced by preceding events.\u201d This means that the determinisms definition of someone\u2019s behavior is influenced by proceeding events adds up with the groups\u2019 hypothesis that click rates are to be expected depending on difficulty and the certain department it\u2019s sent to because when the phishing email is sent to the certain department those people were taught a different way and that teaching could have influenced them to click on the email. A research method they used to figure out what they needed to create the Phish Scale were case studies from prior CISOs testing their employee\u2019s click rates on phishing emails. Finally, some comparison between the journal and what we are learning in class currently is the idea of cybersecurity, following the scientific method, and social science through the lens of cybersecurity.<br>     <\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\">Overall, this article does relate to real-life challenges occurring daily by phishing emails to not just employees in organizations but to anyone who has an email. The contributions this group made were very important and needed for CISOs and anyone else who is testing others on click rates for phishing scams.<\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\">                                                           <strong>    Works Cited<\/strong><br>Steves, Michelle, et al. \u201cCategorizing Human Phishing Difficulty: A Phish Scale.\u201d Journal of<br>Cybersecurity, vol. 6, no. 1, 2020, https:\/\/doi.org\/10.1093\/cybsec\/tyaa009.<br>                                                             <strong>Links to Articles<\/strong><br>\u201cCategorizing human phishing difficulty: a Phish Scale\u201d &#8211;<br>https:\/\/academic.oup.com\/cybersecurity\/article\/6\/1\/tyaa009\/5905453?searchresult=1<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever wondered, what are the losses of a business when a cyber attack occurs? Or how do you better prepare yourself and others against phishing scams? Well, these two questions are also from two different reliable cybersecurity journals found in \u201cThe Journal of Cybersecurity.\u201d These two journals go into depth and detail about&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/2023\/02\/03\/cyse-201s-article-reviews\/\">Read More<\/a><\/div>\n","protected":false},"author":25798,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/posts\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/users\/25798"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/posts\/304\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/posts\/304\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/media?parent=304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/categories?post=304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/tags?post=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}