{"id":296,"date":"2024-04-23T02:39:09","date_gmt":"2024-04-23T02:39:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mekhi\/?page_id=296"},"modified":"2024-04-23T02:52:00","modified_gmt":"2024-04-23T02:52:00","slug":"article-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mekhi\/article-2\/","title":{"rendered":"Article 2 Review"},"content":{"rendered":"\n<p>                       <strong>Cyberattacks, cyber threats, and attitudes toward cybersecurity policies<\/strong><\/p>\n\n\n\n<p>                                                                              Mekhi Booker<\/p>\n\n\n\n<p>                                                                     Old Dominion University<\/p>\n\n\n\n<p>                                                                                 CYSE201S<\/p>\n\n\n\n<p>                                                                          March 26th, 2024<\/p>\n\n\n\n<p><strong>Introduction:<\/strong><\/p>\n\n\n\n<p>In this new digital era, the overall presence of cyber threats is steadily increasing, with a lack of individuals understanding cybersecurity policies. Such insights are vital for us to devise effective strategies to reduce risks and safeguard societal interests.&#8221;Recent events have underscored the imperative for robust cybersecurity policies in the face of escalating cyber threats,&#8221; as articulated in a scholarly article by Snider, Shandler, R., Zandani, S., &amp; Canetti, D. (2021)&nbsp;<\/p>\n\n\n\n<p><strong>Relating to Social Science Principles:<\/strong><\/p>\n\n\n\n<p>The article aligns with social science principles by delving into the multifaceted relationship between human behavior, technological advancements, and policy frameworks in cybersecurity. By showing individual&#8217;s perceptions and responses to cyber threats, it gives a deeper understanding of human behavior within the realm of technological risks and security measures. &#8220;In exploring the intricate dynamics between human behavior, technological advancements, and policy frameworks in the realm of cybersecurity, the article adheres to fundamental social science principles,&#8221; as elucidated by cybersecurity scholars Snider, Shandler, R., Zandani, S., &amp; Canetti, D. (2021). &#8220;By illuminating individuals&#8217; perceptions and responses to cyber threats, it offers invaluable insights into the complex interplay between human behavior, technological risks, and security measures.&#8221;&nbsp;<\/p>\n\n\n\n<p><strong>Research Questions\/Hypotheses:<\/strong><\/p>\n\n\n\n<p>The research questions that explore the relationship between cyberattacks, people&#8217;s perceptions of cyber threats, and their attitudes toward cybersecurity policy are at the heart of the study. By identifying the fundamental causes influencing people&#8217;s perceptions of and actions related to cybersecurity measures, the theories hope to inform the development and application of public policy. According to the investigators, &#8220;By uncovering the underlying factors shaping individuals&#8217; perceptions and behaviors regarding cybersecurity measures, we aim to inform the development and implementation of effective public policy.&#8221; Snider, Shandler, R., Zandani, S., &amp; Canetti, D. (2021).<\/p>\n\n\n\n<p><strong>Research Methods:<\/strong><\/p>\n\n\n\n<p>The research adopts a mixed-method approach, combining quantitative surveys and qualitative interviews. Quantitative surveys gather numerical data on individuals&#8217; perceptions and support for cybersecurity policies, while qualitative interviews provide nuanced insights into the motivations behind these attitudes and behaviors.&nbsp;<\/p>\n\n\n\n<p><strong>Societal Contributions:<\/strong><\/p>\n\n\n\n<p>The study&#8217;s societal contributions offer valuable insights for policymakers, cybersecurity practitioners, and researchers, informing evidence-based decision-making and strategy development. By showing the complexities surrounding cyber threats and cybersecurity policies, the research enhances societal resilience and contributes to advancing cybersecurity discourse and practices.&nbsp;<\/p>\n\n\n\n<p><strong>Conclusion:<\/strong><\/p>\n\n\n\n<p>&#8220;Cyberattacks, Cyber Threats, and Attitudes Toward Cybersecurity Policies&#8221;&nbsp; offers a thorough analysis of the complex processes at work. The paper illuminates the involvement between policy attitudes and cyber dangers through an in-depth examination and rigorous research methodology. Beyond the confines of academics, its contributions impact practical tactics and policy decisions aimed at strengthening cybersecurity resilience in a world growing more digitally connected.<\/p>\n\n\n\n<p>                                                                                <strong>References<\/strong><\/p>\n\n\n\n<p>Snider, Shandler, R., Zandani, S., &amp; Canetti, D. (2021). Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. Journal of Cybersecurity (Oxford), 7(1). <a href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyab019\">https:\/\/doi.org\/10.1093\/cybsec\/tyab019<\/a>&nbsp;<\/p>\n\n\n\n<p>Wong, Lee, V.-H., Tan, G. W.-H., Ooi, K.-B., &amp; Sohal, A. (2022). The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. International Journal of Information Management, 66, 102520. <a href=\"https:\/\/doi.org\/10.1016\/j.ijinfomgt.2022.102520\">https:\/\/doi.org\/10.1016\/j.ijinfomgt.2022.102520<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks, cyber threats, and attitudes toward cybersecurity policies Mekhi Booker Old Dominion University CYSE201S March 26th, 2024 Introduction: In this new digital era, the overall presence of cyber threats is steadily increasing, with a lack of individuals understanding cybersecurity policies. Such insights are vital for us to devise effective strategies to reduce risks and safeguard&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mekhi\/article-2\/\">Read More<\/a><\/div>\n","protected":false},"author":25263,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/pages\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/users\/25263"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/pages\/296\/revisions"}],"predecessor-version":[{"id":311,"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/pages\/296\/revisions\/311"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mekhi\/wp-json\/wp\/v2\/media?parent=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}