Article Review #2

Article Review #2 – The intersection of young adults and cybercrime

Social sciences toward the issue of young adults in cybercrime

The article talks about how young adults usually around college-age have a deep relationship with their phones and social media for either communication, connection, entertainment, or work. With this deep relationship of technology and social media, many young adults if not educated on cybersecurity can be suspectible to cyberattacks like identity theft, phishing, and other types of social engineering attacks. “In an era dominated by digital landscapes and interconnected networks, college-age young adults are deeply enmeshed with smartphones and social media.”(Lee, 2024). Cyberattacks that cause identity theft can ultimately detriment an individual psychologically.

The questions and hypotheses of cybercrime in connection with young adults

There were a few question asked in the article: How does the relationship between young adults and social media as well as technology cause cybercrime? How does cybercrime against individuals affect them? In the article it mentions that young adults use technology and social media frequently for connect and communication, with this reliability on technology personal information is easily being tossed around the internet making it easier for hackers to gain private personal information and use it to their advantage. Individuals can experience psychological effects with cyberattacks like phishing, identity theft, and other types of social engineering attacks. 

Research methods, data, analysis

The research methods, data, and analytics came from sources for other articles and books about how young adults invovlement in technology and social media has affect them with cybercrime. These articles also address solutions to cybercrime toward young adults which is teaching them the basics of cybersecurity informing them of the dangers of the internet.

Class presentations relating to this article 

In module 4 notes, cyberpsychology was mentioned in the notes about how cyberpsychology is how technology and cyberattacks impact feelings, emotions, and psychological state of individuals. The cyber attacks happen to young adults based off their deep connection and reliability with technolgy and social media, can cause depression and feelings of sadness since social engineering attacks like identity theft, cyberbulling, phishing and whaling can cause a individual to give their personal information to a hacker.

Challenges, concerns, and contributions of marginalized groups

One challenge and concern is the article is that how will the knowledge of cybersecurity reach international countries with the language barrier that between America and other countries and whether the same meaning of knowledge reaches other countries. Another concern is cyberbullying, particularly under young adults.  

Contributions to society

This article contributes to society by explain how the marginalized group of young adults have increased screen time for social media, connection, and communication. With this increased screen time comes with many opportunities to execute social engineering attacks like identity theft, phishing, cyberbullying, whaling, and other social engineering attacks. In order to solve these problems the knowledge of cybersecurity should be spread toward young adults. The knowlegde of cybersecurity should be spread to society as a whole as well. With this risks and impacts of cyberattacks will lower, making the internet a safe environment.

Conclusion

Overall, in order to mitigate social engineering attacks from attacking young adults, their should be measures and rules placed for social media and technology and the knowledge of cybersecurity must be spread so that young adults are educated about the dangers of the internet as well as how to ensure their safety. 

Source

Lee, H. (2024). Navigating the digital frontier: The intersection of cybersecurity challenges and young adult life . International Journal of Cybersecurity Intelligence & Cybercrime, 7(1), https://doi.org/10.52306/2578-3289.1178

Leave a Reply

Your email address will not be published. Required fields are marked *