{"id":333,"date":"2024-12-04T19:38:49","date_gmt":"2024-12-04T19:38:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/?page_id=333"},"modified":"2024-12-09T04:36:58","modified_gmt":"2024-12-09T04:36:58","slug":"article-reviews","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/article-reviews\/","title":{"rendered":"Article review&#8217;s"},"content":{"rendered":"\n<p>Article 1 <\/p>\n\n\n\n<p>Will Demarest<br>CYSE 201S \u2013 Cybersecurity and Social Science<br>Mr. Yalpi<br>October 2, 2024<br>Article Review #1 &#8211; Dynamics of Dark Web Financial Marketplaces: An Exploratory Study of<br>Underground Fraud and Scam Business<br>Summary<br>The goal of the study was to describe the dark web financial market and scams that occur there.<br>The findings are scams that target dark web marketplace buyers.<br>Relation to Principles of Social Science<br>\uf0b7 Relativism: Due to the advancement of the internet. The dark web has grown, and the<br>anonymous nature of the cryptocurrencies used have resulted in new forms of crime.<br>\uf0b7 Objectivity: The study does not promote an opinion about fraud. Instead, it seeks to<br>understand how fraud works on the dark web. Specifically, \u201c(1) what main products<br>scammers encourage customers to purchase, (2) how financial market vendors operate<br>their business, and (3) which marketing strategies are used to scam potential buyers in the<br>Dark Web financial market.\u201d (Jung, 2022)<br>\uf0b7 Determinism: the study does not explain why scams work, but it talks about how some<br>lures used by scammers are more effective than others.<br>\uf0b7 Parsimony: The study uses the theoretical framework, routine activity theory to explain<br>the situation fraud occurs.<br>\uf0b7 Empiricism: Qualitative and quantitative analysis.<br>\uf0b7 Skepticism: The article doesn\u2019t really address skepticism; the authors want to prove their<br>conclusions.<br>\uf0b7 Neutrality: the authors have not harmed the subjects of the study.<br>Research Questions\/Hypothesis<br>What are the criminals\u2019 motivational factors, challenges of criminal justice responses, and<br>criminal operations on the Dark Web financial services. Primarily, the study focuses on<br>examining target suitability components (Jung et al, 2022)<br>Methods<br>The study combined a quantitative and qualitative analysis (i.e., logistic regression) and<br>qualitative analysis (i.e., thematic analysis). (Jung et al., 2022) Statistical analysis was used to<br>determine the main factors that encourage consumers to associate illegal trading of financial<br>goods. The thematic analysis followed six steps: (1) Step 1: Become familiar with the data by<br>carefully re-reading the entire data; (2) Step 2: Generate initial codes, which are \u201cthe<br>fundamental building blocks of what will become later themes.\u201d (3) Step 3: Search for themes,<br>(4) Step 4: Review themes, (5) Step 5: Define themes, and (6) Step 6: Write up. (Jung et al.,<br>2022)<br>Types of Data and Analysis<br>A sample of 117 financial market sites and 31 Escrow sites was used based on listings on the<br>main Dark Web forums: Hidden Wiki, Onion List, and Dark Web Wiki.<br>Data from the sites included: type of products, type of cryptocurrency, customer service, and<br>security.<br>Concepts from PowerPoint Presentations<br>Two issues in Social Science Research from the slides are how to select a representative sample<br>and that the websites being studied might disappear. The article discussed the difficulty of<br>deciding on a sample size because no one knows how large the Dark Web is. The study also<br>mentioned \u201ccontinuous fluctuation of IP addresses\u201d (Jung et al., 2022) as a problem.<br>Part of the study was finding out how scam sites attract victims, and this relates Alexandra<br>Michel\u2019s phrase \u201cPsyber Security\u201d as well as Burgard and Schlembach\u2019s three stages of fraud,<br>particularly \u201cgetting hooked on\u201d and \u201cstaying attuned\u201d. The slides also mention optimism bias.<br>The article does not discuss this specifically, but I think someone going on the Dark Web to buy<br>illegal items, from someone they don\u2019t know, using a currency that can\u2019t be traced, must think<br>bad things won\u2019t happen to them.<br>Marginalized Groups<br>The article does not directly address any marginalized groups. But someone buying stolen credit<br>card numbers online might not have a lot of money and could be desperate.<br>Contributions to Society<br>The study can help educate the public and be used in training for police. \u201cEnhancing law<br>enforcement capabilities of investigating financial marketplaces and promoting public awareness<br>and consumer safety programs are discussed as effective preventive measures.\u201d (Jung et al.,<br>2022)<br>Conclusion<br>The study found that PayPal transfer is a popular product for scammers to use, and cloned cards<br>are less likely to be scam products. The study also found that if a seller used Monero as its<br>cryptocurrency, it was more likely to be a scam.<br>Works Cited<br>Jung, B. R., Choi, K. &amp; Lee, C. S. (2022). Dynamics of Dark Web Financial Marketplaces: An<br>Exploratory Study of Underground Fraud and Scam Business. International Journal of<br>Cybersecurity Intelligence &amp; Cybercrime: 5(2), 4-24. Available at:<br>https:\/\/doi.org\/10.52306\/XMHN2624 Copyright \u00a9 2022 Bo Ra Jung, Kyung-Shick Choi, and<br>Claire Seungeun Lee<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>article 2 <\/p>\n\n\n\n<p>Will Demarest<br>CYSE 201S \u2013 Cybersecurity and Social Science<br>Mr. Yalpi<br>November 17, 2024<br>Article Review #2 &#8211; The unpredictability of phishing susceptibility: results from a repeated<br>measures experiment<br>Summary<br>Email phishing attacks are a common way that attackers gain access to computers and<br>networks. The study found that the nature of the scam (i.e. the story used in the email) is the<br>most important factor in determining if an individual was susceptible to the phishing attack.<br>Relation to Principles of Social Science<\/p>\n\n\n\n<ul>\n<li>Relativism: In the current world much of our communication is technology related email<br>phishing attacks arose with the technology<\/li>\n\n\n\n<li>Objectivity: The study tested several factors to see which, if any, had an effect on<br>susceptibility. And the authors noted that the effects were small.<\/li>\n\n\n\n<li>Parsimony: The article uses clear and simple language.<\/li>\n\n\n\n<li>Empiricism: The study focused on the actual behavior of the participants. For example,<br>whether they clicked on a link or not and what the content of the email was. The<br>researchers do not offer opinions on why a participant does or does not click a link.<\/li>\n\n\n\n<li>Skepticism: The article includes a section titled \u201cValidity and reliability\u201d that discusses<br>factors that may have affected the results of the study.<br>Ethical Neutrality: \u201cThe study was approved formally by a governmental ethics board as well<br>as by each participating organization. Informed consent was obtained from each participant.<br>The document explicitly mentioned that some sort of deception would occur, but the kind of<br>deception was not specified\u201d. (Sommestad and Karlz\u00e9n, 2024, P. 5)<\/li>\n\n\n\n<li>Determinism: Obviously, a person cannot be susceptible to a phishing email if they don\u2019t<br>receive the email first. The study analyzes which type of content is most likely to result in<br>a recipient clicking a link or downloading a file.<br>Research Questions\/Hypothesis<br>The study tested three hypotheses:<\/li>\n<\/ul>\n\n\n\n<ol>\n<li>Susceptibility to phishing emails is influenced by the scam represented in the email.<\/li>\n\n\n\n<li>Susceptibility to phishing emails is influenced by the number of adaptations added to<br>personalize the email to the recipient.<\/li>\n\n\n\n<li>Susceptibility to phishing emails is influenced by the number of influence techniques<br>added to the email.<br>(Sommestad and Karlz\u00e9n, 2024, P. 7)<br>The scam is the story used by the attacker. Foe example, a company is contacting you about<br>an unpaid invoice. Adaptations are how tailored the message is to the specific receipient.<br>This might be the use of the receipient\u2019s first and last name in the salutation. Finally,<br>influence techniques are anything else that might persuade a receipient. The study modified<br>\u201cemails to apply such influence techniques while keeping the scam intact, e.g. by specifying<br>deadlines or adding flattery at the end of the message\u201d. (Sommestad and Karlz\u00e9n, 2024, P. 6)<br>Methods<br>Simulated phishing emails were sent to participants work email over a period of 16<br>months. (Sommestad and Karlz\u00e9n, 2024, P. 3) For each email, one of 47 scams would be<br>selected at random, further modified randomly for the number of adaptations added (range 0\u20132<br>adaptations) and the number of influence techniques added (range 0\u20131 influence techniques).<br>Emails either contained a link to a webpage or a downloadable file. In each case the link was<br>unique for each particular email and recipient. This way, researchers could tell which particular<br>emails or files were successful, and which participants were susceptible. (Sommestad and<br>Karlz\u00e9n, 2024, P. 4)<br>Types of Data and Analysis<br>A set of 47 templates representing different scams was created. These scams related to<br>different things, like: suspicious user activities, revisions, computer changes requiring attention,<br>lottery wins, meetings or appointments, vacation schedules, speaker engagements, salaries,<br>inventories, missed chat messages, missed fax messages, invoices, and private images or other<br>private matters. (Sommestad and Karlz\u00e9n, 2024, P. 4)<br>Adaptations could be as simple as customizing the salutation, sender, or signature; but<br>might also include the organization\u2019s name, the name of the work group, or the name of a<br>colleague of the recipient. (Sommestad and Karlz\u00e9n, 2024, P. 4)<br>Influence techniques covered variations of: social validation (e.g. stating that colleagues<br>had already performed an action), scarcity (e.g. stating a firm deadline to access material),<br>reciprocity (e.g. stating that the IT department worked overtime and now needed help), authority<br>(e.g. referring to managers\u2019 requests), and liking (e.g. flattering the recipients in relation to their<br>past performance). (Sommestad and Karlz\u00e9n, 2024, P. 4)<br>Concepts from Powerpoint Presentations<br>The study relates to the concept of cyberpsychology from the Module 4 slides. It seems<br>that the study could be best described as being from the Behaviorism School of Psychology<br>because it measured which scams were most likely to result in a specific behavior. The study did<br>not consider what recipients were thinking or feeling when they engaged in the specific behavior.<br>The Module 3 slides mention sample selection as an issue in Social Science Cyber<br>Research and how a sample may not be representative. The article discusses this issue under the<br>heading \u201cValidity and reliability\u201d. Specifically mentioned is that participants were recruited to<br>this study from Swedish organizations in societally important sectors and that organizations with<br>strong security management practices, and individuals focused on information security, may be<br>overrepresented among those chosen to participate. (Sommestad and Karlz\u00e9n, 2024, P. 6)<br>Marginalized Groups<br>The article does not directly address any marginalized groups. In fact, the study<br>specifically involved employees of Swedish organizations in what the Swedish Civil<br>Contingencies Agency identified as societally important sectors. However, the findings could be<br>beneficial to senior citizens and retirees who are sometimes the victims of phishing attacks.<br>Contributions to Society<br>The study can help to improve anti-phishing training and materials. Specifically, the<br>s<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Article 1 Will DemarestCYSE 201S \u2013 Cybersecurity and Social ScienceMr. YalpiOctober 2, 2024Article Review #1 &#8211; Dynamics of Dark Web Financial Marketplaces: An Exploratory Study ofUnderground Fraud and Scam BusinessSummaryThe goal of the study was to describe the dark web financial market and scams that occur there.The findings are scams that target dark web marketplace&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/article-reviews\/\">Read More<\/a><\/div>\n","protected":false},"author":29645,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/333"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/users\/29645"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/333\/revisions"}],"predecessor-version":[{"id":346,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/333\/revisions\/346"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/media?parent=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}