{"id":136,"date":"2026-04-27T21:34:41","date_gmt":"2026-04-27T21:34:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ramankpaul\/?page_id=136"},"modified":"2026-04-27T22:37:20","modified_gmt":"2026-04-27T22:37:20","slug":"article-reviews","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ramankpaul\/cyse-201s-course-tab\/article-reviews\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Article Review #1: The Impact of Cybersecurity on Bank Performance During COVID-19<\/strong><\/h2>\n\n\n\n<p><strong>Student Name: <\/strong>Raman Paul<\/p>\n\n\n\n<p><strong>School of Cybersecurity, Old Dominion University<\/strong><\/p>\n\n\n\n<p><strong>CYSE 201S: <\/strong>Cybersecurity and the Social Sciences<\/p>\n\n\n\n<p><strong>Instructor:<\/strong> Diwakar Yalpi<\/p>\n\n\n\n<p><strong>Date:<\/strong> February 20, 2026<\/p>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>The article I picked to review is by Al-Sartawi et al. (2025) where Al-Sartawi et al talk<\/p>\n\n\n\n<p>about how cybersecurity practices affected the financial success of banks in the Gulf<\/p>\n\n\n\n<p>Cooperation Council (GCC) in the COVID-19 pandemic. Due to the pandemic, a lot of banking<\/p>\n\n\n\n<p>services had to be pushed online, so protection of digital systems had become very important.<\/p>\n\n\n\n<p>The researchers saw that banks that had strong cybersecurity were generally performed<\/p>\n\n\n\n<p>better financially, and much better in terms of Return on Assets (ROA). This means that<\/p>\n\n\n\n<p>cybersecurity directly affects financial stability and is not just a technical issue.<\/p>\n\n\n\n<p><strong>Relation to Social Science Principles<\/strong><\/p>\n\n\n\n<p>This study relates to many social science principles we talked about in class and one main<\/p>\n\n\n\n<p>principle is <strong>empiricism<\/strong>. The writers rely on real data collected from 41 banks, not assumptions.<\/p>\n\n\n\n<p>Their conclusions come from actual measurable facts and statistics.<\/p>\n\n\n\n<p>Another principle I found that relates to our classroom discussion is <strong>determinism<\/strong>. The<\/p>\n\n\n\n<p>study examines how one factor, like the level of cybersecurity, affects another factor, like<\/p>\n\n\n\n<p>financial performance. The researcher&#8217;s goal this connection and its cause and effect.<\/p>\n\n\n\n<p>The article also shows <strong>skepticism<\/strong> by discussing the previous research that had mixed<\/p>\n\n\n\n<p>results about cybersecurity effects performance. The authors didn\u2019t use the previous study<\/p>\n\n\n\n<p>results, but they decided to test the relationship again in a different region during a global<\/p>\n\n\n\n<p>COVID crisis.<\/p>\n\n\n\n<p>Finally, the writers showed that through the use of regression models and data analysis.<\/p>\n\n\n\n<p>They tried to minimize bias by applying consistent statistical methods.<\/p>\n\n\n\n<p><strong>Research Question:<\/strong><\/p>\n\n\n\n<p>What was the level of cybersecurity implementation among GCC banks during the<\/p>\n\n\n\n<p>COVID 19 pandemic, and what impact did it have on their financial performance?<\/p>\n\n\n\n<p><strong>My Hypothesis:<\/strong>The hypothesis proposes that banks with a higher level of cybersecurity would have<\/p>\n\n\n\n<p>better financial gains. The authors expected a good relationship between cybersecurity practices<\/p>\n\n\n\n<p>and profits.<\/p>\n\n\n\n<p>The <strong>independent variable (IV)<\/strong> is the <strong>Cybersecurity Level (CL)<\/strong>, which is how strongly each<\/p>\n\n\n\n<p>bank implemented their cybersecurity practices.<\/p>\n\n\n\n<p>The <strong>dependent variables (DV)<\/strong> are:<\/p>\n\n\n\n<p>\u2022 Return on Assets (ROA)<\/p>\n\n\n\n<p>\u2022 Earnings Per Share (EPS)<\/p>\n\n\n\n<p><strong>Types of Research Methods Used<\/strong><\/p>\n\n\n\n<p>The researchers used a quantitative research design. They gathered financial data from<\/p>\n\n\n\n<p>Bloomberg, annual reports, stock exchange platforms, and official bank websites. A<\/p>\n\n\n\n<p>cybersecurity checklist was sent to IT and security professionals within the banks to find out<\/p>\n\n\n\n<p>about the cybersecurity practices.<\/p>\n\n\n\n<p>Their final data sample had 41 banks all across Kuwait, Oman, Saudi Arabia, Bahrain,<\/p>\n\n\n\n<p>and the UAE. The researchers analyzed data from several years, focusing on the COVID-19<\/p>\n\n\n\n<p>pandemic period.<\/p>\n\n\n\n<p><strong>Types of Data and Analysis Used<\/strong><\/p>\n\n\n\n<p>The researchers used many techniques in this study, such as:<\/p>\n\n\n\n<p>&#8211; Multiple regression analysis<\/p>\n\n\n\n<p>&#8211; Fixed effects panel regression<\/p>\n\n\n\n<p>&#8211; Correlation analysis<\/p>\n\n\n\n<p>&#8211; Structural Equation Modeling (SEM)<\/p>\n\n\n\n<p>The authors also performed tests to make sure of the reliability of their findings. The<\/p>\n\n\n\n<p>results showed a positive relationship between the cybersecurity level and ROA. Another way to<\/p>\n\n\n\n<p>say this is that better cybersecurity was related to better financial results.<\/p>\n\n\n\n<p><strong>Connection to Course Concepts<\/strong><\/p>\n\n\n\n<p>This article connects strongly to the ideas from our class, like the idea that cybersecurity<\/p>\n\n\n\n<p>is part of a bigger social and organization system, not just a tech tool. The study shows us that<\/p>\n\n\n\n<p>things like leadership decisions, board structure, and IT governance all effect cybersecurity<\/p>\n\n\n\n<p>results.<\/p>\n\n\n\n<p>Another very important idea is risk management. We can see that by investing in a strong<\/p>\n\n\n\n<p>cybersecurity, banks can lower financial risks and keep the public trust.Another way the article relates to our class material is how cyber threats can affect<\/p>\n\n\n\n<p>economic stability and national security, especially during global emergencies like COVID-19.<\/p>\n\n\n\n<p><strong>Connection to Marginalized Groups<\/strong><\/p>\n\n\n\n<p>Even though the article mostly talks about banks, it still connects to marginalized groups<\/p>\n\n\n\n<p>in important ways. For example, lower income people are usually hit harder by cyberattacks<\/p>\n\n\n\n<p>because losing money can have a greater effect on them. Strong cybersecurity helps protect them<\/p>\n\n\n\n<p>from things like fraud and identity theft. The study also talks about female representation on<\/p>\n\n\n\n<p>boards, which relates to gender diversity and its importance in leadership and cybersecurity<\/p>\n\n\n\n<p>decision making. In addition, during COVID-19 a lot of elderly people and people with limited<\/p>\n\n\n\n<p>technology skills relied on online banking. Having strong cybersecurity systems in place helps<\/p>\n\n\n\n<p>protect these vulnerable groups from scams and exploitation.<\/p>\n\n\n\n<p><strong>Overall Societal Contributions \/ Conclusion<\/strong><\/p>\n\n\n\n<p>This study finds that investing in cybersecurity can boost both financial performance and<\/p>\n\n\n\n<p>public trust in banks. It talks about how cybersecurity is not just an added expense, but it shows<\/p>\n\n\n\n<p>that it can give organizations a competitive edge. The authors recommend that regulators should<\/p>\n\n\n\n<p>set up a standard way for banks to report their cybersecurity practices, which could make<\/p>\n\n\n\n<p>financial institutions more transparent and accountable. In conclusion, the article explains how<\/p>\n\n\n\n<p>cybersecurity relates to governance, the economy, and society, especially during major events<\/p>\n\n\n\n<p>like the COVID-19 pandemic.<\/p>\n\n\n\n<p><strong>Reference<\/strong><\/p>\n\n\n\n<p>Al-Sartawi, A. M. A. M., Sanad, Z., Shehadeh, M., &amp; Binsaddig, R. (2025). Cybersecurity and<\/p>\n\n\n\n<p>bank performance: Evidence from Gulf Cooperation Council. International Journal of Cyber<\/p>\n\n\n\n<p>Criminology, 19(1), 54\u201371. https:\/\/www.cybercrimejournal.com<\/p>\n\n\n\n<p><a href=\"https:\/\/olddominion-my.sharepoint.com\/:b:\/r\/personal\/rpaul008_odu_edu\/Documents\/presentation\/Raman%20Paul%20Article%20Review%201.pdf?csf=1&amp;web=1&amp;e=hfblbb\">Raman Paul Article Review 1.pdf<\/a><a href=\"\"><\/a><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Article Review 2, Perceived Security Risks and Cybersecurity Compliance Attitude:<\/strong><\/p>\n\n\n\n<p><strong>Role of Personality Traits and Cybersecurity Behavior<\/strong><\/p>\n\n\n\n<p>Student Name: Raman Paul<\/p>\n\n\n\n<p>School of Cybersecurity, Old Dominion University<\/p>\n\n\n\n<p>CYSE 201S Cybersecurity and the Social Sciences<\/p>\n\n\n\n<p>Instructor Name: Diwakar Yalpi<\/p>\n\n\n\n<p>Date: April 5, 2026Paul 2<\/p>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>This review digs into &#8220;Perceived Security Risks and Cybersecurity Compliance Attitude:<\/p>\n\n\n\n<p>Role of Personality Traits and Cybersecurity Behavior&#8221; by Ghaleb and Sattarov, published in the<\/p>\n\n\n\n<p>International Journal of Cyber Criminology, Volume 19, Issue 1. The main idea here is pretty clear,<\/p>\n\n\n\n<p>who you are (your makeup across the Big Five personality traits) really shapes whether you will<\/p>\n\n\n\n<p>follow cybersecurity rules at work. But it is not just about personality, but perceived security risk<\/p>\n\n\n\n<p>and actual security behavior both play big roles in this equation. That matters a lot because it shifts<\/p>\n\n\n\n<p>the focus in cybersecurity. Instead of just patching technical holes, we have to look at why people<\/p>\n\n\n\n<p>do or do not play by the rules in the first place (Ghaleb and Sattarov 27).<\/p>\n\n\n\n<p><strong>Connection to Social Science Principles<\/strong><\/p>\n\n\n\n<p>Now, thinking about social science principles, the article stands out for a few reasons. First,<\/p>\n\n\n\n<p>it is all about empiricism. Ghaleb and Sattarov did not just guess or rely on stories; they got hard<\/p>\n\n\n\n<p>numbers from 259 employees and ran stats to prove their points. That is the kind of evidence social<\/p>\n\n\n\n<p>science thrives on.<\/p>\n\n\n\n<p>Determinism is key, too. The researchers&#8217; figure compliance is not random personality,<\/p>\n\n\n\n<p>behavior, and risk perceptions are real drivers. They are basically saying people&#8217;s security behavior<\/p>\n\n\n\n<p>follows patterns you can study, not just wild guesses.<\/p>\n\n\n\n<p>Then there&#8217;s relativism. Not everyone sees a security threat the same way, and those<\/p>\n\n\n\n<p>differences matter for compliance. That is pretty obvious if you have worked in any organization,<\/p>\n\n\n\n<p>some people worry about risks while others shrug them off. The study also makes sure to stay<\/p>\n\n\n\n<p>objective, using tested scales rather than homemade ones that might skew results. And, honestly,Paul 3<\/p>\n\n\n\n<p>the article embraces skepticism, it does not take the easy road of blaming &#8220;just tech&#8221; or &#8220;just<\/p>\n\n\n\n<p>awareness.&#8221; There is more going on underneath.<\/p>\n\n\n\n<p><strong>Research Question<\/strong><\/p>\n\n\n\n<p>So, what is the research question? It is straightforward, do the Big Five personality traits<\/p>\n\n\n\n<p>affect employees&#8217; attitudes toward cybersecurity compliance, and how do perceived risks and<\/p>\n\n\n\n<p>behaviors play into that? The authors hypothesize these traits (agreeableness, conscientiousness,<\/p>\n\n\n\n<p>extraversion, neuroticism, openness) directly shape compliance attitudes. Security behavior<\/p>\n\n\n\n<p>mediates that relationship, while perceived risk tweaks how strong the personality effect is (Ghaleb<\/p>\n\n\n\n<p>and Sattarov 30).<\/p>\n\n\n\n<p>In terms of variables, the Big Five traits are the independent variables. The dependent<\/p>\n\n\n\n<p>variable is the compliance attitude, meaning whether employees follow security protocols or not.<\/p>\n\n\n\n<p>Security behavior is the bridge (mediator), while perceived risk is the knob that changes how much<\/p>\n\n\n\n<p>personality matters (moderator). That makes for a pretty sophisticated setup.<\/p>\n\n\n\n<p><strong>Types of Research Methods Used<\/strong><\/p>\n\n\n\n<p>The researchers went with a quantitative approach. They used structured surveys built from<\/p>\n\n\n\n<p>trusted, previously validated scales. Surveys work well here; they are quick, standardized, and<\/p>\n\n\n\n<p>make comparisons easy. The study is not experimental, nothing was manipulated, just measured.<\/p>\n\n\n\n<p>So we are dealing with real-world personality and risk perceptions, not anything cooked up in a<\/p>\n\n\n\n<p>lab.<\/p>\n\n\n\n<p><strong>Types of Data and Analysis Done<\/strong>Paul 4<\/p>\n\n\n\n<p>When it comes to data analysis, Structural Equation Modeling (SEM) is center stage, done<\/p>\n\n\n\n<p>with STATA software. SEM is powerful; it lets you look at multiple relationships all at once, like<\/p>\n\n\n\n<p>direct personality effects, mediation via behavior, and moderation through risk. That is exactly<\/p>\n\n\n\n<p>what this study needs. The use of standardized scales probably means the authors checked<\/p>\n\n\n\n<p>reliability in ways researchers always do, like calculating Cronbach&#8217;s alpha (Ghaleb and Sattarov<\/p>\n\n\n\n<p>35).<\/p>\n\n\n\n<p><strong>Connections to Course Concepts<\/strong><\/p>\n\n\n\n<p>Looking back at what we have studied this semester, the article ties closely to Protection<\/p>\n\n\n\n<p>Motivation Theory (PMT). PMT says people react to threats realistically when they believe the<\/p>\n\n\n\n<p>risk is real, and they know their actions can help. In this study, perceived risk works as a moderator,<\/p>\n\n\n\n<p>and people who take threats seriously are more likely to let their personality impact their<\/p>\n\n\n\n<p>compliance.<\/p>\n\n\n\n<p>Social Learning Theory comes into play here. In the workplace, your behavior isn&#8217;t just<\/p>\n\n\n\n<p>about your own personality, it really depends on your surroundings. Workers who are more<\/p>\n\n\n\n<p>conscientious or agreeable might start following safe habits just by watching others, or sometimes<\/p>\n\n\n\n<p>they just don\u2019t want to stand out by breaking the rules. And there\u2019s a deterrence to consider. The<\/p>\n\n\n\n<p>threat of getting caught or facing consequences pushes people to comply, right along with how<\/p>\n\n\n\n<p>risky they think the situation is.<\/p>\n\n\n\n<p><strong>Connections to the Concerns<\/strong>Paul 5<\/p>\n\n\n\n<p>The article doesn\u2019t highlight the marginalized communities directly, but the implications<\/p>\n\n\n\n<p>are there. Employees in lower pay jobs usually do not get much security training. For them,<\/p>\n\n\n\n<p>compliance rests more on personality than knowledge, which really is not fair. Besides that, risk<\/p>\n\n\n\n<p>perceptions and willingness to trust rules often vary across racial, ethnic, and socioeconomic lines,<\/p>\n\n\n\n<p>rooted in history with discrimination or oversight. If risk shapes compliance, but marginalized<\/p>\n\n\n\n<p>groups perceive risk differently, the study misses something by leaving out those demographic<\/p>\n\n\n\n<p>layers. Adding them would have made the research stronger.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Coming to a close, Ghaleb and Sattarov&#8217;s study gives cybersecurity research a real boost.<\/p>\n\n\n\n<p>It shows that personality drives compliance, but perceived risk and security behavior matter, too.<\/p>\n\n\n\n<p>That means organizations must look beyond technical fixes; they should factor in the psychology<\/p>\n\n\n\n<p>of their teams when planning security measures. As cyber threats keep growing, understanding<\/p>\n\n\n\n<p>what makes people vulnerable or strong is crucial. This study recommends personalized training<\/p>\n\n\n\n<p>and smart hiring, tuned to individual differences. In the end, the message is clear, cybersecurity is<\/p>\n\n\n\n<p>a people problem just as much as a tech problem, and the tools we need come from social science<\/p>\n\n\n\n<p>as much as IT.Paul 6<\/p>\n\n\n\n<p><strong>Reference<\/strong><\/p>\n\n\n\n<p>Ghaleb, M. M. S., &amp; Sattarov, A. (2025). Perceived security risks and cybersecurity compliance<\/p>\n\n\n\n<p>attitude: Role of personality traits and cybersecurity behavior. <em>International Journal of<\/em><\/p>\n\n\n\n<p><em>Cyber Criminology, 19<\/em>(1), 27\u201353.<\/p>\n\n\n\n<p>Article Link:<\/p>\n\n\n\n<p><a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/438\/124\">https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/438\/124<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/olddominion-my.sharepoint.com\/:b:\/r\/personal\/rpaul008_odu_edu\/Documents\/presentation\/Raman%20Paul%20Article%20review%202.pdf?csf=1&amp;web=1&amp;e=hM1ygm\">https:\/\/olddominion-my.sharepoint.com\/:b:\/r\/personal\/rpaul008_odu_edu\/Documents\/presentation\/Raman%20Paul%20Article%20review%202.pdf?csf=1&amp;web=1&amp;e=hM1ygm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1: The Impact of Cybersecurity on Bank Performance During COVID-19 Student Name: Raman Paul School of Cybersecurity, Old Dominion University CYSE 201S: Cybersecurity and the Social Sciences Instructor: Diwakar Yalpi Date: February 20, 2026 Introduction The article I&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/ramankpaul\/cyse-201s-course-tab\/article-reviews\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31289,"featured_media":0,"parent":126,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/136"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/users\/31289"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/comments?post=136"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/136\/revisions"}],"predecessor-version":[{"id":176,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/136\/revisions\/176"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/126"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/media?parent=136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}