{"id":327,"date":"2024-12-09T04:29:23","date_gmt":"2024-12-09T04:29:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rsullivan\/?page_id=327"},"modified":"2024-12-09T04:35:33","modified_gmt":"2024-12-09T04:35:33","slug":"papers","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/rsullivan\/papers\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Article Review 1<\/p>\n\n\n\n<p>10\/2\/2024<\/p>\n\n\n\n<p>Review of <em>Exploring Cybercriminal Activities, Behaviors and Profiles<\/em><\/p>\n\n\n\n<p>Introduction<\/p>\n\n\n\n<p><em>Exploring Cybercriminal Activities, Behaviors and Profiles<\/em>, by Maria Bada and Jason R.C. Nurse aims to answer the question as to why cybercrimes are committed by examining multiple case studies through the lens of psychology and human behavior. This is closely tied to the scope of the class as psychology and human behavior both can be categorized under the umbrella of social sciences.<\/p>\n\n\n\n<p>Research and Analysis<\/p>\n\n\n\n<p>The primary focus of this article are five case studies of different cybercrimes and analyzing the personality traits of the cybercriminals behind them. Case 1 covers the first computer worm ever developed in 1988, which accidentally infected and caused crashes in thousands of computers. The paper notes that due to the fact that the developer never intended to inflict harm, ther was notrue motive behind the cybercrime. Case 2 on the other hand, covers an intelligent and highly narcissistic Australian hacker who launched a series of malicious attacks that leaked classified information, purely to satiate his ego. Case 3 surrounds the actions of a hacktivist who committed cybercrimes in response to a lack of action regarding a reported rape. The hacker in case 3 was notablly antisocial and bullied in school and later dropped out because of it, which was a likely motivator for his later actions. Case 4 involves another hactavist who stole data from governmental organizations like the FBI, and cites neurological disorders like depression and Asperger\u2019s syndrome as traits that are important to the case. Case 5 focuses on a contractor who targeted the US government, the paper again cites Aspergers\u2019s as an explanation for his personality and actions. In each case, the paper cites psychological theories and models that align with aspects of the cybercriminal\u2019s life and potential motivation for example in case 3, the paper cites the Five Factor Model, HEXACO Model as well as leaning into the Psychodynamic Theory. (Bada, Nurse, 2023)<\/p>\n\n\n\n<p>Conclusion<\/p>\n\n\n\n<p>The case studies analized in the paper are a prime example of how the content of this class is applicable to situations in real world. In week five we studied the individual motives behind cybercrime, and while the first case study in the paper was an accidental crime, and therefore did not have a true motive, case 2 is a clear example of recognition as a motive, as the prosecution attributed it to \u201csimply [arrogance] and a desire to show off his computer skills.\u201d(Bada, Nurse, 2023, p.5) In addition cases like case 4 show how the psychological theories apply to cybercriminals, as the paper states that the cybercriminal in case 3 likely \u201cfound a sense of power through hacking, something he may have not had as a child when he himself was the victim,\u201d which is in line with the psychodynamic theory that we covered in class. By reading this paper, I was able to obtain a better grasp on the importance and applicability of the content of this course.<\/p>\n\n\n\n<p>ReferenceBada, M., &amp; Nurse, J. R. C. (2023). Exploring Cybercriminal Activities, Behaviors and Profiles. <em>arXiv.Org<\/em>. <a href=\"https:\/\/doi.org\/10.48550\/arxiv.2308.15948\">https:\/\/doi.org\/10.48550\/arxiv.2308.15948<\/a><\/p>\n\n\n\n<p class=\"has-large-font-size\">Article Review 2<\/p>\n\n\n\n<p>11\/17\/24<\/p>\n\n\n\n<p><em>Privacy Threats in Intimate Relationships<\/em>: A Social Science Perspective<\/p>\n\n\n\n<p>The article I chose, <em>Privacy Threats in Intimate Relationships<\/em>, examines the unique challenges of privacy violations within close personal relationships. This topic is closely tied to social science principles as it investigates human behaviors, societal norms, and power dynamics within intimate and caregiving contexts. By addressing relational power imbalances, social expectations, and cultural norms, the research underscores how interpersonal relationships and societal structures influence privacy invasions.<\/p>\n\n\n\n<p>Research, Data, and Analysis&nbsp;<\/p>\n\n\n\n<p>The study aims to characterize &#8220;intimate threats&#8221; and propose design considerations for mitigating such privacy risks. The key research questions in the article include: What distinguishes intimate privacy violations from traditional privacy threats? What socio-technical solutions can address these risks? The research methods used in the study include qualitative reviews of prior research, surveys, and analysis of real-world examples of intimate privacy threats. The article utilizes qualitative insights, such as interviews with victims of intimate partner abuse, and empirical data from surveys, like one reporting 31% of individuals monitoring or searching their partners\u2019 devices.<sup>1<\/sup> Statistical analysis of technology use in abusive contexts, such as the deployment of spyware or GPS tracking in abusive relationships, complements the narrative. The study further discusses the socio-cultural implications of these behaviors and proposes heuristic models for system designers.<\/p>\n\n\n\n<p>Societal impacts&nbsp;<\/p>\n\n\n\n<p>The study highlights how intimate privacy threats disproportionately affect marginalized groups, such as women, children, and the elderly. For example, women in patriarchal societies face compounded risks from cultural norms that grant men greater authority. The research calls for policy and design interventions that address these systemic vulnerabilities. In addition, the research in the article contributes to society by shifting attention from traditional cybersecurity concerns to the overlooked yet pervasive issue of intimate privacy threats. By advocating for socio-technical solutions and better legal protections, the study fosters awareness and encourages systemic change. For instance, recommendations for stalkerware regulations and enhanced digital forensic training for law enforcement can mitigate abuse facilitated by technology.&nbsp;<\/p>\n\n\n\n<p>Conclusion<\/p>\n\n\n\n<p>The research in this article relates to our work in this course bridging social science and technology. While relationship dynamics are not something that we have covered on their own, the dynamic of an oppressive\/overbearing partner or parent discussed in the article bears similarities to social science principles like marxian theory. Overall, this article is significant to the course, as it provides insight into the complex privacy issues found in technology usage in relationships and the vulnerabilities of marginalized populations.<\/p>\n\n\n\n<p>Reference<\/p>\n\n\n\n<p>Levy, Karen, and Bruce Schneier. \u201cPrivacy Threats in Intimate Relationships.\u201d Journal of Cybersecurity, Oxford University Press, 31 May 2020, Accessed 12 Nov. 2024.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review 1 10\/2\/2024 Review of Exploring Cybercriminal Activities, Behaviors and Profiles Introduction Exploring Cybercriminal Activities, Behaviors and Profiles, by Maria Bada and Jason R.C. Nurse aims to answer the question as to why cybercrimes are committed by examining multiple case studies through the lens of psychology and human behavior. This is closely tied to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rsullivan\/papers\/\">Read More<\/a><\/div>\n","protected":false},"author":29590,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rsullivan\/wp-json\/wp\/v2\/pages\/327"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rsullivan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rsullivan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rsullivan\/wp-json\/wp\/v2\/users\/29590"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rsullivan\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/rsullivan\/wp-json\/wp\/v2\/pages\/327\/revisions"}],"predecessor-version":[{"id":334,"href":"https:\/\/sites.wp.odu.edu\/rsullivan\/wp-json\/wp\/v2\/pages\/327\/revisions\/334"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rsullivan\/wp-json\/wp\/v2\/media?parent=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}