{"id":317,"date":"2025-12-05T04:28:03","date_gmt":"2025-12-05T04:28:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/?page_id=317"},"modified":"2025-12-05T04:41:05","modified_gmt":"2025-12-05T04:41:05","slug":"article-review-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/article-review-1\/","title":{"rendered":"Article Review #1"},"content":{"rendered":"\n<p>Ruslan Rustamov<br>CYSE201S<br>October 2, 2025<br>Source of Article: <a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/438\/124\" data-type=\"link\" data-id=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/438\/124\">https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/438\/124 <\/a><\/p>\n\n\n\n<p>Introduction<br>I read the article \u201cPerceived Security Risks and Cybersecurity Compliance<br>Attitude: Role of Personality Traits and Cybersecurity Behavior\u201d and want to say how<br>examines personality influences cybersecurity compliance. The authors argue that even<br>with strong technology, the systems remain vulnerable because people can ignore or even<br>try to break rules. I agree with this point, since I have seen how my friends and<br>classmates or even my family members reuse the same password everywhere or click on<br>suspicious links without thinking that these links can be dangerous.<br><\/p>\n\n\n\n<p>Research Question<br>The main research question is whether the Big Five personality traits (openness,<br>conscientiousness, extraversion, agreeableness, and neuroticism) predict cybersecurity<br>compliance attitudes. The independent variables are the five traits, while the dependent<br>variable is compliance behavior, meaning how likely someone is to follow rules. The <a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/438\/124\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a>study also introduces perceived risk as a moderator and cybersecurity behavior as a mediator. In few words, if people feel the risk is real their personality has a stronger effect on their actions because they start thinking about it more and they become more afraid.<br><\/p>\n\n\n\n<p>Methods<br>The researchers surveyed 259 participants and used standardized scales to measure<br>personality, risk perception, and behavior. The data was analyzed with Structural<br>Equation Modeling (SEM) using STATA software. Before reading this article, I didn\u2019t<br>know about SEM but from the explanation which I read it seems like a method that<br>allows researchers to test many relationships at once instead of just comparing two<br>things. I think this approach makes sense for a study like this, since personality and<br>behavior are not easy to understand.<br><\/p>\n\n\n\n<p>Results<br>The results showed that conscientious individuals were more likely to follow<br>security rules, which makes sense because they are usually organized and careful. People<br>with high neuroticism behaved inconsistently but became more compliant when they felt<br>the risk was serious. This finding feels very realistic to me. In my own experience, many<br>people only start being cautious after something bad happens, like getting their social<br>media hacked.<\/p>\n\n\n\n<p>Conclusion<br>In conclusion this article highlights that cybersecurity is not just technical but also<br>deeply social and psychological. The study has some limits, like relying on surveys, but<br>its main idea is clear and convincing. I agree with the authors, and I think organizations<br>should combine technical defenses with programs that raise awareness and explain risks<br>in ways people can understand.<br><\/p>\n\n\n\n<p>References<br>Ghaleb, M. M. S., &amp; Sattarov, A. (January-June 2025). Perceived Security Risks and<br>Cybersecurity Compliance Attitude: Role of Personality Traits and Cybersecurity Behavior.<br>International Journal of Cyber Criminology, 19(1), 23-49<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ruslan RustamovCYSE201SOctober 2, 2025Source of Article: https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/438\/124 IntroductionI read the article \u201cPerceived Security Risks and Cybersecurity ComplianceAttitude: Role of Personality Traits and Cybersecurity Behavior\u201d and want to say howexamines personality influences cybersecurity compliance. The authors argue that evenwith strong technology, the systems remain vulnerable because people can ignore or eventry to break rules. I agree&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":31461,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/pages\/317"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/users\/31461"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/comments?post=317"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/pages\/317\/revisions"}],"predecessor-version":[{"id":325,"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/pages\/317\/revisions\/325"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/media?parent=317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}