{"id":323,"date":"2025-12-05T04:39:19","date_gmt":"2025-12-05T04:39:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/?page_id=323"},"modified":"2025-12-05T04:39:19","modified_gmt":"2025-12-05T04:39:19","slug":"article-review-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/article-review-2\/","title":{"rendered":"Article Review #2"},"content":{"rendered":"\n<p>Ruslan Rustamov<\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0School of Cybersecurity, Old Dominion University<br>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0CYSE 201S: Cybersecurity and the Social Sciences<br>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Instructor Name: DIWAKAR YALPI<br>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Date: 11\/16\/2025<\/p>\n\n\n\n<p><strong>Introduction <\/strong><strong><\/strong><\/p>\n\n\n\n<p>The article looks at why people commit crimes and what kind of personalities many cybercriminals have. We can see information about common behaviors and motivations. The main point of the article is to know how cybercriminals think and that it can help improve cybersecurity and prevent attacks.<\/p>\n\n\n\n<p><strong>Connection to 7 principals <\/strong><strong><\/strong><\/p>\n\n\n\n<p>This article connects to several social science principles. It relates to human behavior and psychology because it explains why people commit cybercrimes and what traits they have. Also It connects to sociology by showing how online groups and social environments influence people and that influence can be bad.<\/p>\n\n\n\n<p><strong>Research Question <\/strong><strong><\/strong><\/p>\n\n\n\n<p>The main research question in this article is about understanding why people commit cybercrimes and what psychological and social factors influence their behavior. The authors suggest a hypothesis that cybercriminal behavior is shaped by certain personality traits, motivations, and weaknesses in legal and security systems. In this study, the independent variables are the psychological traits, social environment, and strength of cybersecurity and laws, while the dependent variable is the cybercriminal behavior itself and how effective different prevention strategies are.<\/p>\n\n\n\n<p><strong>Types of Research Methods and Data Analysis Used<\/strong><strong><\/strong><\/p>\n\n\n\n<p>The study used a qualitative research method because it was a systematic review. The authors did not collect new data themselves. Instead, they searched for academic articles in databases, compared them and looked for common themes.<\/p>\n\n\n\n<p><strong>Connection to Class<\/strong><strong><\/strong><\/p>\n\n\n\n<p>This article connects to some of the ideas we learned in class about why crime happens. For example, crime occurs when someone wants to do it and the target isn\u2019t protected. Many cybercrimes happen when people use weak passwords or don\u2019t know basic online safety. The article also says that stronger laws and real consequences can stop people from doing crimes. Overall, the study supports what we learned about online safety, privacy, and the risks people face when they don\u2019t protect themselves online.<\/p>\n\n\n\n<p><strong>Conclusion <\/strong><strong><\/strong><\/p>\n\n\n\n<p>The article what pushes people to commit cybercrimes and what can be done to stop it. It shows that when we understand how cybercriminals think and when our laws and security systems are stronger, the internet becomes safer for everyone. The study also helps social science by showing how human behavior connects with technology, and why teaching people about cybersecurity and creating better policies is important in today\u2019s world.<\/p>\n\n\n\n<p><strong>Reference <\/strong><strong><\/strong><\/p>\n\n\n\n<p>Trinh, D. T., Dinh, T. C. H., &amp; Tran, T. N. K. (2025). Exploring the psychological profile of cybercriminals: A comprehensive review for improved cybercrime prevention. International Journal of Cyber Criminology, 19(1), 112\u2013135.<\/p>\n\n\n\n<p>Article Link: <a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/452\/133\"><u>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/452\/133<\/u><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ruslan Rustamov \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0School of Cybersecurity, Old Dominion University\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0CYSE 201S: Cybersecurity and the Social Sciences\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Instructor Name: DIWAKAR YALPI\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Date: 11\/16\/2025 Introduction The article looks at why people commit crimes and what kind of personalities many cybercriminals have. We can see information about common behaviors and motivations. The main point of the article is to know how cybercriminals&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":31461,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/pages\/323"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/users\/31461"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/pages\/323\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/pages\/323\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ruslaneportfolio\/wp-json\/wp\/v2\/media?parent=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}