{"id":237,"date":"2023-10-07T05:27:03","date_gmt":"2023-10-07T05:27:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shanicedolson\/?p=237"},"modified":"2023-10-07T05:27:03","modified_gmt":"2023-10-07T05:27:03","slug":"asking-more-than-once-article1-cyse-201s","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/shanicedolson\/2023\/10\/07\/asking-more-than-once-article1-cyse-201s\/","title":{"rendered":"Asking more than once (article#1, CYSE 201s)"},"content":{"rendered":"\n<p>For this assignment, we had to look up some articles and write a review about the article we chose. I <\/p>\n\n\n\n<p>chose my article through the Journal of Cyber-security. The questions we have to answer are: (1) how the <\/p>\n\n\n\n<p>topic relates to the principles of the social sciences, (2) the study&#8217;s research questions and hypothesis, <\/p>\n\n\n\n<p>(3) the types of research methods used, (4) the types of data and analysis done, (5) how concepts <\/p>\n\n\n\n<p>discussed in the class relate to the article, (6) how the topic relates to the challenges, concerns, and <\/p>\n\n\n\n<p>contributions of marginalized groups , and (7) the overall contributions of the studies to society.<\/p>\n\n\n\n<p>In this article, they discussed the \u201cFoot in the door\u201d method. This method was described as asking <\/p>\n\n\n\n<p>someone for their personal information more than once. Even though the individual will not subscribe the<\/p>\n\n\n\n<p> first time, they may do it the second time when asked. Sounds like peer pressure. A good example of the <\/p>\n\n\n\n<p>FITD method is accessing a new website and they immediately ask for your email. You decline sharing <\/p>\n\n\n\n<p>your email the first time. Then, they ask you again but they use a spin the wheel method for you to receive <\/p>\n\n\n\n<p>a certain percentage off your purchase, IF YOU SHARE YOUR EMAIL It causes concerns because <\/p>\n\n\n\n<p>individuals cannot browse the internet without getting these questions asked: (1) Would you like to share<\/p>\n\n\n\n<p> your location? (2) Is your location on? (3) Please enter your email to continue..\u00a0 This topic relates to the<\/p>\n\n\n\n<p> principles of social sciences in the form of psychology, sociology, economics, and geography.\u00a0 They <\/p>\n\n\n\n<p>created a hypothesis stating that, \u201d compliance at the second request would be greater, following the <\/p>\n\n\n\n<p>preliminary request\u201d. They also had another hypothesis stating that, \u201csocial desirability and <\/p>\n\n\n\n<p>agreeableness would be associated with willingness to disclose, as both factors are associated with <\/p>\n\n\n\n<p>agreeing with others\u2019 requests\u201d. They used 4 questionnaires which included the personal information <\/p>\n\n\n\n<p>disclosure index, concern for information privacy scale, privacy behavior scale, and personality scales. <\/p>\n\n\n\n<p>They randomly chose 27 individuals to complete the questionnaires. The control group was told that they <\/p>\n\n\n\n<p>would not get a payment after completing the questionnaires. The other group was told that they would <\/p>\n\n\n\n<p>get a payment after they determined the results of their questionnaire. Once the experiment was <\/p>\n\n\n\n<p>completed, it increased in privacy disclosing behavior at a second request. They conducted a second <\/p>\n\n\n\n<p>study similar to the first study. They found that trust increased the likelihood of individuals sharing their <\/p>\n\n\n\n<p>personal information.<\/p>\n\n\n\n<p>This is an issue. Especially for everyone that has social media. Social convenience allows individuals to <\/p>\n\n\n\n<p>share their location. This also leads to oversharing about their personal life events. OPSEC is constantly <\/p>\n\n\n\n<p>taught throughout the world. Once again, we continue to ignore it because we are brainwashed by being <\/p>\n\n\n\n<p>liked on social media. That is when sociology becomes an issue in this situation. The reason being is that<\/p>\n\n\n\n<p> everyone wants to be liked. They do not think for one second that someone may be stalking them. It <\/p>\n\n\n\n<p>causes concerns because individuals cannot browse the internet without getting those questions. <\/p>\n\n\n\n<p>Children are now surfing the web and they do not understand what they are accepting. They might <\/p>\n\n\n\n<p>accidentally sell your information to a website and they expose all of your information. Individuals do not <\/p>\n\n\n\n<p>read the privacy policies on any of the websites they are accepting cookies on. It is too much to read. So,<\/p>\n\n\n\n<p> we accept the cookies not knowing the consequences of it. We will continue to do these types of things <\/p>\n\n\n\n<p>until something bad happens. That is a major concern in our society today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For this assignment, we had to look up some articles and write a review about the article we chose. I chose my article through the Journal of Cyber-security. The questions we have to answer are: (1) how the topic relates&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/shanicedolson\/2023\/10\/07\/asking-more-than-once-article1-cyse-201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26289,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts\/237"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/users\/26289"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/comments?post=237"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts\/237\/revisions"}],"predecessor-version":[{"id":238,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts\/237\/revisions\/238"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/media?parent=237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/categories?post=237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/tags?post=237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}