{"id":299,"date":"2022-05-06T09:12:23","date_gmt":"2022-05-06T09:12:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/terranceboakye\/?p=299"},"modified":"2022-05-06T09:12:24","modified_gmt":"2022-05-06T09:12:24","slug":"article-review-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/terranceboakye\/2022\/05\/06\/article-review-1\/","title":{"rendered":"Article Review 1"},"content":{"rendered":"\n<p><strong>Introduction<br><\/strong>In this article it talks about how phishing attacks are occurring in Cross River State which<br>is located in the country Nigeria. These phishing attacks are being targeted at the corporate<br>organizations. It seems that phishing attacks are increasing and due to the fact that<br>cybercriminals keep sending out these counterfeit emails and due to this, Cross River State is<br>losing profit. In the article they surveyed over one thousand people to collect data about these<br>attacks. After the results have come in from the survey, it looks like the corporate organizations<br>need to alert people to know how to detect these types of attacks and also it is suggested that the<br>corporate organizations should invest more time and resources.<\/p>\n\n\n\n<p><em><strong>Social science<\/strong><\/em><\/p>\n\n\n\n<p>After reading the article, I saw how it relates to social sciences. One social science that<br>this topic relates to is determinism. The reason why I say that is due to the fact that the article<br>explains that hackers would send fake emails to random people to steal their identity, seal their<br>credit card information. Determinism means that behavior is caused , determined or influenced<br>by preceding events . The article explains that unemployed graduates alongside adults are one of<br>the main targets in Nigeria for phishing which could be the fact that they need money. An<br>additional social size that relates to this article would be Objectivity. How objectivity relates to<br>the article is because this study is examining the rising incidence of fishing within the<br>organizations in Nigeria.<\/p>\n\n\n\n<p><strong>Hypothesis<\/strong><\/p>\n\n\n\n<p>After reading the article the Hypothesis stated that they believe that phishing attacks will<br>arise due to the fact that there are plenty of corporate organizations that are falling for these types<br>of attacks. So in order to find out if this is right, the article says that they went to over a thousand<br>people and took a survey.<\/p>\n\n\n\n<p><strong>Research Method<\/strong><\/p>\n\n\n\n<p>The types of research methods that were used to conduct this experiment were<br>Quantitative and qualitative data. This article also surveyed 1074 people selected from several<br>financial institutions, telecommunication Network providers, and manufacturing companies. An<br>additional research method that has been implemented in the article was an in-depth interview<br>guide which was used on 13 people from different corporate organizations and this was for the<br>qualitative data. The in-depth interview also aided the finding for the quantitative data in the<br>research. The respondents must have a computer connected to the internet attached to their<br>workstations, and they must be ICT workers, staff of the banks&#8217; information security unit, and<br>engineers of these selected organizations. IDI was treated to a theme and content analysis.<\/p>\n\n\n\n<p><strong>Results<\/strong><\/p>\n\n\n\n<p>After the researchers conducted the experiment, the data and analysis shows that phishing<br>has been exposed to all of the corporate organizations. It is also shown that in the past three<br>quarters had different forms of phishing attacks such as vishing, smishing, and many kinds of<br>phishing attacks. So after this study it shows that the corporate organizations need better training<br>for the employees to recognize phishing attacks and many other disguisable attacks that can be<br>sent through email So it can mitigate corporate businesses from getting their data stolen.<\/p>\n\n\n\n<p><strong>How it relates to cybersecurity<\/strong><\/p>\n\n\n\n<p>How the concept discussed in class relates to this article is that in this class we learn<br>different types of ways hackers can steal information such as phishing which is also what my<br>article is about. How the topic relates to challenges and concerns of marginalized groups is that<br>hackers send fake emails out to innocent civilians around the world and these people wouldn&#8217;t<br>think much of a phishing email and they would click the email to think it&#8217;s a regular email which<br>isn&#8217;t good because they are at risk of having their personal information stolen and if this starts to<br>become a major problem it could affect everybody in a bad way.<\/p>\n\n\n\n<p><strong>Contribution to Society<\/strong><\/p>\n\n\n\n<p>The overall contribution of the studies of phishing to society Is that it informs people a<br>way hackers can get your information and it gives Insight so then people can enlighten this<br>information out to people so they will know when not to open these types of emails.<\/p>\n\n\n\n<p><strong>cited source<\/strong><\/p>\n\n\n\n<p><em>International Journal of Cyber Criminology<\/em>. International Journal of Cyber Criminology (IJCC). (n.d.). Retrieved May 5, 2022, from https:\/\/www.cybercrimejournal.com\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IntroductionIn this article it talks about how phishing attacks are occurring in Cross River State whichis located in the country Nigeria. These phishing attacks are being targeted at the corporateorganizations. It seems that phishing attacks are increasing and due to the fact thatcybercriminals keep sending out these counterfeit emails and due to this, Cross River&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/terranceboakye\/2022\/05\/06\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":21984,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/299"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/users\/21984"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/299\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/299\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/media?parent=299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/categories?post=299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/tags?post=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}