{"id":317,"date":"2025-12-06T00:41:42","date_gmt":"2025-12-06T00:41:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/traviszywicki\/?p=317"},"modified":"2025-12-06T00:48:10","modified_gmt":"2025-12-06T00:48:10","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/traviszywicki\/2025\/12\/06\/article-review-2\/","title":{"rendered":"Article Review 2"},"content":{"rendered":"\n<p>Article Review #2: Title of the Article Review<\/p>\n\n\n\n<p>Student Name: Travis Zywicki<\/p>\n\n\n\n<p>School of Cybersecurity, Old Dominion University<\/p>\n\n\n\n<p>CYSE 201S: Cybersecurity and the Social Sciences<\/p>\n\n\n\n<p>Instructor Name: Diwakar Yalpi<\/p>\n\n\n\n<p>November 14, 2025<\/p>\n\n\n\n<p>BLUF<\/p>\n\n\n\n<p>This article from the Journal of Cybersecurity talks about how people in the UK deal with cybercrime, specifically how they report these incidents and whether they get the help they need afterward. The Authors, Button, Shepherd, and Cross conduct a thorough, data driven study. The results are very shocking. Most victims never report the crime, and the support services that do exist are seldom used by the victims, and are often not trusted to handle the situation.&nbsp;<\/p>\n\n\n\n<p>Relation\/Connection to Social Science Principles<\/p>\n\n\n\n<p>The study reflects the nature of cybersecurity by incorporating key principles of social sciences. For example, the authors demonstrate how certain institutions like the police and victim services shape individual choices, this is known as relativism. They rely on large scare survey data and solid statistical analysis to keep bias out of their data. They don\u2019t overcomplicate things either, by focusing on a few variables like trust and awareness, they get to the bottom of why a large number of people don\u2019t report crimes. The whole study is based on real world data from over 1000 people, thus rooted in empiricism. The authors keep their ethical distance, handling sensitive topics without their own personal bias leaking into the results. Determinism is reflected in the way prior experiences and social context shape the way the victims react to cybercrime. Finally we have skepticism. The authors make it clear that they bring the effectiveness of these supportive institutions into question.<\/p>\n\n\n\n<p>Research Question \/ Hypothesis \/ Independent Variable \/ Dependent Variable<\/p>\n\n\n\n<p>The main question is pretty clear. What stops people from reporting cybercrime and reaching out for support in the UK? The authors don\u2019t form an official hypothesis, but it implies that low awareness and trust in the support institutions reduce reporting rates and access to forms of support. They define their independent variable as things like, who is the victim, what kind of cybercrime they experienced, whether they knew how to report it, and if they trust the institutions. The dependent variable is whether people report the crime and how satisfied they are with the support they get.<\/p>\n\n\n\n<p>Types of Research Methods Used<\/p>\n\n\n\n<p>The authors use a straightforward quantitative method. They send detailed surveys to a representative portion of the UK population, collecting detailed accounts of various experiences with cybercrime, how they reported it, and their thoughts of the help they received. This is a classic form of social science research. It\u2019s about getting the numbers and the public opinion on these institutions.<\/p>\n\n\n\n<p>Types of Data Analysis Used<\/p>\n\n\n\n<p>The authors use descriptive statistics and regression analysis. This lets them spot common patterns like if age or gender matter, or if their trust in the police matters. These methods bring a level of rigor that strengthens their conclusions and makes their recommendations hard to ignore.<\/p>\n\n\n\n<p>Connections to Other Course Concepts<\/p>\n\n\n\n<p>This article connects closely with our course material. It focuses on the human element, what we know shapes cybersecurity but often gets overlooked. The Study\u2019s exploration of victim behavior and institutional trust connects directly to cyberpsychology, showing how emotions and perceptions steer digital behavior. The use of field surveys and data analysis mirrors the research techniques we\u2019ve studied, proving just how useful these tools are for unpacking real world problems in cybersecurity.<\/p>\n\n\n\n<p>Connections to the Concerns or Contributions of Marginalized Groups<\/p>\n\n\n\n<p>This study highlights the fact that marginalized communities like older adults, low income individuals, and those with limited computer skills, are even less likely to report cybercrime or seek any type of help. By highlighting these disparities, the study contributes to a broader understanding of how cybercrime affects vulnerable communities and calls for more equitable solutions.<\/p>\n\n\n\n<p>Overall Societal Contributions of the Study \/ Conclusion<\/p>\n\n\n\n<p>In conclusion, this study has a ton of real world value. It gives policy makers, law enforcements, and cybersecurity professionals evidence based recommendations for improving cybercrime reporting systems. The research also makes a strong case for bringing social science into cybersecurity. If we want better digital defenses, we need to understand the people actually using the technology.<\/p>\n\n\n\n<p><strong>Reference<\/strong><strong><br><\/strong>Button, M., Shepherd, D., &amp; Cross, C. (2024). An empirical analysis of cybercrime reporting and victim support in the United Kingdom. <em>Journal of Cybersecurity, 11<\/em>(1), tyaf033.<a href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyaf033\"> https:\/\/doi.org\/10.1093\/cybsec\/tyaf033<\/a><\/p>\n\n\n\n<p>Article Link:<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/11\/1\/tyaf033\/8322282\"> https:\/\/academic.oup.com\/cybersecurity\/article\/11\/1\/tyaf033\/8322282<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #2: Title of the Article Review Student Name: Travis Zywicki School of Cybersecurity, Old Dominion University CYSE 201S: Cybersecurity and the Social Sciences Instructor Name: Diwakar Yalpi November 14, 2025 BLUF This article from the Journal of Cybersecurity talks about how people in the UK deal with cybercrime, specifically how they report these&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/traviszywicki\/2025\/12\/06\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":31340,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/posts\/317"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/users\/31340"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/comments?post=317"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/posts\/317\/revisions"}],"predecessor-version":[{"id":328,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/posts\/317\/revisions\/328"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/media?parent=317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/categories?post=317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/traviszywicki\/wp-json\/wp\/v2\/tags?post=317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}