Article Reviews
Article #1:
Ashley Khristopher Brown Jr
9-26-2025
A New Age
In my Senior year of high school in 2017 I didn’t know what I wanted to do when I
became an adult, it wasn’t until I went to an academic meeting with the school counselor where
they’d suggest that with my interest in computers that I’d pursue a career in Cybersecurity. From
that point I’ve seen a multitude of changes going on within the field, the article “ Navigating the
Digital Frontier: New Perspectives on Cybercrime and Governance” in which within this paper it
talks about how with today’s latest technologies brings about new more relentless threats in
common online spaces, of which costing millions of dollars to countless people through a series
of studies. One of which being how scammers will build trust on dating and messaging apps to
defraud victims with fake emergencies and investments and use Bitcoin and Ethereum to lander
the money by mixing it, using social engineering to manipulate their targets. Another study
discussed through studying from a law in Spain that criminalized using fake online profiles and
identities to commit crimes using doctrinal and comparative methodology to study it’s effects
and figure out what bridges between digital privacy infringement and active intrusion to commit
crimes. The 3rd study talked about how Open Source Intelligence between adversary nations
have been able to collect data through privacy violations and collected information that is
publicly available, giving credence to how Social media and public sites one shouldn’t display
public information readily online. Lastly a study placed a focused study group of internet users
within a region in Nigeria that does not have readily information of Cybercrime that in that area
with little knowledge or awareness of the issue is at a higher level of risk revolving getting
affected by it.
In Conclusion, these studies show that with technology advancing adversaries are rapidly
expanding out in their numbers and strength however so are the defenders, through their studies
they are keeping them in which and putting out the words in place in order to ensure that user’s
can be aware of these attacks for the future.
Works cited
Kayser, Christopher S, et al. “Navigating the Digital Frontier: New Perspectives on
Cybercrime and Governance.” Virtual Commons – Bridgewater State University,
vc.bridgew.edu/ijcic/vol8/iss2/1/. Accessed 30 Sept. 2025.
Article #2:
Article Review #2: The Legal Response to the Intrusion into Digital Identity in Social
Media
Student Name: Ashley
School of Cybersecurity, Old Dominion University
CYSE 201S: Cybersecurity and the Social Sciences
Instructor Name: Diwakar Yalpi
Date: 11-14-2025
2
Crime has always been a very flexible field within the world to which there is always a
way someone can perform it no matter the setting and the internet is no different, if anything is
even worse being that the fact that many crimes can be done and it be much harder to find the
perpetrator. This goes more for crimes within social media that not only have a level of
anonymity but have a lack of laws that make it harder to charge crimes within that field.
However, in the article that I am reading it talks about laws and regulations from countless other
countries used to combat cybercrimes within social media and how they’ve affected the
criminals themselves to figure out the best way to effectively charge a criminal on social media.
The article incorporates many principles of social science. From when I read it I found
these principles, in their discussion’s use of multiple different countries such as Germany, the US
and Spain along with many others not favoring one over the other puts the article on using
Objectivity. They also kept ethical neutrality as during this research they looked up laws and
didn’t do any research or experiments that put people in actual danger or be treated unethically.
Lastly they used Determinism as they’d talk about the ways certain things that lead to a
cybercrime from a bad actor and what caused that behavior.
The research used in their findings were laws and legislation from other countries and
their statistics found that showed the effects of these laws, they’ve also discussed the history and
concepts of cybercrime and it’s globalization that has only been enhanced using the internet. The
researchers very well talk about the social sciences that comes from social media, providing
examples of uses of these cybercrimes and the factors and how bad actors can be charged
3
without violating a person’s innate right to privacy. Their research can help many children and
young teens from being assaulted as for they’re some of the most at risk of crimes revolving in
social media. This can also help people who may have been blackmailed via nudes and men who
were promised love and instead giving up their money to a catfish.
In conclusion figuring out fair and just in our society that is evolving new means of
communication that protects citizens and keeps their freedoms are a delicate balance and this
article shows how other countries are combating this in their legislature.
Works Cited
González-García Vinuela, M. (2025). The Legal Response to the Intrusion into Digital
Identity in Social Media. International Journal of Cybersecurity Intelligence & Cybercrime,
8(2), – . DOI: https://doi.org/10.52306/2578-3289.1221
Available at: https://vc.bridgew.edu/ijcic/vol8/iss2/3