{"id":18,"date":"2025-12-08T04:36:27","date_gmt":"2025-12-08T04:36:27","guid":{"rendered":"https:\/\/student.wp.odu.edu\/abrow247\/?page_id=18"},"modified":"2025-12-08T04:36:27","modified_gmt":"2025-12-08T04:36:27","slug":"article-reviews","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/abrow247\/article-reviews\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<p><strong>Article #1:<\/strong> <\/p>\n\n\n\n<p>Ashley Khristopher Brown Jr<br>9-26-2025<br>A New Age<br>In my Senior year of high school in 2017 I didn\u2019t know what I wanted to do when I<br>became an adult, it wasn\u2019t until I went to an academic meeting with the school counselor where<br>they\u2019d suggest that with my interest in computers that I\u2019d pursue a career in Cybersecurity. From<br>that point I\u2019ve seen a multitude of changes going on within the field, the article \u201c Navigating the<br>Digital Frontier: New Perspectives on Cybercrime and Governance\u201d in which within this paper it<br>talks about how with today\u2019s latest technologies brings about new more relentless threats in<br>common online spaces, of which costing millions of dollars to countless people through a series<br>of studies. One of which being how scammers will build trust on dating and messaging apps to<br>defraud victims with fake emergencies and investments and use Bitcoin and Ethereum to lander<br>the money by mixing it, using social engineering to manipulate their targets. Another study<br>discussed through studying from a law in Spain that criminalized using fake online profiles and<br>identities to commit crimes using doctrinal and comparative methodology to study it\u2019s effects<br>and figure out what bridges between digital privacy infringement and active intrusion to commit<br>crimes. The 3rd study talked about how Open Source Intelligence between adversary nations<br>have been able to collect data through privacy violations and collected information that is<br>publicly available, giving credence to how Social media and public sites one shouldn\u2019t display<br>public information readily online. Lastly a study placed a focused study group of internet users<br>within a region in Nigeria that does not have readily information of Cybercrime that in that area<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>with little knowledge or awareness of the issue is at a higher level of risk revolving getting<br>affected by it.<br>In Conclusion, these studies show that with technology advancing adversaries are rapidly<br>expanding out in their numbers and strength however so are the defenders, through their studies<br>they are keeping them in which and putting out the words in place in order to ensure that user\u2019s<br>can be aware of these attacks for the future.<br><\/p>\n\n\n\n<p>Works cited<br>Kayser, Christopher S, et al. \u201cNavigating the Digital Frontier: New Perspectives on<br>Cybercrime and Governance.\u201d Virtual Commons &#8211; Bridgewater State University,<br>vc.bridgew.edu\/ijcic\/vol8\/iss2\/1\/. Accessed 30 Sept. 2025.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Article #2:<\/strong> <\/p>\n\n\n\n<p>Article Review #2: The Legal Response to the Intrusion into Digital Identity in Social<br>Media<br>Student Name: Ashley<br>School of Cybersecurity, Old Dominion University<br>CYSE 201S: Cybersecurity and the Social Sciences<br>Instructor Name: Diwakar Yalpi<br>Date: 11-14-2025<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>2<br>Crime has always been a very flexible field within the world to which there is always a<br>way someone can perform it no matter the setting and the internet is no different, if anything is<br>even worse being that the fact that many crimes can be done and it be much harder to find the<br>perpetrator. This goes more for crimes within social media that not only have a level of<br>anonymity but have a lack of laws that make it harder to charge crimes within that field.<br>However, in the article that I am reading it talks about laws and regulations from countless other<br>countries used to combat cybercrimes within social media and how they\u2019ve affected the<br>criminals themselves to figure out the best way to effectively charge a criminal on social media.<br>The article incorporates many principles of social science. From when I read it I found<br>these principles, in their discussion\u2019s use of multiple different countries such as Germany, the US<br>and Spain along with many others not favoring one over the other puts the article on using<br>Objectivity. They also kept ethical neutrality as during this research they looked up laws and<br>didn\u2019t do any research or experiments that put people in actual danger or be treated unethically.<br>Lastly they used Determinism as they\u2019d talk about the ways certain things that lead to a<br>cybercrime from a bad actor and what caused that behavior.<br>The research used in their findings were laws and legislation from other countries and<br>their statistics found that showed the effects of these laws, they\u2019ve also discussed the history and<br>concepts of cybercrime and it\u2019s globalization that has only been enhanced using the internet. The<br>researchers very well talk about the social sciences that comes from social media, providing<br>examples of uses of these cybercrimes and the factors and how bad actors can be charged<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>3<br>without violating a person\u2019s innate right to privacy. Their research can help many children and<br>young teens from being assaulted as for they\u2019re some of the most at risk of crimes revolving in<br>social media. This can also help people who may have been blackmailed via nudes and men who<br>were promised love and instead giving up their money to a catfish.<br>In conclusion figuring out fair and just in our society that is evolving new means of<br>communication that protects citizens and keeps their freedoms are a delicate balance and this<br>article shows how other countries are combating this in their legislature.<br>Works Cited<br>Gonz\u00e1lez-Garc\u00eda Vinuela, M. (2025). The Legal Response to the Intrusion into Digital<br>Identity in Social Media. International Journal of Cybersecurity Intelligence &amp; Cybercrime,<br>8(2), &#8211; . DOI: https:\/\/doi.org\/10.52306\/2578-3289.1221<br>Available at: https:\/\/vc.bridgew.edu\/ijcic\/vol8\/iss2\/3<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article #1: Ashley Khristopher Brown Jr9-26-2025A New AgeIn my Senior year of high school in 2017 I didn\u2019t know what I wanted to do when Ibecame an adult, it wasn\u2019t until I went to an academic meeting with the school&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/abrow247\/article-reviews\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31437,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages\/18"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/users\/31437"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/comments?post=18"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages\/18\/revisions"}],"predecessor-version":[{"id":29,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages\/18\/revisions\/29"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/media?parent=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}