{"id":64,"date":"2023-12-06T00:48:47","date_gmt":"2023-12-06T00:48:47","guid":{"rendered":"https:\/\/student.wp.odu.edu\/hkhan004\/?p=64"},"modified":"2023-12-06T00:48:47","modified_gmt":"2023-12-06T00:48:47","slug":"article-1-review","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/hkhan004\/2023\/12\/06\/article-1-review\/","title":{"rendered":"Article #1 Review"},"content":{"rendered":"\n<p>The principles of social science involve studying the human behavior and<br>society to understand how people interact and make choices. It can be involved in<br>fields such as sociology, psychology, anthropology, economics, and in its own<br>way, cybersecurity. I say cybersecurity because often, especially when it comes to<br>battling cybercrimes, analysts must monitor and understand every move the cyber<br>criminal chooses to make to be able to track down the vulnerability and put a stop<br>to it. According to the article \u201c Identifying the Prevalence of Cybercrime in<br>Indonesian Corporations: A Corporate Legislation Perspective\u201d<br>(https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/vie<br>w\/130\/43) \u201cIt has been observed that cybercrime has increased in Indonesia.<br>As a result, policymakers have enacted telematic laws to combat the increase in<br>cybercrime and regulate the occurrence of telecommunication accidents in the<br>country (Amin &amp; Huda, 2021).\u201d This shows that battling cybercrime has a direct<br>hand in hand relation with studying cyber behaviors in order to prevent<br>cybercrimes. This article touches on the continuous development and improvement<br>of IT infrastructure in businesses to battle cybercrimes. When cybersecurity<br>analysts are trying to track down the vulnerabilities in the network they have to<br>analyze every little thing and every move made on the network just as one would<br>in understanding people in real life. The first article selected mainly focuses on the<br>rise of cyber crime rates increasing in Indonesia. According to the article Indonesia<br>is at the top of the list for \u201cTen riskiest Countries in terms of Cybercrime Rate\u201d.<br>The researchers are focused on 2 main goals and these goals are the prevalence of<br>cybercrime in Indonesian businesses and the impact of these crimes on the<br>countries corporate laws. The studies done in this passage have mainly been based<br>off of the cyber laws in the country of Indonesia. Researchers for this issue chose<br>the qualitative inductive approach for the data collection of the current<br>research because it enables the researcher to easily analyze large amounts of<br>data collected, as the present study focuses on the prevalence of cybercrime<br>within Indonesian corporations and the assessment of legislative rules and<br>regulations enforced by various countries to eradicate cybercrime at the<br>corporation level. These methods of research correlate to some of the things that I<br>have learned from the PowerPoint presentations because they have the same<br>ideology. Although Indonesia may not be in the best place right now, I am sure that<br>through research and a few crack downs on vulnerabilities they will be able to<br>upgrade and protect these cyber victims from being harmed by cybercriminals.<br>This would be a great help to society as a whole.<br>The second article I chose to write my review on is based on Saudi<br>Arabia. The article \u201cCyber Security Challenges Faced by Employees in the<br>Digital Workplace of Saudi Arabia&#8217;s Digital Nature Organization\u201d by Dr.<br>Vimala Venugopal Muthuswamy states \u201cDigitalization has increased the<br>need for businesses to safeguard their assets from cyber threats. The digital<br>workplace is not an exception, and a lack of employee awareness and<br>knowledge about cyber threats can make organizations susceptible to<br>cyberattacks.\u201d This goes hand in hand with the principles of social science as<br>well but in a slightly more similar way. The first article related by<br>understanding the ins and outs of the vulnerabilities but this article relates to<br>the human understanding of the threat that is produced. With employees not<br>having an understanding of the concept of cyberattacks and threats of that<br>nature, they will move around blindly. Employees who have no regard for<br>cyber safety will open any email which could be a potential phish attack or<br>click any link which could lead to the computer to be infected with worms.<br>When working in a computer based environment everyone should have an<br>idea of the cyber threats presented links directly with the principles of social<br>science. In this article researchers studied various aspects such as the level<br>of cyber security awareness among Saudi Arabian business employees. His<br>research found that even though users had a general concept of the idea of<br>cyber risks they did not get the proper training and guidance before hand from<br>employers which is what led to so many cyber issues. Many employees were<br>apparently \u201coblivious\u201d of most risks and vulnerabilities associated with their<br>online work. A lot of the research in this passage was direct research<br>accumulated through direct companies and employers that worked for<br>computer based companies. This research involves gathering information and<br>calculating it through percentages. Overall cyber crimes are a big concern to<br>the world and should be cracked down. In order to do this, people and<br>companies will have to implement the principles of social science and get a<br>understanding of what this issue actually is and how big it can get. We should<br>all be extremely mindful in understanding how to go about almost everything<br>we do.<\/p>\n<a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Facebook\" href=\"https:\/\/www.facebook.com\/facebook\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Follow us on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Twitter\" href=\"https:\/\/twitter.com\/twitter\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Follow us on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Find us on Linkedin\" href=\"https:\/\/www.linkedin.com\/in\/yourid\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Find us on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-instagram nolightbox\" data-provider=\"instagram\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our instagram feed\" href=\"https:\/\/instagram.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"instagram\" title=\"Check out our instagram feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/instagram.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-flickr nolightbox\" data-provider=\"flickr\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our flickr feed\" href=\"https:\/\/www.flickr.com\/photos\/myusername\/\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"flickr\" title=\"Check out our flickr feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/flickr.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-foursquare nolightbox\" data-provider=\"foursquare\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our foursquare feed\" href=\"https:\/\/foursquare.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"foursquare\" title=\"Check out our foursquare feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/foursquare.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Contact Us\" href=\"mailto:mail@example.com?subject=Contact%20Request\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Contact Us\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>The principles of social science involve studying the human behavior andsociety to understand how people interact and make choices. It can be involved infields such as sociology, psychology, anthropology, economics, and in its ownway, cybersecurity. I say cybersecurity because often, especially when it comes tobattling cybercrimes, analysts must monitor and understand every move the cybercriminal [&hellip;]<\/p>\n","protected":false},"author":27219,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/64"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/users\/27219"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/64\/revisions"}],"predecessor-version":[{"id":65,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/64\/revisions\/65"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/media?parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/categories?post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/tags?post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}