{"id":66,"date":"2023-12-06T00:50:30","date_gmt":"2023-12-06T00:50:30","guid":{"rendered":"https:\/\/student.wp.odu.edu\/hkhan004\/?p=66"},"modified":"2023-12-06T00:50:30","modified_gmt":"2023-12-06T00:50:30","slug":"article-2-review","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/hkhan004\/2023\/12\/06\/article-2-review\/","title":{"rendered":"Article #2 review"},"content":{"rendered":"\n<p>Cybersecurity and cyber policies are extremely important when trying to<br>keep online information safe and protected. This process would require a lot of<br>studying and examining of how people interact and behave online. Cybersecurity<br>relates to the principles of social sciences because it examines how people\u2019s<br>behaviors and interactions online impact security measures. The article<br>\u201cCyberattacks, cyber threats, and attitudes toward cybersecurity policies\u201d talks<br>about different forms of cyber attacks that have taken place and the type of damage<br>they have caused to people all over the world. The article states that civilians who<br>are exposed to cyber attacks and violence often get feelings of anxiety and<br>helplessness in the face of these threatening forces. This goes to show how much<br>of a direct link social science can play not only in helping battle the cyber crime<br>but the after math of a crime as well. The article uses various methods of survey<br>research to get to the bottom of a lot of points in the article with one being does the<br>public differentiate between interventionist and regulatory forms of cybersecurity<br>policies? As well as if exposure to different types of cyberattacks lead to<br>heightened support for different types of regulatory policies? To test these<br>questions the author settled with the survey research method to where they ran<br>controlled and randomized surveys that exposed 1022 participants getting them the<br>information they were looking for. Past events have shown that the public<br>internalizes attacks but the aftermath is when reports are heaviest but reports later<br>in the day are the ones with the most accurate information but by the times these<br>reports surface, the major damage is already done.<br>One hypothesis in the article is stated that cyber threat perception will<br>mediate the relationship between individual exposure to cyberattacks and support<br>for cybersecurity policies. To test this hypothesis the researchers of the article once<br>again were dependent on the survey research method as they conducted a<br>controlled survey experiment to get more information. This survey exposed<br>respondents to simulated news reports about major cyberattacks. The experimental<br>manipulation relied on professionally produced original video clips that broadcast<br>feature news reports. The lethal treatment group viewed a feature report discussing<br>several lethal cyberattacks that had taken place against Israeli targets, while the<br>nonlethal treatment group broadcast a collection of stories pertaining to nonlethal<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Hasher Khan<br>10\/25\/2023<br>cyber incidents. The article touches on many other points as well such as the<br>debate on digital surveillance centers on how and whether the authorities should<br>gain access to encrypted materials. This is something that made me think of the<br>Values and cyber security portion of the module 9 power point. Cybersecurity<br>professionals tend to believe in controlling access to data which is something I<br>agree with. Cyber professionals will for the most part never do anything to harm<br>your sensitive information but will do everything they can to protect it. Hackers<br>may believe information should be accessible but this is why they cyber<br>professionals must do everything they can to ensure that this is not the case and all<br>sensitive data stays from the reach of any cyber terrorist who is trying to cause<br>harm.<br>Overall, the article touched on some very strong points on why cybersecurity<br>policies should always be strong and ready for any form of cyber threat committed<br>by these cyber criminals that are hoping to do nothing but cause harm to us and our<br>sensitive data and information. The article incorporated a lot of forms of survey<br>research by conducting controlled surveys on users all over and retrieving strong<br>valuable information from these survey processes. The article helps make society<br>much more aware of the threats and danger of cyber crime by providing examples<br>of why these cyber issues are so critical and providing information and examples<br>of previous attacks and threats to help prepare us for any and every cyber threat we<br>may face in the future. One thing we know is that cyber threats are continuing to<br>grow every day all over the world so we must do all the research we possibly can<br>to keep ourselves protected.<\/p>\n<a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Facebook\" href=\"https:\/\/www.facebook.com\/facebook\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Follow us on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Twitter\" href=\"https:\/\/twitter.com\/twitter\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Follow us on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Find us on Linkedin\" href=\"https:\/\/www.linkedin.com\/in\/yourid\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Find us on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-instagram nolightbox\" data-provider=\"instagram\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our instagram feed\" href=\"https:\/\/instagram.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"instagram\" title=\"Check out our instagram feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/instagram.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-flickr nolightbox\" data-provider=\"flickr\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our flickr feed\" href=\"https:\/\/www.flickr.com\/photos\/myusername\/\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"flickr\" title=\"Check out our flickr feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/flickr.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-foursquare nolightbox\" data-provider=\"foursquare\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our foursquare feed\" href=\"https:\/\/foursquare.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"foursquare\" title=\"Check out our foursquare feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/foursquare.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Contact Us\" href=\"mailto:mail@example.com?subject=Contact%20Request\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Contact Us\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and cyber policies are extremely important when trying tokeep online information safe and protected. This process would require a lot ofstudying and examining of how people interact and behave online. Cybersecurityrelates to the principles of social sciences because it examines how people\u2019sbehaviors and interactions online impact security measures. The article\u201cCyberattacks, cyber threats, and attitudes [&hellip;]<\/p>\n","protected":false},"author":27219,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/66"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/users\/27219"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/66\/revisions"}],"predecessor-version":[{"id":67,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/66\/revisions\/67"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/media?parent=66"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/categories?post=66"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/tags?post=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}