Article Reviews

Article Review #1

Cyber Victimization In the HealthCare Industry

Principles of Social Sciences

Cyber Victimization in the healthcare industry relates to the principles of social sciences as the article analyzes the causes and effects as well as importance of the events that occur from it. It includes observations, experimentation and data collection and analysis, and is based on statistical research methods. This study looks into the Routine Activity Theory and questions motives behind the cyberattacks as well as what kind of damage can be done when cyberattacks happen at healthcare facilities.(Pg.4)

Methods, Data, and Analysis used

Moving further into the article’s analysis, there are a few types of research methods used to acquire the data found. These include observations, secondary data analysis, and focus groups. An example of the research done can show that most healthcare organizations use ICT applications to provide e-healthcare services. One of the main sources the article uses is Hackmageddon, which is a widely used and known website for compiling data on cyberattacks and it categorizes each incident by type, target, motivation, and outcome.(Pg.9)

The type of data found includes the coding schemes for targeted healthcare organizations, the coding description for independent variables, and descriptive statistics on the type of healthcare organizations that are targeted.(Pg.10) For example, Hospitals and Healthcare institutions are the main institutions that are primarily targeted for financial gain and happen through account hijacking and phishing attacks. Hospitals and Healthcare institutions are targeted 76.1%, followed by pharmacies at 7.1%.(Pg.11,12)

Topic Relation

The powerpoint presentations relate to the article as it goes through the social science principles by conducting research methods and gathering data and completing experiments and hypothesis testing as well as highlighting the importance of cybersecurity and the diversity behind it and how often it can happen and where and how it can happen. This article points out the key points behind the cyberattacks, which by following the Routine Activity Method, shows motivated offenders, suitable targets, and no capable guardians. (Pg.18,19) Also relaying the most important kind of cyberware attacks at healthcare organizations that begins with phishing, ransomware, data theft, insider, accidental, or intentional data loss, and supply chain.(Pg.6)

The topic of cyber victimization in the healthcare industry relates to the challenges of having a strong or weak software system, or even implementing a lot of security measures on the software can still be worked around when getting hacked, and sometimes implementing a lot of security measures or codes onto the software can make it harder to keep an eye on to prevent attacks. Healthcare organizations are attacked since that is where the most money and recognition comes from with people’s personal information and especially financial information. 

Challenges and Contribution

In society, there is a lot of things to look out for with this, which includes seeing charges on your accounts you did not do, or getting a text or email about a balance that is not paid from a facility that looks like your doctors, or getting a message about being charged and if it is an error to call a specific number to fix it. Ways to prevent from contributing to these attacks is not clicking any suspicious links sent to you, not giving your credit card information or social security information over the phone especially if you are not 100% sure who you are speaking to, and not keeping information on files that do not need to be on there.

References:Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activity

Article Review #2

Impact of Cyber Victimization on Anger and Frustration

Principles of Social Sciences

The principles of social sciences focus on psychological and sociological principles that emphasizes the emotional and behavioral responses of individuals subject to cyber victimization. This article relates to social sciences through the study of human behavior and their interactions with cyber attacks. The studies the article highlights the critical role of integrating technological  and institutional frameworks to address psychological consequences of cyber threats.

Hypothesis

Cyber victimization is an experience where one lives in constant exposure to online harassment, threats, bullying, etc. Cyber victimization has a strong connection with anger and frustration as well as uncertainty and unpredictability. Therefore, it is possible to hypothesize that cyber victimization has a significant impact on anger and such feelings are primary indicators of the psychological affects of online victimization.

Methods, Data, and Analysis used

This study takes a quantitative design in ascertaining the relationships that cyber victimization  has with anger and frustration and the roles played by artificial intelligence.

Data was collected through a structured survey that was both digital and available on paper copies that determined insight into victim cyber victimization experiences and responses as well as emotions involving anger, frustration, and how people perceive AI-driven measures for cybersecurity. Statistical analysis is used to identify patterns and correlations between cyber victimization, emotional impact, and effectiveness of coping strategies. 

Topic Relation, challenges and concerns, and contributions

This article relates to class topics because cyber victimization is a form of cybercrime due to affecting one’s well-being and understanding one’s emotions related to cyber crime is vital in creating effective interventions and support systems. A challenge that roots from cyber crimes is the anonymity behind it and not always being able to track the source of the issue. Online crimes are easier to get by with by being able to hide behind the digital platforms and not reveal identity. This article highlights and contributes to research and data collection of how AI affects online programs and attacks and how people are affected by it and what can be done to prevent further complications.

References:Nadir Aliane, Sanjar Mirzaliev, International Journal of Cyber Criminology https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/364/107