User:MrLavoie/Choose an Article

Article Selection
Please list articles that you're considering for your Wikipedia assignment below. Begin to critique these articles and find relevant sources.

Article Evaluation:
The article is relevant and current based on the state of available information related to Black Hat hacking/hackers. There are a good number of sections that provide deeper insight into the topic.

The article is written from a neutral perspective.

Citations would be helpful in strengthening the completeness of the article. One blog is references and series of sources reputable online non-peer reviewed websites such as Wired or Kaspersky. These sites provide coverage on a myriad of topics and have often been cited within academia but are not scholarly. There are a few peer-reviewed sources cited in the article.

The article does not address any equity gaps as the topic is not unique to any particular population or subjects. Black Hat hackers have been from various backgrounds, ethnicities, countries, etc.

Article Evaluation:
This article references findings as recent as 2023. Given the rise in notable hacker groups globally, providing more examples of cases where these operations were exposed or listing several of these groups.

Neutrality has been used in the construction of this article.

Every section is accompanied by at least one citation. Providing additional categories for the article so visibility can be increased.

The citations used are reputable. Sites like Reuters are widely used for research and within academia. Government websites and archives are good sources for information but should be reviewed for neutrality or influence. For example, an entity that has been a victim of a hack-for-hire operation might be perceived as being biased. Additionally, utilizing one or two scholarly articles would boost the posture of the entry.

The article does not address any equity gaps as the topic is not unique to any population or subject. Similar to the term “hackers”, individuals involved in hack-for-hire operations originate from various backgrounds, ethnicities, countries, etc.

Article Evaluation:
Coverage of the topic is relevant. However, review of the current “state” of the topic may yield more up to date content as recent development could increase the relevancy of the overall article. This is an area of opportunity for improvement.

Neutrality was not achieved in the construction of this article. Additionally, the banner in the heading states that the article needs to be written in encyclopedic format. The article does flow like a personal research paper or review of the topic. Word choice should be revised to make the article less attributive.

Usage of citations is present throughout the article. There are also a fair number of scholarly articles that have been used.

As mentioned previously, relevancy of the article may be in question as the majority of resources are dated to 2016 and there may be changes in laws, policies, practices, and regulations that could impact the narrative of the topic.

The article does not address any equity gaps as the topic is not unique to any population or subject rather it is a practice that is ubiquitous.

Article Evaluation:
This article is relevant to the risk management and IT risk management fields. It also provides a deep dive into the topic outlining various protocols that are used across the industry and in the public, private, and government arenas.

Neutrality has been used in the construction of this article.

Claims throughout the article are accompanied by citations. Two of the citations are in need of being revised or fixed.

There is a good mixture of reputable websites and scholarly references used that provide authenticity to claims made and the methodologies presented.

The article does not address any equity gaps as the topic is not unique to any population or subject rather it is a practice that is ubiquitous.

Article Evaluation:
Coverage within the article is relevant to the topic. The potential to merge the article with IT Risk Management or Security Information Management. These other topics are closely tied to the same subject matter and can be viewed as terms rather than being separate topics.

Neutrality has been used in the construction of this article.

Claims made in the article are accompanied by citations. None of the citations are broken or missing.

This article has heavy use of scholarly articles and professional sources such as ISSA and government specifications for specific policies and regulations.

The article does not address any equity gaps as the topic is not unique to any population or subject rather it is a practice that is ubiquitous.