Career Paper

The Role of Information Security SpecialistIn the field of cybersecurity, the role of an information security expert is vital forsafeguarding assets and defending against threats. My paper will dive into how professionals inthe cybersecurity world rely on social science research and principles highlighting ideas likesocial systems, human factors, and societal impacts. By incorporating social science…

Article Review #2

Article Review #2: Exploring Legislative and Administrative Cybercrime Laws in IraqIntroduction:The article under review dives into Iraq’s legislative and administrative framework managingcybercrime, highlighting its shortcomings and recommending ways to improve. This articlereview will look at how the study pertains to social scientific principles, including its researchobjectives, techniques, data analysis, implications for marginalized groups, and overallcontributions…

Article Review #1

Article Review #1: Understanding Cybercrime in the Metaverse IntroductionIn the changing world of the internet comes the rise of the metaverse that brings about hurdles interms of cybersecurity and preventing crime. This article review takes a look at a study titled“Victimization by Deepfake in the Metaverse” by Stavola and Choi (2023) examining itssignificance within the…

Journal 15

Digital Forensics | Davin Teo | TEDxHongKongSalon https://www.youtube.com/watch?v=Pf-JnQfAEew Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Davin Teo demonstrated the ways in which the social sciences and digital forensics are…

Journal 14

Andriy Slyncuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. Andriy Slynchuk outlines eleven activities with the top five serious violations including using unauthorized streaming services, sharing others personal…

Journal 12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. This sample breach letter delves into economic and social science theories. It addresses game theory and information economics. Game theory is evident in the decisions taken…

Journal 13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using…

Journal 11

Watch this videoLinks to an external site..  As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site. , think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation. The job description for a cybersecurity analyst illustrates how our society is becoming more…

Journal Entry 10

Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. This article talks about the field of social cybersecurity and its important role in todays changing landscape of warfare. The article discussed how the focus has shifted from cyber threats to manipulating behavior and societal…

Complete the Social Media Disorder scale. How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world?

I answered no to most questions on the scale. I think the questions on the scale are really good actually since these are real things some people deal with. Some have actual addictions to social media, and cell phones in general so I think the questions can be effective to test people. I think depending…