About Me/ CYSE 201S

I’ m a sophomore at Old Dominion University. Im from a small town called Ridgeway, Virginia. It is about 4 to 5 hours away from Old Dominion University. I don’t have tons of experience but i took an cybersecurity class at my high school and took two cybersecurity classes at  last year my freshman year. In my free time i enjoy working out, listening to music, trying new things, and hanging out with friends and family. I hope to learn a lot more about cybersecurity in this class.

Discussion- Top Careers

There are so many career options for social science graduates that are very interesting to me. The first career is a social worker. I find the aspect of helping people that are in need as a very appealing part of the job and that is why I would be interested. The second career is a designer. I feel like i’m a very creative person and this job brings out a lot of creativity and seems like a fun job to do. The third and final career is a geographer. I’m a very interested in geography and the study of the earth so this job would be very interesting for me.

Week 1 Journal entry

I would like to focus my career with roles and areas that deal with analyzing data and securing data. The areas and careers that appeal to me the most are threat analysis, Incident response, and vulnerability response. These are very appealing to me because I like the challenge of analyzing threats and dealing with threats. While these are the things I would focus on there are certain careers and areas that I find less appealing. The first is multi-disciplined language analysis. With how complex this role sounds I just don’t think I would find it appealing. The next is cyber operations planning because i’m just not interested in developing different plans and systems. 

Week 2 discussion

The principle of determinism is saying that everything is predetermined by different events. Events or actions don’t just happen something leads to the action or event. So when relating to computer hacking this is saying people don’t just wake up and computer there are things that lead up to the computer hacking. There are different factors that come in play like a person’s personal experiences or history. I believe when using determinism when relating to computer hacking it makes you realize that maybe in order to stop hacking we have to see first why are people hacking. Then when you get the why and the reasons you can try and stop the events that lead up to a person saying they’re going to computer hack. 

Week 2 Journal Entry

The principles of science relate to the way we look at cybersecurity and how we approach challenges dealing with cybersecurity. It makes sure that the strategies we are using to solve issues in cybersecurity are effective, and improving every single day. For example, Empiricism deals with collecting and analyzing data on the different vulnerabilities and threats they might face. This helps with security. While objectivity helps with the way security is looked at and evaluated. It makes sure that it’s based on facts and evidence not bias. This is important because bias can really hurt a company or workplace. I believe that all of the principles play an important role dealing with cybersecurity. 

Week 3 Journal Entry

I believe there are many ways that researchers can use information from Privacyrights.org to study breaches. The first way is by looking at and examining the different breaches and how they impacted different areas. By doing this you can sniff out some of the similarities you see in the breaches and gather information and data . With this information and data you can evaluate  the security systems you have to make sure that they will be able to protect you from the different breaches you may face. I believe that the data can help with testing systems so we can continue to to upgrade our cybersecurity policies.  

Week 4 Journal Entry

Maslow’s Hierarchy of Needs is a theory that breaks down needs that motivate behavior in a five level pyramid. The five levels are Physiological Needs, Safety Needs, Love and Belonging, Esteem Needs, and Self-Actualization. Each level connects with technology in some way. At the Physiological level, access to phones makes it easier to order food or order groceries. It also helps with checking your health with heart rate apps and step tracker apps. For safety needs, technology like cameras and ring doorbells help with safety. At the Love and Belonging level, social media helps people connect with new people and make new friends all around the world. At the Esteem level, social media helps people esteem because people post things for the likes and to get their popularity up. At the Self-Actualization level when people create new digital programs with technology that helps people reach their full potential. 

Week 5 Journal Entry

By reviewing the articles I have came up with this order. First I think money is the number one motive. In this world you need money for everything, financial gain is the number one motive.I believe that revenge is the second ranked motive. When somebody feels they have been done wrong, people will do some wild things. I believe that multiple reasons is the third ranked motive. Sometimes there are multiple things that lead to someone doing something not just one. My fourth ranked motive is Recognition. With how the world is now with social media people seek validation and attention which deals with recognition. My 5th ranked motive is Political. Some people are heavily influenced by beliefs and they can draw people to do things.My 6th ranked motive is Entertainment. People have certain thrills or want to be entertained a certain way which makes them to certain things. My 7th ranked motive is Motive. I believe this is the least likely motive because I don’t believe boredom is as strong of a motive as the others. 

Week 6 Journal Entry

The first example of a fake website example is www.greatcdchaepcom. You can tell the website is fake because there is misspelling in the website name and when there a website is selling cheap things that are already cheap it’s probably fake. The second example of a fake website is www.freeplaystation.com. You can tell this is fake because nobody is selling free Playstation consoles. The third example of a fake website is www.freehealthcaer.com.  You can tell that the website is fake because there is misspelling in the website name and anything dealing with free in a website name is probably fake. The first example of a real website is https://www.nike.com. You can tell the website is real because it has the https and it has the company’s real name is in the website. The second example of a real website is https://www.foodlion.com. You can tell this website is real because there is no misspellings, it has the https, and it has the real store name in the website. The third example of a real website is https://www.finishline.com. You can tell it’s a real website because of the https, it has the company’s name in the website. 

Week 7 Journal Entry

Picture 1 meme- When it says you put in the wrong password again, and you just know
it’s the right password. This meme relates to human centered cybersecurity by
expressing how users feel and how security systems can frustrate.
Picture 2 meme- When you finally set up all your authentication on your computer and
you feel like a pro in cybersecurity. This meme relates to human centered cybersecurity
by focusing on how people feel accomplished when they take positive steps in securing
their account.

Picture 3 meme- When you get an alert that says somebody logged in to your account
but remember it was you on another device. This meme relates to human centered
cybersecurity by showing how people have different reaction and show different emotions.

Week 8 Journal Entry

I believe that media heavily influences how people portray cybersecurity. Some of the movies that are produced that deal with cybersecurity and hackers are heavily exaggerated to put a thought in the viewers mind.If somebody knows nothing about cybersecurity and that’s how there introduced that can influence how they interpret or understand cybersecurity. News outlets and media outlets play a huge role in how cybersecurity is perceived also. Many times news outlets only portray the worst situations of a business getting hacked and not good cybersecurity actions.Social media also plays a huge part because that’s how a-lot of people get their information. When they see something with hackers pop up it will influence how they view cybersecurity.

Week 9 Journal Entry

On the scale test I scored a 1 out of 9. I really don’t have social media issues I have no problem getting off of it. I believe the items in the scale are things people deal with that are addicted to social media. I believe the worst one is Displacement. If you are not going out so you can be on social media that is a very bad sign. I believe there are different patterns found around the world because different cultures view technology and social media different from each other around the world. For example, there might be cultures and groups of people who despise social media while Americans love it. 

Week 10 Journal Entry

This article is talking about social cybersecurity and the evolution of social cybersecurity . Social cybersecurity is security that deals with technology to examine human behavior so they can better understand it. The article talks about how different countries like Russia use social cybersecurity to spread propaganda and to negatively influence not only their countries but other countries around the world. This article emphasizes how it’s important to understand cybersecurity and the threats so you’ll be able to combat them. It’s important for countries to have a strong cybersecurity team and defense because it is a huge emerging threat that can really impact a country. 

Week 11 Journal Entry

I believe there are many social themes that are shown in the video. In the video she talks about salaries and the states that pay the most and reasons why you might live at each one. This is important because is shows how different states have there high’s and lows and how there are different factors that influence the highs and lows. The video also talks about the roles an cybersecurity analyst has at the entry level position. This is important because if we can understand the roles of the job at every position we can strengthen the number of people that could be interested in the job.

Week 12 Journal Entry

The social exchange theory relates with the letter because the customers might not trust the company no more and might not want to interact or use the company any more. I believe the radical choice theory goes with this letter because the customer may think it’s in their best interest to not use the company no more. The marxian theory also goes along with this letter because the customer might feel they are being exploited since their information has been hacked potentially. The conflict theory goes along with the letter because the company is over the customer basically. The letter highlights how customers can get played over and their information can be taken because the company didn’t have enough security. 

Week 13 Journal Entry

In this article the policies are used in many ways that impact the bug bounties. The article talks about how certain companies have polices in place to make sure the people feel safe to report on the bugs they might see in the company. If companies don’t have these policies in place, it’s less likely for researchers and hackers to report on the bugs they see. The article talks about how there are also policies in place that tell the researchers and hackers what they can look into and how much they will get paid for each of the different vulnerabilities they might find. 

Week 14 Journal Entry

The most serious violation to me is collecting information about people younger than 13. This is serious because if you’re doing anything illegal dealing with kids you’re the worst of the worst. The second most serious violation is faking your identity online. This is serious because you can really mess up somebody’s life when you’re doing this and it’s weird. The third most serious violation is bullying and trolling. This is serious because cyberbullying is horrible and it could possibly lead to cyberbullicide. The fourth most serious violation is recording a VolP call without consent. This is serious because they could be saying some very serious and private things on the phone and if you record thats breaking trust and confidentiality. The fifth most serious violation is sharing passwords, addresses, or photos of others. This is serious because you’re putting peoples safety and privacy at risk if you’re sharing things when they don’t want you to.

Week 15 Journal Entry

I find the way he started his career very interesting. It’s cool to see that he started in the accounting field then that led to information technology. He got to digital forensics because of an email he said it was his first time finding his purpose that’s pretty cool to me. I like how he described the evolution of the cameras and the floppy disk. I had know idea the job of a digital forensics investigators and he gave a great description. He really showed the difference in times from then and now with the pictures he presented with his presentation like the old phone. 

Article 1 Review

The first scholarly journal article I have decided to review is titled “ Understanding the Use of
Artificial Intelligence in Cybercrime.” This article relates to the principle of social sciences in many ways.
The principal of social sciences are theories that break down human behavior with different social
structures and how they interact with each other. The main way it does this is by breaking down how
cybercriminals are using ai and are adapting to ai being used in order to benefit themselves. This goes
with the social science theories that deal with human behavior and why people do the things that they do.
In this article the author poses multiple research questions and hypotheses . This article asks the
question why are people attacking the healthcare system. The article hypothesizes that the accessibility of
the healthcare system is the reason people are attacking it. It also poses the question of what we can do to
combat cybercrime that uses ai. It hypothesized that using good cyber practices can combat ai use.In this
article the author used a qualitative research method. There were multiple case studies that allowed the
author to make precise conclusions about cybercrime. The data comes from the case studies. It also uses
interviews that provide professional insight into cybercrime and the use of ai in cybercrime. It also uses
different methods in this article.
I believe that the seven motives described in the powerpoint deal with the article. There are
always reasons for why people do things. I believe that the reasons people are attacking the healthcare
system can be answered by one of the seven motives.
This article relates with the marginalized because the less fortunate may tend to not be as tech
savvy and could be more at risk to cybercrime. They may lack knowledge or the technology to know how
to handle ai in cybercrime. The less fortunate are also not listened to so there opinion on ai is less likely to
be heard.In conclusion, I believe that this article contributes to society because it provides important
information on AI that could affect human’s everyday life. The article also provides solutions and how to
combat AI that can be useful to human’s everyday life.

Article Review 2

Christian Millner November 17,2024
Article Review #2 Cyberbullying in Jordanian
The article I have decided to review is “Cyberbullying and Cyberbullicide Ideation
among Jordanian College Students.” This article focuses on cyberbullying and the
impacts it has on people. The article talks about how cyberbullying can lead to
cyberbullicide. Cyberbullicide is suicide caused by online bullying. The article examines
and does studies on the Jordanian college students to see the impact cyberbullying has
on them.
The article deals with social science theories in many ways. For example, the article
explains how the Anonymity and Deindividuation theory is tied to cybersecurity. This
theory says online anonymity leads to deindividuation and the article suggests that it
leads to cyberbullying because the person loses self-awareness and accountability.
The hypothesis being tested is that cyberbullying leads to strains, which in turn can lead
to cyberbullicide. It is asking the question if the two have correlation. The article also
asks the question and examines the difference between bullying and cyberbullying and
the different effects they have on people.
There are a lot of different methods used to conduct research in this article. They asked
questions to 1000 Jordanian Students about cyberbullying and cyberbullicide to collect
data. They used a quantitative method to collect research in the article. They used
different scales in the article, for example they created a cyber victimization scale.
There article uses the survey method to collect data. The questions they asked were
ranked on different interval levels. The data they collected was analyzed using
“descriptive statistical analysis and logical regression analysis.
The PowerPoints we went over relate to the article in many ways. In the PowerPoints
we learned the different social science theories and what they suggest. In this article
they talk about how the social science theories relate to cybersecurity and
cyberbullicide.
This topic relates to the challenges, concerns, and contributions of marginalized groups
in many ways. The marginalized are more likely to be targeted because they are often
looked down on and people think they can take advantage and make fun of them.
Marginalized people also might not have the resources to seek help if they are impacted
by cyberbullying.
In conclusion, this article effectively examines the impact of cyberbullying and if it leads
to cyberbullicide. The article concludes that the hypothesis is correct cyberbullying leads
to strains, which in turn leads to cyberbullicide. This article impacts society in a positive
way because it may cause people to care more about cyberbullying because it’s a big
issue people go through.

Career Paper