ODU Logo

CYSE201S

Arvin Thornton

Why do you think individuals don’t report cybercrime victimization?

Many individuals do not report cybercrime victimization for several reasons, often tied to fear, embarrassment, or lack of trust in the system. One major reason is shame or self-blame, victims may feel embarrassed for falling for scams such as phishing,… Continue Reading →

What does economics have to do with cybersecurity?

Economics and cybersecurity are deeply intertwined because both involve the management of limited resources to minimize risks and maximize value. Cybersecurity decisions often depend on economic principles such as cost-benefit analysis, opportunity cost, and risk management. Organizations must weigh the… Continue Reading →

Career Paper

Introduction Cybersecurity analysts play a critical role in protecting organizations from cyber threats, including phishing attacks, ransomware, and data breaches. While the technical aspects of the job are often emphasized, social science research is equally essential. Understanding human behavior, cultural… Continue Reading →

Two research questions that researchers might address related to the social aspects of cybersecurity 

1) How do social engineering techniques exploit human psychology to facilitate cyberattacks? This question focuses on understanding how hackers and cybercriminals take advantage of human behavior rather than purely technical weaknesses. Social engineering relies heavily on trust, fear, or curiosity…. Continue Reading →

12-year-old Hacker and Cyber Security Expert

Reuben Paul demonstrates how everyday devices and public Wi-Fi can be exploited. In the video, he hacks a reporter’s Twitter via a fake hotspot and even transforms a bluetooth toy into a listening device. This shows how deeply he’s embedded… Continue Reading →

Article 2 Review

The article “Cybercrime Risks in Cross-Border Investment Contracts” by Hamza E. Albaheth explores the intersection of technology, law, and economics within the globalized digital economy. This topic directly relates to social science principles because it examines how human institutions, law, business, and… Continue Reading →

Human Firewall

I found the concept of the “human firewall” to be both fascinating and essential in understanding modern cybersecurity. Rob May emphasizes that the biggest risk in cybersecurity isn’t the technology, it’s the human factor. Despite all the firewalls, encryption, and… Continue Reading →

Theories That Best Explain Cybercrime

When it comes to explaining cybercrime, I believe cognitive theories provide the strongest framework. Unlike traditional crimes, cybercrime is often detached from immediate physical harm, which makes offenders more likely to justify or rationalize their behavior. Cognitive theories emphasize how… Continue Reading →

Article 1 review

The article “Controlling Cyber Crime through Information Security Compliance Behavior: Role of Cybersecurity Awareness, Organizational Culture, and Employee Involvement” by Ghaleb et al. examines how human and organizational factors influence compliance with cybersecurity practices. Rather than focusing solely on technical… Continue Reading →

“Apply the phrase victim precipitation to cyber victimization”

Victim precipitation refers to the idea that some victims may, through their behavior, choices, or vulnerabilities, in part contribute to their own victimization. This is not about blaming victims, but analyzing risk factors. In the cyber realm, this theory helps explain how… Continue Reading →

« Older posts

© 2026 CYSE201S — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑