Week 15 – Journal Entry 15 Week 13 – Journal Entry 14 Week 12 – Journal Entry 13 Week 12 – Journal Entry 12 Week 11 – Journal Entry 11 Week 11 – Journal Entry 10 Week 8 – Journal… Continue Reading →
Article Review #1: Cyberbullying on Social Media: Definitions, Prevalence, and Impact on Marginalized Groups Article Review #2: Cybersecurity Literacy Programs for Marginalized Communities: Bridging the Gap in Digital Security
How Social Science Shapes Security Engineering in Cybersecurity IntroductionCybersecurity may seem like a field driven solely by technical expertise, butprofessionals in this space increasingly rely on social science to do their jobs effectively.Security engineers, in particular, work at the intersection… Continue Reading →
Listening to the speaker’s story, I realized how much digital forensics overlaps with social sciences. His work isn’t just about technical skills; it’s about understanding human behavior, motivations, and social environments to track actions like fraud, threats, and misconduct. His… Continue Reading →
The five most serious online violations are illegal streaming, torrenting copyrighted content, doxxing, cyberbullying, and conducting illegal searches. These aren’t just minor slip-ups; they can lead to real legal trouble and cause serious harm. Streaming and torrenting violate copyright laws… Continue Reading →
The article offers a clear analysis of bug bounty programs and their role in cybersecurity policy, especially through the lens of economic cost-benefit principles. In the literature review, the authors explain that these programs allow federal agencies to invite ethical… Continue Reading →
The “Sample Data Breach Notification” letter from Glasswasherparts.com can be understood through both economic and social science perspectives. Economically, the theory of information asymmetry applies. The company had knowledge of the data breach well before customers were informed, creating an… Continue Reading →
Mahad AhmadMarch 30, 2025IntroductionThe digital divide has long been recognized as a barrier to equitable access to technology.The article Cybersecurity Literacy Programs for Marginalized Communities: Bridging theGap in Digital Security examines how marginalized communities are more vulnerable tocyber threats due… Continue Reading →
In the presentation, the role of a cybersecurity analyst highlights various social behaviors such as teamwork, adaptability, and problem-solving within a high-demand, fast-paced environment. The job requires constant communication and collaboration with others, whether responding to phishing attacks, training employees,… Continue Reading →
The article on social cybersecurity underscores the rising importance of understanding the role of social dynamics in cybersecurity, especially in terms of manipulating public opinion through digital means. It argues that cyber threats are not only technical but also social,… Continue Reading →
© 2025 mahad — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑