I believe that one of the largest reasons for individuals not reporting cybercrime is the evident lack of prosecution and punishment. This can be directly seen with the enforcement rate of cybercrime. Of the reported cybercrime incidents, it is estimated… Continue Reading →
The first research question that researchers may address is the impact and evolution of social engineering within cybersecurity spaces. With the increase of social engineering, there has been a noticeable shift in the public’s attitude towards unknown numbers, senders, or… Continue Reading →
Reuben Paul has immersed himself fully within the cybersecurity culture by always staying up to date and participating in larger, community events such as conferences. He made the point in multiple ways that you are way more vulnerable than people… Continue Reading →
The human firewall is something that I have heard many times in many different ways. Human firewalls, the education and training of individuals about current cyber threats and ways to not be taken advantage of, are among the most important… Continue Reading →
The two theories that explain cybercrime the most are the Psychodynamic theory and Behavioral Theory. The psychodynamic theory states that early experiences can influence behavior throughout life. These experiences tend to be more jarring or have noticeable long-term effects, such… Continue Reading →
Victim precipitation, which looks at what actions victims took that may have led to their victimization, can be seen in many ways within the cyber world. A victim’s actions of clicking phishing links, visiting unsecured websites, and downloading harmful files,… Continue Reading →
One of the simplest and most effective ways to increase security with the human aspect of organizations is frequent, repeated security training. This can make an impactful difference due to a more cyber-aware workforce being less likely to be susceptible… Continue Reading →
I believe that determinism and computer hacking go hand in hand. Some instances of determinism via hacking are easier to spot than others, such as foreign government(s) attacking their enemy via hacking groups or other means. The reasons for participating… Continue Reading →
Hello, my name is Aria Grant. I am a senior in cybersecurity coursework, and I plan to graduate at the end of the fall 2025 semester. Most of my classes throughout college have been online, as it is my preference…. Continue Reading →
© 2025 CYSE 201S — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑