Reflection Paper

Introduction

This reflective essay examines the development of my interdisciplinary skills. It evaluates how those experiences have prepared me for a future in cybersecurity and supply chain-related professions using a selection of artifacts from my ePortfolio. I look at specific artifacts such as class projects, journal entries, code samples, and internship comments to show how my education aligned with technical abilities, social science reasoning, and professional communication. By tying the lessons obtained during artifact production to scholarship in criminology, cybersecurity, and interdisciplinary research, I clearly connect classroom theory, methodological practice, and workforce-ready outcomes.

Technical Foundations: Network Analysis, Scripting, and Tools

Artifact: Kali Linux exercises, Wireshark traffic-tracing logs, Java scripting samples, and the ATM project.

These artifacts show my growing competence with practical cybersecurity tools and programming fundamentals. The layered technical knowledge required to set up Kali and use Wireshark includes packet analysis, network stack concepts, and protocol behavior. Using Java to script automatic tasks taught me how to address problems in a modular, reproducible way. The ATM project combined embedded-systems thinking with security testing; interactions between the building and testing revealed secure coding methods and threat-model thinking. The iterative debugging cycles for these artifacts provided me with training in diagnostic thinking, a transferable professional ability required for incident response positions and security operations center procedures.

Human-Centered Cybersecurity: CYSE 201 Journal Entries and Article Reviews

Artifact: CYSE 201 journal entries, article reviews (e.g., “The Social Impact of Cybercrimes”), and the career paper on the role of social science in cybersecurity.

These pieces show how I integrated technological expertise with perspectives from social science. Writing article evaluations required framing cyber incidents as socio-technical events and analyzing how regulatory regimes, user behavior, and institutional incentives affect susceptibility and reaction. The diary entries show how I use criminological frameworks to analyze attacker motive and policy consequences. This human-centered approach supports research that emphasizes the significance of tackling cybersecurity concerns as socio-technical rather than just technical. It also helps me develop strategies that take human behavior into account and better explain risk to stakeholders who are not technical. Ethics, Policy, and Interdisciplinary Reasoning

Artifact: Law & Ethics course reflections, IDS300W term paper, and Tech & Society assignments.

These artifacts forced explicit ethical reasoning about monitoring, privacy, and proper defense strategies. The IDS300W work sharpened my academic writing and synthesis skills by challenging me to combine technical limitations, philosophical arguments, and legal concepts into cogent policy suggestions. The cross-cutting nature of these assignments taught me how to gather information from other domains and justify trade-offs, which is a skill that companies value when balancing security, usability, and compliance in real-world systems. Professional Practice: Internship and Career-Focused Materials

Artifact: Résumé and career paper.

With an emphasis on quantifiable effects (such as decreased mean-time-to-detect or enhanced patching workflows), the resume and career paper convert technical assets into value propositions for employers. Through contextualized problem solving, professional communication, and the ability to translate technical results into useful business advice, this artifact set exemplifies career preparedness.

Lessons Learned from Artifact Creation

  • It’s critical to have replicable workflows. Because the first scripting and packet-capture activities were delicate, I learned how to annotate captures, version-control scripts, and document methods so that others can reproduce and validate findings. This method not only improved the quality of the artifacts but also established a standard for documentation that professional teams must adhere to.
  • Interdisciplinary framing deepens analysis. Article reviews and journal posts that integrated technical case studies with criminological theory frequently yielded richer explanations of attacker behavior and modes of system failure. I was able to offer solutions that consider institutional constraints and user incentives in addition to technological issues by integrating social science theories.
  • Ethical reflection changes design choices. According to Law & Ethics assignments, certain technically sound defenses conflict with privacy or legal requirements. During the process of resolving these disputes, I developed the ability to build mitigations that are both technically and morally sound—a talent required for roles affecting corporate governance and policy.
  • Communicating with different audiences is a professional talent. Converting lab results into executive summaries for internship briefings required a succinct synthesis, ranking suggestions, and translating scientific metrics into business impact. The career-focused artifacts show how my ability to communicate with peers in the technical field, managers, and nontechnical clients has improved.

Interdisciplinarity in Practice: How Disciplines Contributed Distinct Skills

  • Formal models, algorithms, and tool proficiency were supplied by computer science and engineering. These fields serve as the foundation for the networking and scripting artifacts, which show the technical foundation required for cybersecurity positions.
  • Sociology and criminology have provided frameworks for analyzing the social contexts, group dynamics, and motivations behind cybercrime. Richer threat models and prioritized mitigations that take attacker incentives into account were generated by journal entries that applied criminological typologies.
  • Law and Ethics: Provided frameworks for compliance and normative restrictions. Law and ethics assignments taught me how to create recommendations that adhere to ethical standards and legal thresholds, as well as exposed regulatory boundaries that shaped appropriate defensive stances.
  • Communication and Professional Writing: IDS300W and internship documentation sharpened the professional formatting, evidence-based reasoning, and rhetorical clarity that employers look for in tickets, reports, and compliance documentation.
  • Views from the Business and Supply Chain: I was able to place cybersecurity decisions within larger operational and economic contexts thanks to supply chain coursework and project thinking, which introduced me to risk assessment, vendor management, and resilience planning skills pertinent to cyber risk in interconnected systems.
  • When combined, these fields created a practitioner with the interdisciplinary agility needed for contemporary cybersecurity roles: the ability to reason across technical, social, and legal boundaries.

Integrating Scholarly Literature with My Learning

  • Applied socio-technical lens: My article reviews and CYSE 201 reflections highlight the socio-technical nature of cybersecurity issues and the necessity of mixed-methods approaches by combining quantitative traffic data with qualitative social analysis to propose comprehensive mitigations. This is in line with recent interdisciplinary scholarship.
  • Workforce frameworks and competencies: Through contemplative career planning and documented practical efforts, my internship and career artifacts demonstrate congruence with those workforce expectations. Professional frameworks like NICE place a strong emphasis on technical proficiency in addition to analytical and communication abilities.
  • Evidence-based intervention design: Studies on behavioral cybersecurity interventions promote the creation of protections that account for human error and incentives. My lab work produced intervention recommendations (e.g., friction-reducing secure procedures, default-deny setups) that were tested in simulated environments and, based on that literature, in addition to social science comments.
  • Ethical governance and policy studies: My Law & Ethics comments and the language I used while recommending monitoring for intrusion detection systems rather than privacy-preserving choices were influenced by research on privacy, surveillance, and legal limits.
  • My use of version-controlled scripts, annotated captures, and standardized reporting reflects best practices recommended in the literature and increases the credibility of my technical artifacts for prospective employers and collaborators. Technical validation and reproducibility: Computer science research methods place a strong emphasis on reproducible experiments and open artifacts.
  • These obvious connections show how academic sources influenced the production of artifacts, guided my analysis, and provided models for portfolio pieces.

How Artifacts Demonstrate Career Readiness

  • Measurable technical competency: Using Wireshark traces, Kali setup logs, and scripting examples, hiring managers can confirm candidates’ practical tool proficiency and troubleshooting abilities during technical interviews.
  • Communication and translation: My ability to translate complex technical results into understandable written outputs and useful business recommendations is demonstrated in my IDS300W essays and internship briefings. This ability is frequently required for entry-level analyst roles.
  • Ethical and policy literacy: Law & Ethics assignments and career papers show that students are prepared to navigate regulatory settings and create persuasive arguments, which is essential for companies that are under compliance pressure.
  • One skill that is increasingly in demand in cyber risk and resilience roles is the ability to pull from several disciplines to provide prioritized, context-aware solutions. The combination of technical incident analysis with criminological analysis in journal entries serves as evidence of this.
  • Professional habits: Documentation, repeatability, and reflection that are evident across artifacts are mature professional practices that reduce onboarding friction and increase instant effect in work situations.

Conclusion

Together, the works in my portfolio show my rising professional maturity, meticulous multidisciplinary integration, and rigorous technical growth. Coursework in networking, programming, social science, law, and ethics combined to produce tangible results that show off both my technological expertise and my contextual knowledge of cybersecurity challenges. Establishing my reflections in academic literature and classroom contexts improved the quality of my work and its employability. Once I start working, these multidisciplinary, replicable, and recorded artifacts will show that I can make a substantial contribution to cybersecurity teams and address difficult problems with both technical rigor and social awareness.

Leave a Reply

Your email address will not be published. Required fields are marked *