Reflection Paper

Introduction This reflective essay examines the development of my interdisciplinary skills. It evaluates how those experiences have prepared me for a future in cybersecurity and supply chain-related professions using a selection of artifacts from my ePortfolio. I look at specific artifacts such as class projects, journal entries, code samples, and internship comments to show how…

Digital Forensics Relating to Social Sciences

I became aware of the close ties between the social sciences and the work of a digital forensics investigator after watching Davin Teo’s TEDx lecture on the subject. Understanding human behavior, motivations, and social patterns is at the heart of digital forensics, which goes beyond technical proficiency or computer expertise. In order to anticipate behavior,…

Article Review #1: [“The Social Impact of Cybercrimes: Unveiling the Threats of Data Breachesand Cyberbullying”]

Date: February 17, 2025Old Dominion University Azariah Pugh01247624 Introduction The impact of cybercrimes like data breaches and cyberbullying on society is examined in thisarticle from the International Journal of Cyber Criminology, with a focus on how they affectmarginalized groups. In addition to providing insights for prevention, victim care, and policyeducation, it explores how these issues…

The Role of Social Science in Cybersecurity Analysis

Azariah Pugh April 17, 2025 01247624 Introduction Social science is crucial to cybersecurity analysis because it sheds light on moral judgment and human behavior. To foresee security threats and create inclusive policies, cybersecurity analysts consult psychology and sociology. Ethical frameworks encourage responsible behavior by assisting in striking a balance between privacy and security.Social science research…

Article Review #2: Cybercrime and Society – A Multidisciplinary Exploration

Date: April 8, 2025 Azariah Pugh Old Dominion University 01247624 Introduction Diverse viewpoints can be obtained by promoting cooperative conversations. For instance, one group may investigate how financial incentives, such as tax breaks, encourage improved cybersecurity procedures, while another looks at the financial consequences of cyberattacks, such as the expenses associated with data vulnerabilities. Government…

The Ethical and Social Dimensions of Cybersecurity Violations

Andriy Slynchuk lists eleven illegal behaviors that Internet users might unintentionally engage in. The top five infractions among these are Searching for illegal or incriminating content can jeopardize one’s privacy and result in serious legal repercussions. Because it can help commit other crimes and is frequently monitored by law enforcement, this offense is serious. Without…

Bug Bounty Policies

Literature Review The idea of bug bounty programs is examined in the essay, with a focus on their value as affordable ways to find weaknesses in business systems. It draws attention to the ways in which these initiatives take advantage of the gig economy and invite ethical hackers to use their expertise in penetration testing…

How different Economic and Pyschological theories relate to a scenario

Economics Theories Theory of Signaling In order to lessen information asymmetry, this idea describes how one party communicates with another. Customers receive the breach notification letter as a statement of the company’s accountability and openness. The company hopes to reassure customers and uphold trust by disclosing the breach and providing safeguards, which is essential for…

Cybersecurity analyst job relations to social behaviors

To properly defend firms, cybersecurity analysts must not only have technological skills but also be well-versed in social dynamics. Analysts must frequently convey complicated security issues in understandable terms to persons at all levels of an organization, therefore good communication skills are required. Collaboration is an important social characteristic in this environment, as analysts work…

My input on Social Cybersecurity

Today, I read an article about the emerging topic of social cybersecurity, which is becoming increasingly important in national security. The essay focuses on how technology, particularly social media, has transformed the battlefield. It presents the concept of social cybersecurity, which expands on traditional cybersecurity by concentrating on how technology can be used to affect…