Journal Entry: Digital Forensics: An Unexpected Intersection Today, I watched a TEDxHongKongSalon talk led by Davin Teo that attempted to uncover the murky world of digital forensics. The fact that he defied the odds and still climbed up the tower was something that I found most impressive. A student like Teo would naturally be drawn by the urge of law enforcement like other forensic investigators. On his confession, he was an industrial accountant who accidentally jumped into the domain of IT. This very desire influenced the hypothesis that I had been in the digital forensics field, which...
Read MoreAndriy Slynchuk’s Review and Discussion Bridgette Chapman 4/7/2024 Andriy Slynchuk’s Review and Discussion Andriy Slynchuk’s article on the digital rights issue is clearly a reminder of people’s role in the digital environment. Slynchuk, however, broke down the most common online activities, making the audience realize that they may not be aware of the legal consequences or the consequences that they may face. As exemplified in one of the sections, for example, where copyrighted content may be streamed and personal information can be shared without consent, there is...
Read MoreCybersecurity and Social Science Career Paper Bridgette Chapman 4/7/2024 Cybersecurity and Social Science Chief Information Security Officers (CISOs) act as the frontline of the defense against a wide range of digital issues, such as cyber incidents and human mistakes. Technical skills, however, continue to be relevant as cyber risks are intrinsically complex and call for a human understanding of behavior, market environment, and societal implications (Payne & Hadzhimova, 2020). In this regard, social science research and principles are the key instruments that inform the...
Read MoreThe article “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties” is aimed at analyzing bug bounty programs, a cyber security service that benefits ethical hackers in corporate cyber infrastructure by letting them identify weaknesses. The survey with a large-scale data set brings in sensational clues around the economics of bug bounty (Sridhar & Ng, 2021). This is especially highlighted by the fact that it demonstrates how the cancellation-unifying price sensitivity of vulnerability searchers is trading in an environment insensitive to...
Read MoreIn the example given for a data breach notification letter, two economic theories that are relevant include “Tragedy of the Commons” and “cost-benefit analysis.” The tragedy of the commons refers to the consequences that arise when individual incentives drive the misuse or exploitation of shared resources. It underscores the danger of data privacy concerns, as individuals are encouraged to put their own needs above others (Stein, 2022). Cost-benefit analyses are valuable to assess the monetary impacts and the financial decisions related to security measures. From an...
Read MoreSocial Science Article #2 Bridgette Chapman ODU CYSE201S 3/21/2024 Article Review#2 Title: Cybersecurity When Working from Home During COVID-19: Considering the Human Factors. Authors: Whitty, Moustafa, & Marthie Grobler. Source: Journal of Cybersecurity, 10(1). Relation to the Social Sciences The topic of the study relates to the social sciences, as it focused on the human-related side of cyber security. It examined how personal behavior, psychological conditions, and social environments influence cybersecurity, which is at the center of such fields as psychology,...
Read MoreAn Emerging National Security Requirement The article by (Beskow & Carley, 2019) underscores the necessity for military leaders and policymakers to have a comprehension of the dynamics of social interactions, which play a role in cyber security. It explains misinformation campaigns, cyber influence, and the influence of social media platforms and how they can have a severe impact on national security. Beskow and Carley emphasized the role of network science in spotting the intricate features of online communication and demonstrated ways actors can use narrative and network manipulations...
Read MoreJournal #11 In Nicole Enesse’s talk on the cybersecurity analyst role, some social themes stand out. The presentation highlights the role of accessibility and inclusion in cybersecurity, noting that if you have appropriate training and certificate programs, even those without a traditional STEM degree can venture into and get ahead in the cybersecurity field. The other theme concerned here is economic mobility, as cybersecurity-related jobs tend to be the highest-paying and could drastically change one’s lifestyle, especially in high-paying cities. Additionally, it talks about the...
Read MoreI scored five out of the nine in the Tobi-Goldfus-Social-Media-Disorder-Scale. The items in the scale are designed to evaluate distinct dimensions of social media usage that may affect the individual’s way of thinking, like taking care of oneself, tolerance, and withdrawal. Such demands are close, but so are those for other behavioral addictions, which suggest the gravity of extensive social media use. Ethnic groups may show different typing because of the use of various information technologies, access to different technologies, and diverse social patterns, including the use of...
Read MoreHow the Media Influences our Understanding About Cybersecurity The media shapes public perceptions and understandings about various subject matters, including cybersecurity. However, it is worth noting that movies often distort reality, leading to stereotypical portrayals of hackers and inviting misconceptions and misunderstandings surrounding the topic. Having a deep understanding of the serious ethical and legal implications of hacking can help people seek out accurate information and draw logical conclusions on matters regarding cybersecurity. To begin with, it is well established that...
Read More