CYSE 201S

Article Reviews

Article Review One-

The article reviewed covers user location-sharing behavior in the context of mobile apps, which can be seen as a focal point in digital privacy and security. The article highlights the concern of sharing personal information while providing relative statistics, behavioral data, and analysis. This study also relates to the principle of social science because it studies the behaviors and attitudes of smartphone users. As well as psychological factors that influence those users’ decisions regarding user location-sharing. The article also examines user perception of location-sharing and how these perceptions relate to everyday decisions.

The article asks and answers two well-defined research questions that help structure the article’s focus. “What factors best predict users’ app location-sharing behavior for three types of predictor variables?” and “Across the three types of predictor variables above, what combination of factors best predicts users’ app location-sharing behavior?” Question one uses factors such as previously established data and assessment tools to ensure reliability and validity, scraped behavioral data from smartphones, and understanding user intentions vs. what the smartphone recorded, to understand how their location was shared previously. Question two aims to combine the data from these factors to predict users’ location-sharing behaviors.

The research methods used in the study consisted of an Android app that scrapes metadata; users are also asked to grant location-sharing and are administered surveys, all to predict whether or not users would share their location with the app. Factors such as previously established data and assessment tools or “pre-validated self-reported constructs from the literature,” “scraped behavioral data from smartphones,” and “hybrid measures capturing users’ perceptions of their past location-sharing behavior based on the data scraped from their smartphones” are used in predicting whether these users will share their location. 

As for the types of data and analysis done, the research collects behavioral data from smartphones, such as users’ app permissions, and information, such as whether the user has granted location permissions to other smartphone apps they have downloaded. Self-reported data is also gathered in the study; this information is gathered through the surveys conducted through the app and is collected directly from users. Users are asked questions about their attitudes and intentions regarding information-sharing. Users also rate intent to use mobile apps and disclose personal information to said apps on the 5-point Likert scale. This provided data gives vital insight into user beliefs and intentions.

There are many key relations between the PowerPoint and the article about smartphone location-sharing. An example of this is the use of surveys in the study. As discussed in the first PowerPoint, surveys are a common strategy used to study the social dynamics of human behavior. Another example could be Maslow’s hierarchy of needs; Maslow’s theory suggests that individuals must satisfy basic needs before progressing to self-fulfillment needs. This can be seen with the protection of a user’s data. Users should prioritize data protection as a basic need before considering the benefits of sharing location data with apps, which can be seen as a higher need. The article’s informed decision-making process can relate to Maslow’s hierarchy of needs.

While the article does not explicitly focus on marginalized groups, it does relate to their challenges, concerns, and contributions in several ways. Marginalized groups often face significant challenges, such as limited access to resources like education and information about data privacy. The article can inform and highlight how to handle these data privacy concerns. This is crucial in assuring that all demographic groups have the information they need to make informed data privacy decisions.

The critical contribution this study has made to society would be the enhancement of user empowerment. The article’s main idea is to emphasize user control and understanding of location-sharing permissions and their importance. This study should lead users to be informed and make intelligent decisions down the road in terms of user privacy. 

In conclusion, The article “Understanding Smartphone Location Sharing Behavior for Enhanced Digital Privacy” is a beneficial study to the field of cyber security and its relation to social science. The article discusses critical research questions and methods used. It also covers the type of data analyzed and relates to previous studies in course PowerPoints. The article is also useful regarding concerns of marginalized groups’ lack of data privacy education and provides substantial information on the importance of data privacy to all.

Links

https://academic.oup.com/cybersecurity/article/6/1/tyaa014/5910009?searchresult=1

Article Review Two-

Introduction
The article that I have chosen for the review focuses on the study of children’s password
practices, usage of IOT devices, and their knowledge and perception of using passwords.
Most research in cybersecurity is completed on adults; however, children are the ones
that will be depended on in the future. Children are often introduced to technology at
an early age in this new digital era. Therefore, they need to understand the importance
of authentication from a young age. This research provides information on children’s
digital engagement and understanding of early cybersecurity practices. It also explores
the children’s practices, perceptions, and knowledge of passwords and usage of IOT
devices. This research also relates to the principle of social science in terms of child
development, societal impact, and educational psychology.

Research Questions
The research questions focused on in this research article are current usage, password
hygiene, and behaviors by children. In terms of usage, the study asked questions such as
how much a child uses a device, Which devices they use the most, and where they use
it. As for password hygiene, the focus questions are: What is their current knowledge,
why do we use these passwords, and what are children’s perceptions of the use of
passwords? Password behaviors focus on how they create and store their passwords.

Research Methods
The method used to answer this question was surveys; the children were asked to
complete these surveys. Each child was asked questions in regard to their use of IOT
devices, passwords, and password practices. As well as how they felt about passwords
and knowledge about them. Two surveys were used in the research article, one fifteen-
question survey for grades 3-5 and a 16-question survey for grades 6-12. All questions
were multiple choice except for four on each survey, which were short answers. Both
surveys were identical in terms of content; however, the older children gave more
thorough responses as opposed to the younger children giving yes or no responses.

Data and Analysis
The data gathered from the surveys provides students’ responses to the main research
questions asked in the research article. For example, the surveys provide responses
from students regarding their usage of devices. The surveys also provide information on
what students’ current knowledge of passwords is and their perceptions of the use of

of the use of passwords. The data gathered through the surveys are analyzed and used to gather important information and answer essential questions in the research article.

Relation to PowerPoints

The use of surveys in this research article is one example of a concept covered in the PowerPoint in this course. The use of surveys in this research article provided the responses to crucial research questions in the study. Another concept talked about in the PowerPoint was Knowledge and risk. This article explores this idea of knowledge and risk in terms of the children in the survey’s knowledge and practice of passwords. Children may have a small amount of knowledge in terms of the risks of poor passwords, but their behaviors may not always reflect this. This made me think back to the PowerPoint idea of engaging in risky behavior despite understanding the risks.

Marginalized Groups

The article does not mention the concerns and challenges faced by marginalized groups. However, it focuses on the need for age-wide education on cybersecurity for all children. This push for age-wide education in cybersecurity can benefit marginalized groups by ensuring they are also provided with this information.

Contribution to Society

The research found in this article, as well as the push for the need for age-wide education on cybersecurity practices, will benefit society in many ways. The research in this article will provide awareness of the importance of a child’s digital behaviors and show what can be done to protect them and help them understand these concepts. This will allow for the future development of age-wide cybersecurity, which will be beneficial for children now and in their futures.

Conclusion

This study focuses on the study of children’s password -practice, usage of IOT devices, and their knowledge and perception of the use of passwords. The article covers the main research questions of children’s current IOT usage, password hygiene, and password behaviors by children. The research article provides surveys to the children, which are collected and analyzed to provide answers to these research questions. The article also relates to PowerPoint from the course in terms of its use of surveys and relation to knowledge and risk. The topic substantially contributes to marginalized groups and society, showing the importance of having the earth’s future understand the risks and importance of passwords.

Citations

Choong, Y.-Y. (2019a, December 13). “Passwords protect my stuff”—a study of children’s password practices. Academic.oup.com. https://academic.oup.com/cybersecurity/article/5/1/tyz015/5675082?searchresult=1

Journal Entry’s

Journal One-

Q: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

A: After reviewing the NICE Workforce Framework I would say that the two most interesting categories for me are investigate as well as oversee and govern.  Looking more in depth into the investigate category I would say both cyber investigation and digital forensics are speciality areas that interest me. Both involve problem solving abilities, which I believe to be one of my strong suits. Both also implement the goal of solving cybercrimes which brings interest to me. As for Oversee and Govern I would say the specialty area that interests me the most would be cybersecurity management. Similar to the investigate category and the specialty areas I chose, cybersecurity management requires problem solving skills as well as has a high demand and competitive salaries. None of the option really stood out to me in a bad way but if I had to say which was the least interesting after reading id say operate and maintain. 

Journal Two-

Q: Explain how the principles of science relate to cybersecurity.

A: Science is used in many fields, including cybersecurity. Cybersecurity uses science to analyze, understand, and address cybersecurity challenges using certain principles such as relativism, objectivity, parsimony, empiricism, determinism, and ethical neutrality. From a cybersecurity perspective, relativism is the relation between all systems and how a change in one system also affects other systems. Objectivity in the cybersecurity field ensures that cybersecurity research is done without bias and personal opinion. Parsimony is when simple explanations are used in order to ensure others understand the explanation. Empiricism focuses on only studying behavior that is real to the senses as well as only using researched data rather than opinions or assumptions in the cyber security world. Determinism in cyber security is the principle that cyber incidents and behaviors are pre-determined by preceding events. Cyber security experts use information such as previous breaches and information to identify vulnerabilities and understand the goals of the hacker. Ethical neutrality is a factor in cyber security in order to ensure that research is done ethically and respects all individual’s rights and privacy. Examples such as limiting internet access could be used. These principles are all used in the cyber security field in order to promote correct research methods and have ethical considerations in their work.

Journal Three-

Q: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

A: The PrivacyRights.org website has a ton of information regarding data breaches since 2005. Information such as The number of breaches in the USA, number of impacted records, location of breaches, Organization breach numbers, information about specific breaches, and a bunch of other information. This information is beneficial for researchers who are studying breaches because it allows them to use this information and understand a variety of things. Examples of this can be Geographical assessments. Using the geographical information given to users on PrivacyRights.org, researchers can understand what areas are more vulnerable to attacks. The same theory goes for companies; PrivacyRights.org has information that shows the largest number of breach notifications by companies. This information can allow cyber experts to set stronger systems in place for organizations that are more likely to be at risk of threats. PrivacyRights.org also allows users to research specific breaches. This is important information because cyber experts can use information from previous breaches by identifying common vulnerabilities in other breaches and using this information to stay ahead. Overall, there is a lot of important information on PrivacyRights.org that researchers can use to study and gain information on breaches.

Journal Four-

Q: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

A: Each level of Maslow’s Hierarchy of needs can relate to a person’s everyday experiences with technology. An example of physiological needs in relation to technology can be food delivery apps such as DoorDash and Uber Eats. These apps ensure convenient access to food. An example of safety needs in relation to everyday technology could be home security cameras. Technology helps protect people’s homes with cameras, ring doorbells, and electronic locks. As for belongingness and love needs, dating apps such as Tinder can be seen as an opportunity to meet someone. Technology can relate to esteem needs, as well as self-actualization, by having an online following. A popular YouTube channel or social media page can boost confidence and give a feeling of accomplishment. It can also help showcase a person’s creative talents and ultimately achieve their full potential.

Journal Five-

Q: Review the articles linked with each individual motive in the presentation page or Slide #3.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

A:

While none of the motives for people to commit cyber crimes are the correct thing to do, I ranked the seven motives talked about in this order.

1. For Money- None of the seven examples are ethically correct reasons to commit cyber crimes. However, in my rankings, money is the motive that makes the most sense. Money can make many people do many things, both good and bad, especially if a person needs money. Gaining important information can give a person lots of financial access. Therefore, money is the most popular and most “reasonable” motive.

2. Political – While committing cyber crimes to promote a political agenda or social change is not the best idea to get your point of view out there, it is more understandable than the other options on the list. Hacktivism can be seen as a form of nonviolent protest but is still not an ethical way of getting your idea out, no matter the cause. 

3. Recognition- After the first two options, none of the options seem to be a choice that makes sense. However, Based on the options left, I decided to rank recognition as the third choice. Recognition can lead people to commit unethical actions similar to what was talked about for money. Therefore, it is essential to have a balance between ethical actions and recognition.

4. Multiple reasons- Kacy Zurkus’s article covers the main motives for cybercriminals: socioeconomic factors, technical skills, and psychological drives like revenge and ego. While these are multiple motives, things such as socioeconomic factors such as financial difficulties are not ethically correct but are somewhat understandable. In my opinion, ideas such as revenge and ego don’t justify these illegal actions. 

5. Revenge- I ranked revenge 5th because I feel that revenge is always something that could be handled better. The example of revenge porn was extremely explicit and didn’t seem remotely close to a justifiable motive. The reason it is not ranked 6 or 7, however is due to it actually having some kind of personal reasoning behind the action rather than money motive. 

6. Boredom – The article highlights the risks and consequences that are associated with specific online activities and how a person’s boredom leads to these consequences. The article mentions that children often can look for an alternative way to entertain themselves online. However, without proper guidance and supervision, these young children who are handed phones can be exposed to cyberbullying and grooming dangers. 

7. Entertainment- Finally, we have entertainment. I find this motive to make the least sense due to the fact that the data is all publicly accessible in this example of data scraping, and the person is just collecting public information. While the person can sell this information at the end of the end, it is all public information. The idea of committing cyber crimes for entertainment does not seem logical to me and can actually be seen more as a money driven motive in this example.

Journal Six-

Q: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?

A: ABCnews.com.co is an example of a fake version of the actual ABC news website. The website has recently been changed/merged with Hollywood.gazette. The website tries to copy a similar URL link to the ABC website, but it is different. This can often trick users when they quickly click on a link. The website also uses ABC News logos and pictures on the site. AmazonStorePro.com uses similar tactics of having a website URL that can make a user believe it is actually Amazon. The website offers unbeatable deals and has many suspicious prices, which is another clue that it is fraudulent. TiffanyCoshop.com is another example of a fraudulent website trying to be a prominent name-brand website with the use of a similar URL and Website layout. This is the type of website often seen in fishy ads on social media. The actual site name is just Tiffany.com, which can confuse customers since the full name of the company is Tiffany and Co.

Journal Seven-

Q: Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s).

A: 1. For the first meme I used the image of a person typing on the computer. (Image is to large to insert on page)

2. I used this image of the dog on the laptop for my meme. The meme is supposed to represent the dog observing the computer and seeing if the system is pup friendly with the hashtag Pup System Integration instead of human system integration.

3. For the image of the man smiling I used the meme of him being happy with the help of HSI

4. I used the image of the person at the sunset enjoying life thanks to the benefits of HSI.

5. The 5th image is of the mans hand working on the laptop. (THE IMAGE IS TO LARGE TO BE POSTED). He is able to complete his work now thanks to HSI.

6. For the 6th meme I used the image of the woman excited looking at her phone. The caption says “When you realize you data is safe and accessible thanks to Human System Integration!” I thought this was a funny caption that relates well with the image and showcases the benefits HIS can provide users.

7. The person can look at Instagram and relax because there protected by HSI

8. The image is to large. Person can safely access computer thanks to HSI

9. Group of people completing work knowing HSI is easy to use and protecting valuable information.

10. HSI being as helpful as warm clothing in the winter

1.When your computer is safer then Fort Knox

(IMAGE OF PERSON TYPING)
Thanks to HSI!

2. When I see a computer screen

Is it pup friendly also? #PupSystemIntegration

3. When HSI makes Cybersecurity joyful!

4. When Cybersecurity leads to peace of mind #HSI

5. When you can get work done knowing your protected by HSI

(IMAGE OF PERSON ON COMPUTER)

6. When you realize you data is safe and accessible thanks to Human System Integration

7. When you don’t have to worry about your data security #THANKSHSI!

8. When HSI makes using a computer smooth

(IMAGE OF STICK FIGURE ON COMPUTER)

9. When your cyber security team is on point #HSI

10. When HSI makes Cybersecurity just as important as that warm clothing

Journal Eight-

Q: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.

A: Based on the movie/show examples from the YouTube video, media, in terms of movie/show production, portrays cybersecurity reasonably accurately. The examples in the YouTube video seemed fairly accurate based on what the woman was saying; however, it was exaggerated and sped up a fair amount. It made it seem like many things that take time can be done in just a matter of time. As for how the media influences our understanding of cybersecurity as a whole, I would say the media has the ability to exaggerate specific incidents for views and clicks, similar to other instances. However, the media can also help educate and raise awareness for cyber security practices and risks.

Journal Nine-

Q: Complete the Social Media Disorder scaleLinks to an external site..  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world?

A: Three of the nine questions on the Social Media Disorder Scale (SMD Scale) related to me. Questions 4, 5, and 8 are all times that I have used social media in/for those instances. The scale has specific questions that surprised me in a way that I never really thought of using social media for, such as questions 1 and 2. However, I do understand that some people could be more focused on social media than others, for example, a social media influencer. Different patterns are found worldwide for this exact reason: people use social media for different things and reasons. Whether a person uses social media for work or a pastime can differ in how a person reacts to these questions. Factors such as mental health, free time, and work ethic are also crucial in this scale.

Journal Ten-

Q: Read this and write a journal entry summarizing your response to the article on social cybersecurity

 https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site.

A: The article on social cybersecurity was fascinating and showcased the crucial role that social cybersecurity plays in today’s digital age. The article gives insight into the evolution of how traditional warfare has also become an information war. The article provides examples such as Russia’s information war and goes in-depth on the impact this information war has on open societies. Open societies are often vulnerable to social manipulation through technology, often through social media platforms that are privately owned and not directly supervised by the government. The article refers to cognitive hacking, stating, “Social cybersecurity involves humans using technology to “hack” other humans. The targets are humans and the society that binds them.” The article also discusses the impact of bots and AI in social media. Overall, the article provides valuable information regarding the importance of social cybersecurity in this digitalized age. The evolution of traditional warfare into informational warfare is a prime example. Social cybersecurity is a crucial field and demands attention; therefore, it is essential to put policies in place to protect from these threats.

Journal Eleven-

Q: Watch this video,  As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site., think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation.

A: The description of the cyber security analyst job relates to social behaviors in many ways. There has been significant growth in cybersecurity over recent years. The need for cybersecurity analysts is a response to this growth of cybersecurity and the global digitalization of society; this reflects how social life, business and commerce, and many more factors are switching to this online world. The video talks about job location and salaries, which shows how the demand for cyber analysts is nationwide and can reflect a broader social landscape impact in terms of a person’s career choice. The video also talks about the idea of certifications or going to college, depending on your situation. With society recognizing the values and benefits of both college and skill-specific training, this creates a positive narrative around education in cybersecurity due to the many paths that can be taken.

Journal Twelve-

Q: Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

A: The sample breach letter relates to economic and social science theories in many ways. Examples of economic theories are interaction theory and market dynamics. Interaction theory, in this case, is the study of consumer/investor reactions based on decisions made by the organization. How an organization reacts to a breach involves critical decision-making. This late notification can cause customers, consumers, investors, and many others to doubt the organization and its protection services. In this example, market dynamics refers to the reaction of consumers and investors as well; however, in this case, it refers to the effect this reaction has on an organization’s market value. The late notification could cause a poor reputation, leading to a market drop for the organization. Examples of social science theories in the sample breach include social contract theory and routine activities theory. Social contract theory is present in this sample breach because the organization informs its customers of the breach. It can be seen as a form of transparency and contract between the organization and its consumers. Routine activities theory is present because the breach occurred from a third-party company that failed to protect their information and follow cybersecurity routines necessary to protect them and the other organizations.

https://ethicsunwrapped.utexas.edu/glossary/social-contract-theory#:~:text=Social%20contract%20theory%20says%20that,a%20divine%20being%20requires%20it.

Journal Thirteen-

Q: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure.  To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.  The policies relate to economics in that they are based on cost/benefits principles.  Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site.  and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

A: The article covering the research of the bug bounty policy provides lots of information on the dynamics of crowdsourced cybersecurity. The article has many points that show how important non-monetary motivators are for these ethical hackers, which make these bug bounty policies so helpful for companies large and small. The research shows that bug bounty policies are beneficial not only for larger companies but also for smaller ones with fewer resources available. The research also shows the specific variations in vulnerability reports, highlighting the large impact these bug bounty policies are making. Overall, I would say the article gives valuable information and evidence that bug bounty policies are useful and helpful to policymakers and organizations, large and small.

Journal Fourteen-

Q: Andriy Links to an external site.SlynchukLinks to an external site. Links to an external site.has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

A: While all eleven of the things that internet users do that may be illegal are serious violations, I would say the five most serious ones are faking your identity online, bullying and trolling, recording VoIP calls without consent, illegal searches on the internet, and sharing passwords, addresses or photos of others. Faking your identity online is a severe offense and is considered identity fraud therefor, this is one of the most serious out of the bunch, in my opinion. Bullying and trolling can have large effects on a person and is just, in general, a terrible thing to do. It can have serious impacts on a victim’s mental health and life. Recording VoIP calls without consent infringes on a person’s privacy rights and can have many consequences on the person recording even being recorded. Illegal searches on the internet, such as child pornography and dark sites, can lead to many consequences and tracking by law enforcement; therefore, it is not the smartest idea. Sharing passwords, addresses, and photos of others violates their privacy and is not a humanly right thing to do. Posting this information without consent could be seen as a way of enforcing harm onto a person.

Journal Fifteen-

Q: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

A: The career of digital forensics investigator relates to social science in many ways. Digital forensics investigators often must understand human behaviors in there day to day tasks. Understanding human behaviors in digital forensics allows investigators to understand cybercrimes in terms of a individuals motives and intent. Other factors consist of understanding how individuals interact with technology and IOT devices. Individual interactions with communication systems and social media are examples. The speakers pathway to his career was interesting, him started as an accountant and getting involved in the cyber security field was a interesting change. This later allowed him to work for a large accounting firm which seemed to be a large benefit.

Career Paper-

Bobby Esfandiari
Professor Yalpi

December 3, 2023

Cybersecurity Investigator

The cybersecurity industry has continued to grow at a rapid rate, and with this growth comes more job opportunities in the cyber field. The specific career I will be covering in this paper is the career of a Cybercrime investigator. Cybercrime investigators are heavily depended on in the industry. Cybercrime investigators, similar to law enforcement investigators, focus on the investigation of crimes; however, cybercrime investigators focus on cyber/internet crimes. Cybercrime investigators work on crimes ranging from recovering file systems from hacked computers to investigating minor-related crimes. (Cybersecurity Guide) “The work of a cybercrime investigator focuses on gathering evidence from digital systems that can be used in the prosecution of internet-based, or cyberspace, criminal activity.” (Cybersecurity Guide) Cybercrime investigators also often rely on strong technical skills. This paper explores how cybercrime investigators rely on and use social science principles and research methods in their everyday routine. 

Objectivity

As discussed at the beginning of the course, the concept of objectivity emphasizes studying topics in a value-free manner rather than promoting an opinion or point of view on something. A cybercrime investigator has the overall goal of investigating and gathering evidence on cybercrimes. Objectivity can be seen every day in a cybercrime investigator’s workplace. This is due to the goal of obtaining and advancing knowledge about cybercrime in an opinion-free manner. This ensures solid evidence and information. Examples of objectivity in a cybercrime investigator’s everyday routine can be seen in instances such as the investigation itself. They ensure that actions taken are not swayed by opinion but by factual evidence, for instance. 

Victim Precipitation

The concepts of Victim Precipitation and individual motives are two key factors in a cybercrime investigator’s everyday routine. Understanding what makes a person objective to cyber victimization is information that cybersecurity professionals across the industry use daily. As discussed in the course, victim precipitation is the concept of individuals contributing to their own victimization. For example, if a woman decides to walk in a bad part of town in designer clothes with money showing. This is also a factor in cybercrimes. Cybercrime investigators can understand human intentions and factors from victim precipitation cases to understand common themes and individual motives that take place. Cybercrime investigators can also implement training to educate users on what causes this cybercrime and how to prevent it. 

Individual Motives

Individual motives are another vital topic talked about in the course modules. Understanding victim and criminal behaviors is crucial in a cybercrime investigator’s career. Motives such as revenge, money, and recognition are all key individual motives discussed in the course. For a cybercrime investigator to be able to get as much information about a case as possible, they are required to get information about the criminal as well as the victim. This information can be helpful in many ways, such as understanding the fundamental causes of cybercrimes. Therefore, understanding concepts such as an individual’s motives is critical information in a cybercrime investigator’s job.

Research Methods

Social science research methods such as surveys, experiments, archival research, and field studies are heavily used in a cybercrime investigator’s everyday work. According to the U.S. Department of Justice, the methodology of computer crime investigation is to have an “initial investigation, investigation planning, information gathering and analysis, interviewing and interrogation, technical data systems review, forensic investigation, and case presentation in court.” As seen, multiple steps go into a cybercrime investigation. Ensuring that many methods are used ensures more substantial evidence and information. Factors such as information gathering and interrogations can allow investigators to gain much-needed psychological and case-based information from a criminal or victim. The use of research methods is a crucial way of gaining this information. These methods provide the investigators with tools that help them understand the motives and behaviors of criminals and victims. This then helps them create or put together patterns and profiles of people, which helps investigators conclude cases and prevent future cybercrimes.

Effects on Marginalized groups and society

A cybercrime investigator’s work not only ensures the security of digital assets but also plays a significant role in the lives of marginalized groups and even society. Examples of ways that cybercrime investigators’ jobs affect marginalized groups and society are the cases and crimes in which they work on a daily basis. Cybercrime investigators may be assigned to work on certain cybercrimes; however, this contribution is crucial towards overall internet protection around the world. Cybercrime investigators often work on cases such as financial crimes or identity theft for example. Marginalized communities can often be the main targets of these cyber threats; cybercrime investigators work on a daily basis to detect and respond to these crimes in order to safeguard these people’s information. Other examples of cybercrime investigators’ effects on society and marginalized groups are their contributions to cybersecurity education. Cybercrime investigators and cybersecurity industry professionals are known to offer and spread their knowledge in education programs worldwide. These programs offer training, awareness, and response tactics to everyday individuals, including marginalized groups. This is extremely important for marginalized communities because they are often not informed about these online threats but are getting the education they need and deserve. According to cyber degrees, “gender, racial and ethnic minorities remain underrepresented in this field.” Therefore, getting more people involved in the cyber industry is crucial for its strong growth. 

Conclusion

A cybercrime investigator’s job is closely related to social science principles and social science research methods. Cybercrime investigators use social principles such as objectivity. Concepts such as victim precipitation and individual motives and research methods such as surveys, experiments, and archival research in order to gain as much information as possible about cybercrimes. Using these principles and research methods allows cybercrime investigators to understand and respond to these digital crimes. This allows cybercrime investigators to keep our digital world safe while also supporting marginalized groups and society with education programs and digital protection. Therefore, the use of social science principles and research methods is necessary for the career success of a cybercrime investigator.

Citations

Bowcut, Steven. “Crack the Case: Your Path to Becoming a Cybercrime Investigator.” Cybersecurity Guide, 23 Oct. 2023, https://cybersecurityguide.org/careers/cyber-crime-investigator/#what Accessed 1 Dec. 2023

Moore, Michelle. “How to Become a Cybercrime Investigator [+ Salary & Career Guide].” University of San Diego Online Degrees, 18 Apr. 2023, https://onlinedegrees.sandiego.edu/cyber-crime-investigator-career/ Accessed 1 Dec. 2023.

Schabeck , T A. “Methodology of Computer Crime Investigation.” METHODOLOGY OF COMPUTER CRIME INVESTIGATION | Office of Justice Programs, https://www.ojp.gov/ncjrs/virtual-library/abstracts/methodology-computer-crime-investigation#:~:text=THE%20COMPUTER%20CRIME%20INVESTIGATIVE%20METHODS,AND%20CASE%20PRESENTATION%20IN%20COURT. Accessed 1 Dec. 2023.

Simmons, Liz. “Cybersecurity Resources and Organizations for Underrepresented Populations.” Explore Cybersecurity Degrees and Careers | CyberDegrees.Org, 3 Nov. 2023, https://www.cyberdegrees.org/resources/cybersecurity-resources-for-underrepresented-populations/ Accessed 1 Dec. 2023.