Those working as an information security analyst greatly depend on social science research as well as social science principles. According to the Cybersecurity and Infrastructure Security Agency, this career “is responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security” (CISA) This job role relies on having a social…
Author: cflow001
Article Review #2
Ugochukwu Etudo, Christopher Whyte, Victoria Yoon, Niam Yaraghi, From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations, Journal of Cybersecurity, Volume 9, Issue 1, 2023, tyad016, https://doi.org/10.1093/cybsec/tyad016 This article evaluates the effectiveness of fabricated manipulation versus factual manipulation when it comes to using the cyber world to influence political campaigns. Their hypothesis was…
Article Review #1
Hasbullah, M. A. (2022). Identifying the effects of cybercrime on business laws: Implications for businesses and consumers. International Journal of Cyber Criminology. https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/112 This article evaluates how Indonesia’s business law are impacted by cyber crime and how businesses are affected by cyber threats that are rapidly becoming more common and dangerous. This particular topic relates…
Journal 14
https://clario.co/blog/illegal-things-you-do-online/ In Andriy Slynchuk’s article outlines 11 different things that are illegal to do on the internet. Many are seemingly innocent but can cause a lot of problems for you or even get you sued or arrested. There were 5 that stood out to me as being the most serious violations. Primarily, illegal searches on…
Journal 13
https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true Bug Bounties are a very useful system. I found the article very interesting as it explained the process and many benefits of bug bounty policies. They were able to determine that all companies, regardless of their size, benefited from using bug bounties. They also were able to detect vulnerabilities within each company’s cyber infrastructure….
Journal 12
https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf The attached sample of a data breach notification involves multiple economic theories as well as social science theories. The rational choice theory relates to this sample letter because it explains how businesses and individuals with act in their own best interest. This applies to the sample letter because they explain that the company that…
Journal 11
A cybersecurity analyst job involves many social aspects. Many of the job responsibilities revolve around proactively protecting information systems and ensuring the individuals that have direct access to that information are well informed of the potential risks and ways to protect themselves and the data they handle on a daily basis. Cybersecurity analysts need to…
Journal 10
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ This article outlines the importance and necessity of the social sciences in regard to cybersecurity. It is critical for us to approach cybersecurity with both sociological and technological factors in mind. The article states that internal threats are any country’s strategic weakness. Because of this, it is essential to our safety and the security…
Journal 9
When I completed the Social Media Disorder scale I found that I scored really low. I don’t use social media very much and even when I do, it is not something that I am always thinking about. I think a lot of the questions were interesting because even though I don’t have a problem with…
Journal 8
I think the media influences our understanding of cybersecurity is a significant way. There are many movies and TV shows about hacking. Many of these are very accurate, while others are not. I think it is good for people to be made aware that different types of hacks and breaches exist and could be the…