The Role of Social Science Principles in the Information Security Field.  

Casey Jones CYSE 201S  Old Dominion University  October 24, 2026   Professionals within the Information Security Industry including penetration testers, ethical or white hat hackers, infosec analysts, and others involved in protecting technology while administering services, would benefit greatly from understanding the psychology of the adversaries who would threaten those vary systems. “To know your enemy,…

Client-Side Scanning and the Infringement of Privacy it causes

Once limited to military and intelligence agencies, cryptographic tools became widely available with the invention of the PC around the turn of the 20th century, providing a means for users to encrypt and secure their private data and communications. This was met with intense resistance from Law Enforcement officials who believed it served to hinder…

Response to Human Firewall – TED Talks

After watching Rob May’s talk on the Human Firewall, I felt several topics he discussed resonated with core values and thoughts I have had before. It is quite intimidating when a stranger confronts you in public with information about you that is factually accurate. It immediately invokes a heightened sense of alertness and represents what…

Key points in developing an information systems security policy

When developing an information security system policy to protect digital infrastructure within an entity, several key points must be addressed to form a solid framework that can be built upon and expanded as needed to address future threats and changing technologies. The document should clearly define the information security objectives, scope of technology the policy…

A review of Cyberattacks, Cyber Threats, and Attitude Towards Cybersecurity Policy.

Public and legislative demand for stronger cybersecurity policies have become increasingly heard, especially after some high–profile events such as the Colonial Pipeline and SolarWinds breaches in 2021 (Snider et al. 2021). These breaches were believed to have been possible due to a lack of information availability from the government to cybersecurity professionals managing critical infrastructure,…

The Equifax data breach of 2017 

Casey Jones, Old Dominion University  September 3, 2025  The Equifax data breach of 2017 is significant due to the large amount of people affected by the illegal heist which secretly stole their sensitive personal and financial information over the course of several months before it was discovered in late July of 2017.  This attack was…

Analysis of the social meaning and impactof cybersecurity systems

Before considering how cybersecurity systems bring meaning to our social interactionsand their value within technological environments, it would first be valuable to discuss some oftheir guiding principles to better attain an understanding of them. The CIA Triad lays some ofthe groundwork for a foundational understanding of cybersecurity professionals and their goals.Cybersecurity principles also play a…

Criminological analysis of Blue Streak 

Miles Logan, a skilled jewel thief who stashed his diamond in the air ducts of a building under construction which would later become a police station, served time behind bars for his thievery. Though Blue Streak (1999) is an action– comedy movie, it can be examined through a criminological lens to gain insight into the…

The attack coming to eat Availability – Ransomware 

Ransomware has teeth, and in the evolving landscape of cyber-security, few attacks pose as serious a threat to availability as Ransomware. A form of malware that is specifically designed to disrupt, damage, or obtain unauthorized access, ransomware is a type of software that directly attacks an organization’s ability to operate. Attackers utilizing this method don’t…

Future policy with the short arm of Predictive Knowledge 

Han’s Jonas paper, “Technology and Responsibility” is a call to action for the reader to reassess ethical considerations given how far reaching, permanent, and the scale of modern human actions. His metaphor on the short arm of tech reminds us to consider the potential long-term consequences of our actions as technology continues to race forward….