{"id":304,"date":"2025-09-13T14:05:51","date_gmt":"2025-09-13T14:05:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/coreyg\/?page_id=304"},"modified":"2025-12-04T19:25:46","modified_gmt":"2025-12-04T19:25:46","slug":"cyse201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/coreyg\/cyse201s\/","title":{"rendered":"CYSE201S"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"http:\/\/sites.wp.odu.edu\/coreyg\/wp-content\/uploads\/sites\/38656\/2017\/11\/pace-oregon-state-php-mysql-programming-code-web-design-1024x576.jpg\" alt=\"\" class=\"wp-image-82\" style=\"width:610px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/coreyg\/wp-content\/uploads\/sites\/38656\/2017\/11\/pace-oregon-state-php-mysql-programming-code-web-design-1024x576.jpg 1024w, https:\/\/sites.wp.odu.edu\/coreyg\/wp-content\/uploads\/sites\/38656\/2017\/11\/pace-oregon-state-php-mysql-programming-code-web-design-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/coreyg\/wp-content\/uploads\/sites\/38656\/2017\/11\/pace-oregon-state-php-mysql-programming-code-web-design-768x432.jpg 768w, https:\/\/sites.wp.odu.edu\/coreyg\/wp-content\/uploads\/sites\/38656\/2017\/11\/pace-oregon-state-php-mysql-programming-code-web-design.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Article Review #1<br><\/strong>Corey Guillaume<br>CYSE 201S<br>Cybercrime is often thought of as something that only involves computers, code, and hackers<br>sitting behind screens. However, a closer look reveals that these crimes are deeply human. They<br>involve emotions, trust, manipulation, and social vulnerability. One study that clearly<br>demonstrates this connection is \u201cModus Operandi and Blockchain Analysis of Romance Scams:<br>Cryptocurrency-Driven Victimization\u201d by Amy Lim and Kyung-shick Choi, published in the<br>International Journal of Cybersecurity Intelligence and Cybercrime. The study analyzes how<br>romance scams work when cryptocurrency is involved, combining digital forensic techniques<br>with social science insights about crime and victimization.<br>The authors focus on how scammers use emotional manipulation to convince victims to send<br>money in the form of cryptocurrency. They explore blockchain transactions to identify patterns<br>in how the scammers move stolen funds. The main research question is how the flow of<br>cryptocurrency in romance scams can be traced and understood. The researchers suggest that<br>scam-related wallets show clear behavioral patterns that could help identify them. The<br>independent variable in this study is the classification of a wallet as being scam-related or not,<br>while the dependent variables are the behaviors of those wallets, such as transaction volume,<br>timing, and complexity.<br>The methods used are mainly observational and forensic. The authors analyze public<br>blockchain data to track wallet behaviors and transaction patterns. They use data visualization,<br>network analysis, and comparison of scam wallets to normal ones. While this might sound<br>technical, the study keeps its focus on the human aspect. The researchers point out that many<br>victims are isolated or emotionally vulnerable individuals who are targeted specifically because<br>of those traits.<br>This study clearly connects to social science concepts such as routine activity theory, which<br>suggests that crimes happen when there is a motivated offender, a vulnerable target, and no<br>effective protection. It also relates to broader issues like digital inequality. Marginalized groups,<br>especially older adults and people with limited tech literacy, are often more susceptible to these<br>scams. They may not understand how cryptocurrency works or may not feel confident reporting<br>these crimes when they happen.<br>The larger contribution of this research is that it helps bridge the gap between technology and<br>humanity. It shows how understanding the social context of cybercrime is just as important as<br>tracking the digital traces. By identifying how scammers operate and who they target, this study<br>offers insights that could lead to better education, prevention, and support for victims. It is a<br>clear example of how social sciences remain essential in an increasingly digital world.<\/p>\n\n\n\n<p><strong>Article Review #2<br><\/strong>Corey Guillaume<br>School of Cybersecurity, Old Dominion University<br>CYSE 201S: Cybersecurity and Social Sciences<br>Prof. Diwakar Yalpi<br><br>The article by Ghaleb (2025) talks about how knowing about cybersecurity and having a good<br>company culture can affect how employees follow security rules. The main idea is that people<br>are more likely to follow rules if they understand the risks, trust their bosses, and work in a<br>supportive workplace. This shows that it is not just rules or technology that matter, but also how<br>people act and the environment they work in.<br>The article connects to ideas in social science, like how people behave, how groups work<br>together, what motivates people, social norms, and how trust and leadership affect decisions. It<br>shows that employees\u2019 actions are influenced by their beliefs and the culture around them. Social<br>science looks at these kinds of human behaviors, so this study fits well with what the field<br>studies.<br>The study wanted to find out if knowing about cybersecurity makes employees follow rules<br>better, how the company culture affects this, and if trust in bosses changes the relationship<br>between knowing about cybersecurity and following rules. The study had three ideas tested.<br>First, knowing more about cybersecurity helps employees follow rules. Second, that a good<br>company culture increases rule-following. Third, trusting leadership makes knowing about cybersecurity more effective. The things that were tested, called independent variables, were<br>cybersecurity knowledge, company culture, and trust in leadership. The thing that was measured,<br>called the dependent variable, was how much employees followed security rules.<br>The researchers asked employees to fill out surveys with questions about their knowledge of cybersecurity, their company\u2019s culture, trust in leadership, and how well they follow rules. They<br>used the answers to find patterns and connections between knowledge, culture, trust, and rule-<br>following. They analyzed the answers using statistics to see which factors made the biggest<br>difference. They also checked if trust in leadership helped strengthen the connection between<br>knowing about cybersecurity and following rules.<br>This study relates to what we learned in class about how people behave, social rules, and trust.<br>It shows that people are more likely to do the right thing when they understand the risks and feel<br>supported by their company and leaders. Even though the study did not focus on marginalized<br>groups, it can help all employees, including those who feel left out or undertrained, by showing<br>that including and supporting everyone can make the workplace safer and better for everyone.<br>In conclusion, this study shows that teaching employees about cybersecurity is not enough.<br>People also need a good company culture and trust in their bosses to follow rules well. This<br>study can help companies keep their data safe and protect employees and the public. It also<br>shows how human behavior and workplace culture affect society, which is an important part of<br>social science<\/p>\n\n\n\n<p>References<br>Ghaleb, M. M. S. (2025). Controlling cyber crime through information security compliance<br>behavior: Role of cybersecurity awareness, organizational culture, and trust in senior<br>management. International Journal of Cyber Criminology<\/p>\n\n\n\n<p><strong>Cybersecurity and Social Sciences- Presentation Assignment<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/olddominion-my.sharepoint.com\/personal\/cguil009_odu_edu\/_layouts\/15\/stream.aspx?id=%2Fpersonal%2Fcguil009%5Fodu%5Fedu%2FDocuments%2FCyberbullying%20%26%20Online%20Harassment%20%281%29%2Emp4&amp;referrer=StreamWebApp%2EWeb&amp;referrerScenario=AddressBarCopied%2Eview%2Ea519370d%2D29c1%2D47ff%2Db2b9%2D6d9e85f1d67c\">Cyberbullying &amp; Online Harassment (1).mp4<\/a> <\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1Corey GuillaumeCYSE 201SCybercrime is often thought of as something that only involves computers, code, and hackerssitting behind screens. However, a closer look reveals that these crimes are deeply human. Theyinvolve emotions, trust, manipulation, and social vulnerability. One study that clearlydemonstrates this connection is \u201cModus Operandi and Blockchain Analysis of Romance Scams:Cryptocurrency-Driven Victimization\u201d by&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/coreyg\/cyse201s\/\">Read More<\/a><\/div>\n","protected":false},"author":30617,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/coreyg\/wp-json\/wp\/v2\/pages\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/coreyg\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/coreyg\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/coreyg\/wp-json\/wp\/v2\/users\/30617"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/coreyg\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/coreyg\/wp-json\/wp\/v2\/pages\/304\/revisions"}],"predecessor-version":[{"id":320,"href":"https:\/\/sites.wp.odu.edu\/coreyg\/wp-json\/wp\/v2\/pages\/304\/revisions\/320"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/coreyg\/wp-json\/wp\/v2\/media?parent=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}