Journal entry 1

The question asks in the NICE Workforce Framework, are there any areas that I would want to focus my career on and to explain which areas would appeal the most to me and which would appeal the least. If I had to choose a job in the cyber security field, it would have to be a cyber crime investigator. Having a job as a cyber crime investigator would be very awesome and I would get to investigate the cyber crimes that happen such as when people do hacking and try to steal information. Something that I would enjoy doing is stopping the cyber criminals who are committing such crimes and protecting the public. Something I would consider less appealing is having to document everything but I would get through it. 

Journal entry 2

The question is how the principles of science relate to cyber security. The principles of science can help people develop the skills to prevent incidents from happening when it comes to hacking and breaches. With the principles of science as well it can also help individuals analyze cyber attacks when they happen. It also helps individuals detect threats. When I say threats I mean viruses. Cyber Security is a very great field and making sure people understand the principles of science related to cyber security is very important and knowing the principles of science related to cyber security can definitely help people when it comes to different events in cyber security. 

Journal entry 3

The question asks using the website how might researchers use this information to study breaches? This site has a lot of information on the various laws and privacy laws. You can see all the information on the different laws by selecting any state. When you select any state it will tell you all the information. This site also does show all the security breaches that have happened in the past. The researchers could take the information on the previous breaches that occurred and use that information to prepare and protect themselves from future security breaches from happening in the future. 

Journal entry 4

The question asks to review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. The first example is physiological needs and an example for this term is not being able to get my programming assignment to work which makes me phycological frustrated. The second example is safety needs and an example with that is when my facebook password got taken and my account was hacked into. The third example is belongingness and love needs I use technology to talk to people. The fourth example is esteem needs. An example for this is when I was worrying about how many friends I had on facebook. The last example is self actualization and with this technology gave me so much skills like video games where I got friends. 

Journal entry 5

The question asks to rank the motives from 1-7. The 7 motives are Entertainment, Political, Revenge, Boredom, Recognition, Money, and Multiple Reasons. I would say entertainment would be number one. Money would be number two. Revenge would be at number three. Political is at number four. Boredom is five. Multiple reasons is at number six. Recognition is at number seven. I ranked entertainment at number one because cybercrime could occur as entertainment such as cyberbullying. I chose money as a number because you could get someone’s information which can lead to someone’s money. Revenge is number three because you can get someone back for something. Political is number four because someone can get political in some cases. Boredom is five because people may be bored to learn the cyber stuff. Multiple reasons is at six because someone can have multiple reasons to get someone or a company. Recognition is at seven because people can just steal information. 

Journal entry 6

The question asks to name three websites that are fake and show how websites are fake. It is usually easy and simple to tell if websites are fake. There are a ton of websites on the internet. Some websites on the internet are fake and there are ways to tell that websites are fake. Ways to tell websites are fake on the internet usually do not have correct names in the website name. Websites also do not have an http or https in the beginning of the website. Some examples of fake websites are BankoffAmerica.com, http://www.catisland.com, and mydmv.com 

Journal entry 7

This WiFi looks like a great WiFi to connect to that I see that is open and has no password. This is human system integration framework. People have to understand that is not safe for people to connect to a WiFi that is open without a password as there’s a chance that the person connecting to a WiFi network can get hacked into and their personal information can be stolen. In the second image the dog is trying to get investigate the virus in his tablet and trying to stop the virus from overtaking the device. The third image represents the meme connecting to a private personal wifi device while sitting and watching the sunset and doing his office work. It is always safer to connect to your own personal wifi devices that are locked with a password.

Journal entry 8

The question asks to write a journal entry about how you think the media influences our understanding about cybersecurity. Cyber Security has a lot of influence on the media in many ways. Movies are a media option that has an influence on cyber security. When you watch a movie that has hacking in it the movie shows you how the person gets into the computer or whatever they are hacking and shows you how easy it is to hack. In reality it is not that easy to hack into certain things. This can tell us that the media and the internet is not safe at all and we must understand that. 

Journal entry 9

I completed the social media disorder scale. On the quiz I answered no for all questions. I do not use social media that much in the first place. I know that using social media all the time is not god. I think the items in the scale are cool. It talks about a popular topic as people are on social media a lot and it is very addicting. I think the different patterns are found around the world because not everyone uses social media either. 

Journal entry 10

The question is telling us to read the article that was provided on social cyber security and the instructions aks to summarize what we read in the article on social cyber security. Let’s first figure out what social cyber security is. On the website the definition of social cyber security is “Social cybersecurity is an emerging subdomain of national security that will affect all levels of future warfare, both conventional and unconventional, with strategic consequences”. It is also explained that social cyber security is basically “the focus on cyber-mediated changes in human behavior, social, cultural, and political outcomes, and to build the cyber-infrastructure needed for society to persist in its essential character in a cyber-mediated information environment under changing conditions, actual or imminent social cyber-threats” 

Journal entry 11

The question is to think about how the description of the cybersecurity analyst job relates to social behaviors. The question is what is a cybersecurity analyst? A cybersecurity analyst is the first line of defense. They monitor the system and respond to incidents. They also understand all attacks and everything that happens. The video mainly talked about phishing and other attacks on the network. The hackers and the criminals are looking for the weak points. Social activities are developing to make sure the networks are protected at all times. To become a cyber security analyst you need communication and education in IT and different things as well. 

Journal entry 12

So in this article it talks about how there was a security breach and the hacker got access to customers’ information such as payment card numbers, customer made transactions and historical payment card data. There are two economics theories and two different social sciences theories that relate to the letter. One of the economic theories is the Laissez-faire economic theory.  In this theory the government does not usually get involved in the community unless the government absolutely has to. In this case, the government had to get involved to protect the users that may have had their information taken. The second economic theory is the Cost/benefit analysis. This is done to tell the people there was a breach. There are two social science theories that are related to this article. One of the theories is social network theory and this is to determine the relationships and interactions around the company. The other theory is cultural theory which is the values and beliefs of the company. 

Journal entry 13

After reading this article I found it very informative and very interesting. The article gave an understanding of the history of the policies to identify the vulnerabilities. This article also gave us readers an understanding of how to prevent cyber attacks from happening in the future. Understanding how to prevent cyber attacks is a very important thing in today’s world. Some of the things I found quite interesting while reading this article was that the hackers went after well known companies such as Google, Uber, Tesla, Starbucks and HP. The hackers decided to go after these companies when hacking because these are well and common companies a lot of people know about. 

Journal entry 14

The five things that I think are the most serious offenses are using copyrighted images, bullying and trolling, faking identity online, illegal searches on the internet, and collecting information about children. I think these things listed above are the most serious offenses. The reason that all these offenses that are listed above are serious offenses is because all of these offenses are either involving plagiarism and or highly illegal as well. Bullying and trolling is making fun of someone and mistreating them. The other ones are highly illegal and against the law. This is the reason I think the offenses I selected are serious offenses. 

Journal entry 15

A collection or analysis and a reporting of various types of electronic data to be preserved in a way to be used in the court of law. They work late at night in the office. They have to spot where the electronic evidence is. They have to take digital pictures because they replace everything as it seems. Another thing they will do is go in with legal counsel or the police to do an investigation. Social sciences relate to this role in the digital forensic career because investigators must understand a crime’s psychological, social, and behavioral aspects to solve them. I think the speaker’s career is really cool. I am personally doing cyber security in college right now and this is a very interesting job. He explained his job very nicely and he made it seem very interesting. 

Article 1

Understanding what the principles of social sciences are
The question is what the principles of social science is in Cyber Security. So, in cyber security
there is the study of social sciences. Let us identify the principles of social science. The principles of
social science are Relativism, Determinism, Objectivity, Ethical Neutrality, Skepticism and Parsimony.
Relativism can be understood to mean that all things are related to something. Objectivity means when
the scientists study topics in some ways. Parsimony means that scientists should keep their explanations in simple terms. Ethical Neutrality means when scientists adhere to ethical standards when they do research. Determinism is when events occur because of specific events. Skepticism is when scientists question or doubt things when doing research. So I chose the article Digital Criminal Investigations in the Era of Artificial Intelligence. In this article I think three principles that could fit into this article are Parsimony, Objectivity, and Skepticism. The research question of this article is basically about how to ultimately stop cyber crime from happening. What is cyber crime? Has this question ever came to your mind when reading articles that talk about cyber crime. Cyber Crime is basically crime that happens online on the internet or some type of device. Cyber crime is very popular now adays as technology is advancing everyday in so many different ways. A few ways that the scientists investigate the criminal activity that goes on is using AI mechanisms. These AI’s are used for surveillance, to monitor crimes, and use cameras to identify the person who did the crime through face recognition. These investigations stand out as a distinct domain of computer generated data. The AI’s also show a wide range of data from electronic devices, network records, data and content from social media plaVorms. This is basically done so that they can investigate the crime that happens online. Some concepts that this article relates to from the class is how researchers study breaches, how the principles of science relate to cyber security, and the principle of determinism in computer hacking. In conclusion, this article explains a lot about criminal activity and how scientists’ study and investigate cyber crime that occurs. It also explains what ways cyber crime is identified and what is used to identify the cyber crime.

Article 2

Cyber Bullying during the Pandemic

Introduction

I chose the article about cyber bullying during the pandemic. The question is what is cyber bullying. Cyber bullying is the use of technology to harass or make fun of someone. Threatening someone through the use of technology is also identified as another form of bullying but through the use of technology. This article talks about the pandemic and how when the pandemic happened classes got moved from in person to virtual. As a result cyberbullying happened. The cases of cyberbullying went up since the change.

Principles of Science

In the article I think the three principles that will fit into this article are Determinism, Ethical Neutrality, and Parsimony. Determinism means where behavior is caused based on events that happened. Ethical Neutrality means where scientists must adhere to ethical standards when they conduct their research. Parsimony means that scientists should keep their levels of explanation simple and keeping their explanations simple they can conduct their research based on what they came up with. So let’s talk about how these principles fit into the article. Determinism was used in the article because as we know it means behavior caused by events and in the article classes were moved from in person to virtual and because of that event cyber bullying happened. Ethical Neutrality was used because scientists were testing to see what would happen if they keep the classes online and in person. Parsimony was used because scientists were keeping it simple by looking at the numbers when classes were in person and when classes were online.

Hypothesis

As stated in the article, research has shown that Some of the research that has been conducted suggests that a considerable proportion of undergraduate students have their first cyberbullying experiences during college, illustrating the necessity for cyberbullying research in postsecondary education settings (Kowalski et al., 2012; Varghese & Pistole, 2017). They did research on the cases before and during the pandemic on young adults and the cases went up when the pandemic hit.

Research Methods and Analysis

Some research methods that were used for research on cyber bullying because of the pandemic was the use of social media and what happens when the use of social media was used. According to the article the use of social media caused increased cases of cyberbullying. Past research further demonstrates a relationship between social media usage and perceived social isolation, colloquially referred to as loneliness. During the pandemic, social media consumption has been associated with greater feelings of loneliness (Ma et al., 2020; Lisitsa et al., 2020). It was assumed that individuals potentially engage more in cyberbullying if they use social media and feel socially isolated. This is an emerging area of study and essential considering the high levels of loneliness and social media usage among young adults even in pre-pandemic times (Varghese & Pistole, 2017).

Concepts that were used from class

Some concepts that were used from the class towards this article was powerpoint three. In powerpoint three it talks about some strategies with social science research methods. These methods that are given in the powerpoint are related to this article. Some methods are surveys, experiments, and different types of research. One method that was used in this article was experiments. Scientists experimented with surveys and experiments so that they can see how cyberbullying would be when virtual and when in person.

Groups and Studies to Society

One specific group that was affected by cyberbullying was young adults and kids. This is the group that was greatly affected by cyberbullying. The article says that participants between the age of 15 and 25 years old were affected by cyberbullying. Participants who get bullied are usually affected by loneliness which causes them to get onto electronic devices. In the society for cyber bullying to stop and for people to be aware of it there are usually presentations given for cyber bullying to make you aware of it and to tell you what to do if you are one of the people who get bullied over the internet.