{"id":234,"date":"2024-04-21T06:56:44","date_gmt":"2024-04-21T06:56:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/?p=234"},"modified":"2024-04-21T06:56:44","modified_gmt":"2024-04-21T06:56:44","slug":"career-professional-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/2024\/04\/21\/career-professional-paper\/","title":{"rendered":"Career professional paper"},"content":{"rendered":"\n<p>Myles Watson April 4, 2024<\/p>\n\n\n\n<p>A Career in Cybersecurity and how it depends on Social Science Research and Principles<\/p>\n\n\n\n<p>With our increased reliance on digital technology comes the increase in cybercrime. Digital technology touches our personal, economic, business, and governmental affairs. Essential for many businesses, cybersecurity and protecting data from attacks, viruses, and cybercriminals is vital (Abelson et al, 2024). Thanks to the growth of the internet and related technology, cyber security has become a growing specialized study in the world of information technology among many professional certification programs and academic studies among colleges and universities. Yet the profession of cyber security covers a broad spectrum of specialties, from network security, software security, development etc. (Furnell, 2021). Noteworthy, cybersecurity careers have both technical and non-technical elements, and can be made from multidisciplinary perspectives with clear links and relevant influence from social, political, legal, criminological, and economic facets.<\/p>\n\n\n\n<p><strong>Digital Forensic Examiner<\/strong><\/p>\n\n\n\n<p>Digital forensics is a specialized forensic that focuses on identifying, acquiring, processing, analyzing, and reporting on electronic data (Goni et al, 2020). Almost all criminal activity involves some form of digital data or cyber criminology, and law enforcement depends heavily on its support. Electronic evidence and its sources can range from computer hardware, smartphones, internet browsing, or software usage. The goal of a digital forensic examiner for law enforcement is to extract electronic data, process it into intelligence and provide prosecutors with findings useful and supportive to crime solving. Equally, important is understanding the dynamics of human factors. Let\u2019s investigate the crime of child pornography. A digital forensic<\/p>\n\n\n\n<p>examiner might use research and understanding of social factors and psychology to investigate such cybercrime, hence the mutual dependency of social science and cybersecurity. A digital investigation into this type of cybercrime could involve preserving evidence from a computer, smartphone, internet browsing history, stored videos, animation, or image altering. Now let\u2019s investigate child sex traffic. Similarly, a digital forensic examiner\u2019s work with cyber criminology is not mutually exclusive from the social science lens. Furthermore, children are among a marginalized and vulnerable group and these crimes often disproportionately impact them. Another example, cyberbullying which is a social and health concern for many children and in the last decade there has been steady increase in several studies focusing on this type of cyber crime and the psychological and societal factors that influence it (Espinoza &amp; Wright 2018).<\/p>\n\n\n\n<p>Cyber threats, attacks, breaches, internet misuse, have all become normal day-to-day cyber risk because of the world\u2019s dependency on electronic devices both personally and for business. Digital forensic examiners are also met with challenges locating, retrieving, and analyzing evidence from computers, smartphones, and other electronic devices. These systems tend to hold an incredible amount of information and examiners must maintain privacy while conducting investigations. Examiners could inevitably gain access to more data that might not be included or from a third party not relevant to the investigation (Goni et al, 2020). Factors such as human rights, confidentiality, data integrity must be properly practiced so not to jeopardize the evidence.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>In conclusion, a career in digital forensics is not mutually exclusive from social science research and principles. A digital forensics examiner will often study and use more than one social science lens, during their day-to-day job functions. Clear links and relevant input can be<\/p>\n\n\n\n<p>Page 2<\/p>\n\n\n\n<p>pulled from social, political, legal, criminological, and economic dimensions which demonstrate the correlation between the two. Cyber laws and cyber policies are often developed from the human-factor approach (Furnell, 2021). Legal mechanisms are often developed to control the behaviors associated with cyber risks. Nevertheless, the work of a digital forensic examiner is important to law enforcement but almost always involves social science research and principles.<\/p>\n\n\n\n<p>Page 3<\/p>\n\n\n\n<p><strong>References:<\/strong><\/p>\n\n\n\n<p>Abelson et al., (2024). Bugs In Our Pockets: The Risks of Client-Side Scanning.&nbsp;<em>Journal of Cybersecurity,&nbsp;<\/em><em>Volume&nbsp;<\/em><em>10<\/em>, Issue 1, 2024,<\/p>\n\n\n\n<p>Espinoza,&nbsp;G., M. What Do We Know and Do We Go&nbsp;<em>Child Adol&nbsp;<\/em><strong>11<\/strong>, 1\u20135<\/p>\n\n\n\n<p>Ibrahim Goni, Jerome Mishion Gumpy, Timothy Umar Maigari, Murtala Muhammad, Abdulrahman Saidu. (2020). Cybersecurity and Cyber Forensics: Machine Learning Approach. Machine Learning Research, 5(4), 46-50.&nbsp;https:\/\/\/doi.org\/10.11648\/j.mlr.20200504.11<\/p>\n\n\n\n<p>Page 4<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>tyad020.<\/td><td>https:\/\/doi.org\/10.1093\/cybsec\/tyad020<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/ffa84bb9-31c3-489a-b9bb-0513a36bc3f1\" alt=\"page4image3778512\" width=\"36.989998\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/308e333b-74f2-4206-8fed-0061a7eef56e\" alt=\"page4image3777056\" width=\"69.328003\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/c1f6e25c-b70c-495b-a1da-0797d4770fd0\" alt=\"page4image3778304\" width=\"58.634995\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/230e86ee-8058-42ff-82eb-81772a0f5aad\" alt=\"page4image3779344\" width=\"36.000000\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/ec4d5ad6-c9fe-4868-858c-241605f2141a\" alt=\"page4image3778096\" width=\"63.972992\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/02f4931e-16ce-4bcc-aac4-99d9e967db44\" alt=\"page4image3779760\" width=\"33.333984\" height=\"13.799000\"><\/p>\n\n\n\n<p>Wright,<\/p>\n\n\n\n<p>Cyberbullying<\/p>\n\n\n\n<p>Experiences<\/p>\n\n\n\n<p>Among<\/p>\n\n\n\n<p>Marginalized<\/p>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/2ce7356b-249a-41ee-890b-e57c6e66a094\" alt=\"page4image3780176\" width=\"31.975002\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/18cb08c3-5dff-49cc-ad04-bce0cb45af6a\" alt=\"page4image3774144\" width=\"31.652008\" height=\"13.799000\"><\/p>\n\n\n\n<p>Where<\/p>\n\n\n\n<p>Next?.<\/p>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/5373a02b-3aab-447a-8e7b-d3ad2efc2d64\" alt=\"page4image3780800\" width=\"212.255936\" height=\"0.585938\"><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><em>Security<\/em><\/td><td><em>Volume<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><em>100<\/em><\/p>\n\n\n\n<p>The and Skills,&nbsp;<em>Computer&nbsp;<\/em><em>&amp;<\/em><\/p>\n\n\n\n<p>Youth:<\/p>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/7f8df4ba-3b8d-4979-96d5-fc3709db1714\" alt=\"page4image3684992\" width=\"37.330002\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/3c6f38d6-bc2a-4a1a-8d1a-4439fb3642fa\" alt=\"page4image3683744\" width=\"38.010010\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/8f7e453e-cd4d-43fa-820b-be4a1526f8b8\" alt=\"page4image3683952\" width=\"34.992004\" height=\"13.799000\"><\/p>\n\n\n\n<p><em>Journal<\/em><\/p>\n\n\n\n<p><em>Trauma<\/em><\/p>\n\n\n\n<p>(2018).<\/p>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/d41bb73c-a123-4fad-8d2c-124bf3fca2f8\" alt=\"page4image3684160\" width=\"207.996002\" height=\"13.799000\"><\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/doi.org\/10.1007\/s40653-018-0207-y\n<\/div><\/figure>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/30e7c1c5-c527-4056-8bea-94506f43de3c\" alt=\"page4image3684368\" width=\"208.581940\" height=\"0.585938\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/ce124684-4edf-4dc0-af2a-1af594b7c5ee\" alt=\"page4image3684576\" width=\"32.660000\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/09b0ecf2-a658-4538-8140-e61856836445\" alt=\"page4image3685200\" width=\"37.664005\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/34bed3f3-6206-45be-a5c8-f7640583efa1\" alt=\"page4image3685408\" width=\"31.991997\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/beecf20d-b2e9-4aab-95aa-343aa4994309\" alt=\"page4image3685616\" width=\"67.311996\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/4297df98-05b7-43ce-86a4-f5b7242a318f\" alt=\"page4image3685824\" width=\"51.966995\" height=\"13.799000\"><\/p>\n\n\n\n<p>Steven<\/p>\n\n\n\n<p>Furnell.<\/p>\n\n\n\n<p>(2021)<\/p>\n\n\n\n<p>Cybersecurity<\/p>\n\n\n\n<p>Workforce<\/p>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/e2e0483d-b44a-46a0-9040-4a1851c8ad30\" alt=\"page4image3733312\" width=\"39.321999\" height=\"13.799000\">&nbsp;<img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/2a473a67-3c61-463c-a2f2-7dd0e91605e2\" alt=\"page4image3732688\" width=\"35.999992\" height=\"13.799000\"><\/p>\n\n\n\n<p><em>January<\/em><\/p>\n\n\n\n<p><em>2021,<\/em><\/p>\n\n\n\n<p><em>102080<\/em><\/p>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/22798f45-243e-4339-b101-5e1e36742ba3\" alt=\"page4image3732480\" width=\"361.915985\" height=\"13.799000\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Myles Watson April 4, 2024 A Career in Cybersecurity and how it depends on Social Science Research and Principles With our increased reliance on digital technology comes the increase in cybercrime. Digital technology touches our personal, economic, business, and governmental affairs. Essential for many businesses, cybersecurity and protecting data from attacks, viruses, and cybercriminals is &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/2024\/04\/21\/career-professional-paper\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Career professional paper<\/span><\/a><\/p>\n","protected":false},"author":27888,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/wp-json\/wp\/v2\/posts\/234"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/wp-json\/wp\/v2\/users\/27888"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/wp-json\/wp\/v2\/comments?post=234"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/wp-json\/wp\/v2\/posts\/234\/revisions"}],"predecessor-version":[{"id":235,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/wp-json\/wp\/v2\/posts\/234\/revisions\/235"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/wp-json\/wp\/v2\/media?parent=234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/wp-json\/wp\/v2\/categories?post=234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-myles-watson\/wp-json\/wp\/v2\/tags?post=234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}