Journal entry #15

The presentation raises major ethical concerns about how AI can generate convincing but harmful content, amplify misinformation, invade privacy, and reinforce existing social biases. It also highlights the risk of AI systems being used for manipulation, surveillance, and large-scale social engineering without people realizing it. To address these issues, society should prioritize transparency in how…

Journal Entry #14

Among the eleven online violations described, the five most serious are sharing passwords, addresses, or photos of others, collecting information about children, bullying and trolling, using copyrighted images, and faking your identity online. Sharing someone’s private data is a major breach of privacy that can lead to harassment, identity theft, and long-term safety risks. Collecting…

Journal Entry #13

The article highlights how cybersecurity analysts increasingly operate within a social landscape rather than a purely technical one. My response to the reading is that the role now requires understanding how people behave, communicate, and influence one another online. Social cybersecurity emphasizes patterns like trust, persuasion, misinformation, and group behavior, showing that attacks often target…

Journal Entry #12

This sample document for an incident is a required notice by law for companies to distribute the notice. In terms of theories in economics and psychologically is dependent on the context of this notice. The broad assumption that the data was not encountered or aggregated is melamine statement to separate themselves from the breaches effect….

Journal Entry #11

The cybersecurity analyst role connects deeply to social behaviors because much of modern security revolves around how people interact online. Analysts don’t just monitor systems they study user habits, social media activity, and communication patterns to detect manipulation, phishing, or misinformation. Social themes such as trust, influence, and community behavior arise as key factors. The…

Journal Entry #10

The article *“A Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects”* explores how cybersecurity now extends beyond technology to include human and social behavior. It highlights how social platforms are used for cyberbullying, misinformation, and manipulation through bots and deepfakes. I found it insightful that the authors emphasize using machine…

Journal Entry #9

How did you score?  IO scored relatively high, I scored a 5 on the test.  What do you think about the items in the scale?  They seem a bit broad, though it is trying to generalize someone’s situation. However I would say a lot of my day is chronically online. I use different social media…

Journal Entry #8

This is such a simple premise I love these types of thought pieces. How does social media or in general different medias alter our understanding of particular topics. They have a great effect on peoples on whom they are presented too. This is especially in the case for younger or impressionable audience first introduction to…

Journal Entry #7

I made a simple meme about someone receiving a phishing email. The idea is that someone who has the empathetic need to help others and openness to send money to people who they think need help in a altruistic manner. However, she sent it to a scammer group who mass sends emails to people in…

Journal Entry #6

 The human fire wall is a term used in this video to describe the protection that humans can provide protection in cyber security. One of the biggest thing that the guest mentioned was that cyber security is not a technology issue but a human issue. Including the fact the internet is a tool that can…