Article 1 and 2

Article 1

The first article I will be talking about is called “Social cybersecurity: an emerging science”.  In the opening paragraph it talks about how Social Media gets used daily and how it effects our lives on a daily basis. People engage on social media by hearing about real life issues and news on social media. It also explains how Social Media is the reason why people believe fake news and I agree with that because when i’m on Twitter I see a lot of false information spreading around on the app. On the article it states ” In today’s high tech world, beliefs opinions and attitudes are shaped as people engage with others in social media, and through the internet. Stories from creditable news sources and finding from science are challenged by actors who are actively engaged in influence operations on the internet. Lone wolfs, and large propaganda machines both disrupt civil discourse, sew discord and spread disinformation. Bots, cyborgs, trolls, sock-puppets, deep fakes, and memes are just a few of the technologies used in social engineering aimed at undermining civil society and supporting adversarial or business agendas.” The reason I think this article relates with social sciences is because social sciences has to do with human behavior and when people are using the internet to extort or spread false information it show’s you what kind of person they are in real life. I feel like this article contributes to society because it gives you knowlege about how social media can control the world and how humans behave on the internet. The next article I will be talking about is called “6 Integrating Social And Behavioural Sciences”. This article gets into depth about how science can be related with Cybersecurity. In the 4th paragraph it talks about why science is related to cybersecurity as it says “Scientists in this field seek to develop the technology and theory needed to assess, predict, and mitigate instances of individual influence and community manipulation in which either humans or bots attempt to alter or control the cyber-mediated information environment (Carley et al., 2018). While researchers in the social cybersecurity area come from a large number of disciplines, many identify themselves as computational social scientists. The field is rapidly expanding to meet a growing need; the number of academic papers published in this area has risen exponentially in the past 10 years 
National Academies of Sciences, Engineering, and Medicine.” I feel like this article relates to social sciences because it talks about how scientists want to develop their technology and get more knowledge on cybersecurity. In the article it also talks about how humans effect the internet as it states “The term “social cybersecurity” is also sometimes used to refer to cyber-mediated security threats themselves, with emphasis on the human, as opposed to the technological, aspects of those threats. Examples of such threats are recruitment of members of covert groups and their training in social media, the spread of fake news and disinformation, attacks on democracy through manipulation of how citizens receive news, the fomenting of crises by creating a perception of the rampant spread of disease or state instability, phishing and spear phishing attacks.” I feel like this article  contributes to society because it talks about how humans are the reason cyber threats happen and how humans take advantage of cyber victims.

 

 

Article 2 

 

  Cyberattacks, cyber threats, and attitudes toward cybersecurity policies   

                                                                                        by Keren G Snider

In this article, I will get into depth about the different type of cyberattacks and cyber threats explained by Keren Snider. In the ever-evolving landscape of the digital age, the prevalence and sophistication of cyberattacks have become an imminent threat to individuals, businesses, and nations alike. As technology continues to advance, so do the methods employed by malicious actors seeking to exploit vulnerabilities in cyberspace. This essay delves into the multifaceted realm of cyber threats, exploring the implications of different types of cyberattacks on public attitudes toward cybersecurity policies. Specifically, it examines whether exposure to various cyber threats influences support for distinct regulatory measures and probes the public’s differentiation between interventionist and regulatory forms of cybersecurity policies.  In the article, it talks about the different types of cyber threats. There are four types of cyber threats. The first one is Malware. Malware represents a broad category of software designed to harm or exploit computer systems. This includes viruses, worms, and trojan horses, all of which can infiltrate systems and compromise sensitive data. The second one is Phishing. Phishing attacks involve the use of deceptive techniques to trick individuals into divulging sensitive information such as usernames, passwords, or financial details. These attacks often disguise themselves as trustworthy entities, exploiting human psychology to gain unauthorized access. The third one is Ransomware. Ransomware is a type of malicious software that encrypts a user’s files, rendering them inaccessible until a ransom is paid. This form of cyber threat has gained prominence due to its potential for causing significant financial and operational disruptions. The final cyber threat is DDos Attacks. DDoS Attacks stands for Distributed Denial of Service attacks. DDoS Attacks involve overwhelming a target’s online services with traffic from multiple sources, rendering them inaccessible. These attacks can disrupt the functioning of websites, online services, and even critical infrastructure. Now, I will talk about attitudes towards Cybersecurity policies. The impact of cyber threats extends beyond immediate technological consequences, influencing public perceptions and attitudes toward the necessity of robust cybersecurity policies. Understanding these attitudes is crucial for crafting effective regulatory measures that align with public expectations and concerns.  The first type of policy is “Heightned Support For Regulatory Policies”, Exposure to different types of cyber threats may contribute to heightened support for specific regulatory policies. For instance, individuals who have experienced financial losses due to phishing attacks may be more inclined to support regulations aimed at strengthening online authentication processes and financial transaction security. Now I will explain the Differentiation between Interventionist and Regulatory Policies. An important aspect of understanding public attitudes toward cybersecurity policies is recognizing the distinction between interventionist and regulatory measures. Interventionist policies involve active government involvement, such as cybersecurity task forces and offensive cyber operations. Regulatory policies, on the other hand, focus on establishing guidelines and standards for cybersecurity without direct government intervention. Now I will get into depth about the Public Perception Of Interventionist Policies. The public’s perception of interventionist policies may vary based on their understanding of the government’s role in cybersecurity. Some may view active government intervention as necessary for countering sophisticated cyber threats, while others may express concerns about privacy and potential government overreach. One of the last things this article talks about is the Public Perception of Regulatory Policies. Regulatory policies, which aim to set standards for cybersecurity practices without direct government intervention, may be more widely accepted by individuals who prioritize privacy and limited government involvement. However, striking a balance between effective regulation and individual freedoms remains a challenge. In conclusion, the complex and dynamic nature of cyber threats necessitates a nuanced understanding of their implications on public attitudes toward cybersecurity policies. The diverse landscape of cyber threats, including malware, phishing, ransomware, and DDoS attacks, presents unique challenges that require tailored regulatory responses. The exploration of whether exposure to different types of cyberattacks leads to heightened support for distinct regulatory policies sheds light on the intricate relationship between cybersecurity incidents and public opinion.Moreover, the distinction between interventionist and regulatory policies adds another layer of complexity to the discussion. Public perception of government involvement in cybersecurity, whether through active intervention or regulatory frameworks, reflects broader societal attitudes toward the balance between security and individual freedoms. Crafting effective cybersecurity policies requires policymakers to navigate these complexities, considering the diverse perspectives within the public domain.As technology continues to advance, the prevalence and sophistication of cyber threats are likely to evolve. Therefore, ongoing research into the dynamic interplay between cyber threats and public attitudes is essential for adapting regulatory frameworks to the ever-changing landscape of cyberspace. Ultimately, a collaborative and informed approach involving policymakers, researchers, and the public is crucial for developing

effective and widely accepted cybersecurity policies in the digital age.