By: Elizabeth Howard
Journal Entry #1 Due: Sun Jan 19, 2025, 11:59pm
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
When I think about the career that I want to foster in the Cybersecurity Field I believe that I want to serve in the areas of Protection and Defense and Oversight and Governance. I would like to take the knowledge that I have gained in Health Services Administration and combine it with the Cybersecurity category of Oversight and Governance using new knowledge to be a leader and an advocate for health care facilities as they navigate and mitigate cybersecurity risk management. In addition, it will be essential to utilize the Protection and Defense aspect of Cybersecurity in order to defend the patients of the healthcare system. I will identify and investigate cybersecurity risks to make sure that their personal data is safe and that they can receive health treatment without unnecessary worries.
Journal Entry #2 Due: Sun Jan 26, 2025 11:59pm
Explain how the principles of science relate to cybersecurity.
Cybersecurity helps us use tools and techniques to secure our data and computer systems. It allows us to prevent and stop cyberattacks from unauthorized access to those digital components. There are multiple disciplines and systems related to cybersecurity. A social science approach can be used to gain scientific knowledge on Cybersecurity and scientific principles ensure we study it effectively.
Scientific Principles involve the way that scientist generally agree to present scientific knowledge. When cybersecurity is viewed in correlation with social science we can apply scientific principles as needed. First, we will use Relativism. This allows us to understand cybersecurity relationships and how it interconnects the various facets of our social systems with technology. Secondly, we embrace cybersecurity as a social science using Objectivity. This means that our approach is value free, non bias and without opinion while conducting the cybersecurity research. Third, we take on the principle of Parsimony, and explain the scientific knowledge gained from our research on cybersecurity in the most simple way available. Fourth, we make every effort to uphold the principle of Empiricism by only deeming scientific knowledge about cybersecurity to findings that can be experienced with our senses. Fifth, it is highly important for us to gather our research about cybersecurity with Ethical Neutrality. This means the approach should be fair to all people and supported by moral standards. Finally, as social scientists we approach cybersecurity research with our sixth principle of Determinism. This allows us to reference the fact that all things are caused by previous events and ties in the influences to human behavior with negative cyber incidents.
In conclusion we find that Cybersecurity can be viewed from a social science perspective. It is very useful to take this approach with the goal of collecting efficient and workable scientific knowledge. The correct approach to these findings begins and ends with use of scientific principles.
Journal Entry #3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
Journal Entry #4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Technology is interwoven in almost every area of life. This can be evident at every level of Maslow’s Hierarchy of Needs. This journal entry will give examples of technology interrelated to all of my needs.
Our basic needs are Physiological and Safety needs. It is with technology that I order my food and groceries each week when I use my cell phone to place a Walmart order to have them delivered to my home. I pay my water and gas heat bill online using my laptop computer. I relax before going to sleep by reading a book on my Kindle Paperwhite. I lock my car doors with a key fob to feel safe in my car and leaving my car. Technology completely covers my Physiological and Safety needs every day.
Our psychological needs involve Esteem, Belongingness and Love. In order to retain relationships with my friends and family and people that I love I use technology to keep in touch. My cell phone is the technology that I use most often and it fully supports my needs for love and belonging. In relation to esteem I attend school online in order to accomplish personal esteem and fulfill my personal goals.
Finally, Self-Fulfillment Needs are also supplemented by technology. I am still working toward the need of self-actualization where I reach my full potential. It is necessary for me to use technology for all works of creativity in my writing, I will use technology to publish and distribute my creations when they are complete.
Journal Entry #5
2/16/25
By Elizabeth Howard
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
There are several reasons that I believe make the most sense as motivators for misconduct or harmful behavior. It’s rarely just one factor driving such actions. First, money is often the most common motivator for many people to engage in various activities. Second, political motivations play a significant role. Throughout history, individuals and nations have used political reasons to justify and rationalize crimes, especially in the case of cybercrime in recent years. Third, revenge seems like a logical motivator. It is a selfish impulse often fueled by anger, which is a powerful emotion, and it can also serve as a form of rationalization. Coming in fifth place, I would rank entertainment as a motivator. While it might seem like a lesser factor, it can be a strong motivator, though it’s less commonly discussed. Finally, in seventh place, I consider boredom. I’m not convinced that boredom is a strong enough motivator, especially when the risks are so high. Being bored doesn’t fully justify committing a cyber-attack.
Journal # 6
2/23/29
By Elizabeth Howard
Can you spot three fake websites and compare the three fake websites
to three real websites, plus showcase what makes the fake websites
fake?
It can be very difficult to distinguish a fake website from a real one. Bad actors often design their sites to look nearly identical to trusted organizations, making it easy to fall for their deception. To protect yourself, it’s important to recognize subtle differences that can indicate whether you’re entering dangerous territory.
One of the most obvious signs of a fake website is the URL displaying a “Not Secure” warning. A legitimate site typically has a small padlock icon to the left of the URL, indicating a secure connection. Additionally, fake websites often have slight misspellings in their URLs—for example, using a lowercase “l” instead of an uppercase “I.” These minor alterations are designed to be easily overlooked.
Another key difference is the site’s content. Fake websites often lack essential pages such as an “About” page or a “Privacy Policy.” Additionally, suspicious sites may feature unusual payment methods, excessive pop-ups, or aggressive prompts encouraging you to act. Staying vigilant and paying attention to these details can help you avoid falling victim to fraudulent websites.
Journal #7
3/2/25
By Elizabeth Howard
The meme below was created to illustrate how many people likely feel when trying to remember countless passwords for various devices, streaming services, emails, social media, and other platforms. The Cybersecurity Human Systems Integration (HSI) framework is a structured approach that accounts for human factors and behaviors in the design and implementation of cybersecurity measures. It aims to optimize system performance by integrating human capabilities and limitations into the overall security architecture, ensuring users can effectively interact with security controls while minimizing risks associated with human error (2007, par. 1). A lack of proper training often leads to cognitive overload and security fatigue—something most of us can relate to when managing passwords and safeguarding personal information.
This fatigue and overload can be mitigated by incorporating HSI into security protocols, such as implementing user-friendly authentication methods like password managers, biometric verification, and single sign-on solutions. Organizations and platforms can utilize HSI to design systems that prioritize usability without compromising security. This includes simplifying security processes, providing clear and accessible training, and using adaptive security measures that align with users’ behaviors and needs. By making cybersecurity more intuitive and reducing cognitive strain, organizations can enhance compliance, improve user experience, and ultimately strengthen overall security.
Reference:
“1 Introduction.” National Research Council. 2007. Human-System Integration in the System Development Process: A New Look. Washington, DC: The National Academies Press. doi: 10.17226/11893.×
1
National Academies of Sciences, Engineering, and Medicine. 2007. Human-System Integration in the System Development Process: A New Look. Washington, DC: The National Academies Press. https://doi.org/10.17226/11893.

Journal #8
3/9/25
Watch this video and pay attention to the way that movies distort hackers.
“Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?” – YouTubeLinks to an external site.
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity
This video, which highlights the differences between well-researched cybersecurity scenes in movies and those that are wildly unrealistic, was incredibly interesting. I especially enjoyed the rating scale and how the presenter shared her personal experiences with some of the topics discussed.
Before starting this course, I had very little knowledge of cybersecurity. Every day, I find myself learning more and more, uncovering new information that challenges my previous assumptions. Most of what I initially believed came from movies and television, and now, I’m actively debunking the myths I picked up from the media. It’s fascinating to see just how much popular culture shapes our understanding of cybersecurity—just as it does with so many other aspects of life. As the saying goes, “Art imitates life.”
The way hackers and victims are portrayed in the media often leads audiences to believe in exaggerated or dramatized versions of cyber threats and hacker lifestyles. Even in the video, Keren Elazari mentions that the movie Hackers—and Angelina Jolie’s role in it—played a major part in inspiring her to pursue cybersecurity. This just goes to show how powerful media influence can be, not just in shaping our perceptions of the digital world, but in all areas of life.
Journal #9
Complete the Social Media Disorder scaleLinks to an external site.. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?
I was able to respond No to each question on the Social Media Disorder Scale.
I believe that that items on the scale directly relate to what many adolescent are struggling with today. I have 2 teenagers and they are both immersed in social media on a regular basis. It does bring in to question the governance on these social media platforms.
Recently the Governor issued and ordinance to remove cellphones and similar devices from schools during the school day. With this policy developed and implemented the students can reduce the chances of developing Social Media Disorder.
I think that this could relate to different patterns found around the world. Other cultures may utilize their social media platforms differently. They may live in countries where social media usage is restricted as well.
Journal Entry #10
03/30/2025
Read
Social Cybersecurity: An Emerging National Security Requirement and write a journal entry summarizing your response to the article on social cybersecurity.
The article in the Military Review is very informative. It is obvious that it is targeted toward a specific audience. The goal is to warn against the cyber warfare and hybrid warfare, The article argues that “the greatest strategic weakness for any country is internal, not external.” (Beskow and Carley, 2019) It defends the opinion that social cybersecurity is going to be of the uttermost importance as we fight ward based on information.
I thought the article was well written. It gave me helpful information and explanations of how things work in the world of social cybersecurity. I my interest was peaked by the BEND Maneuvers most. I used the comparison chart to analyze different things I have notices about content on social media and I found that many of those factors still could prove true today. With the increased use of AI I would say that the article is relatively accurate if it contained less bias and more supportive factual truth. I would endeavor to do more research to help me confirm the findings involved and to maintain their relevance to todays social cyber climate.
Another thought that crossed my mind as well is that fact that not only are we vulnerable to social cyber attacks from country to country but the populations of the countries are also susceptible to misinformation and distractions created by their own governments. It is a delicate subject and one I am thankful that there is awareness of. It is definitely difficult to know what media to trust in this society.
Reference:
- Beskow, C.M. Lt Col., and Carley, K. PhD (2019). Social Cybersecurity: An Emerging National Security Requirement. https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/
Journal Entry #11
3/30/2025
“What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook”, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.
In the presentation we discussed the various aspects of obtaining a job as a Cybersecurity Analyst and similar titles. This presentation outlined a few social themes. One theme would be the networking possibility for obtaining a position. This relates to societal norms and expectations. Even though it is computer position there is still a requirement and expectation to be social and to conform to the culture of cybersecurity professionals.
Journal Entry #12
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.
Functionalism
The “SAMPLE DATA BREACH NOTIFICATION” highlights the way that society is a system of interconnected parts that must work together to maintain stability. The Glasswasherparts.com company needs not only the customer to function but also the third party data platform provider to efficiently provide their services.
Conflict Theory
The data breach notification calls attention to the power dynamics involved in cyber security issues. The glasswasherparts.com company has the ability to accept some responsibility for the data breach and be a help to their customers. However based on their position of power they have risked customer data for their personal gain and then exposed their customers’ cybersecurity vulnerabilities and proceed to blame everyone else for the problem.
Principle- Agent Theory
A data breach notification also points to the relevant position of the third-party agent who is doing business on behalf of the principle. It draws attention to the lack of communication between the two parties and the fact that the principle can be held responsible for the inefficiencies of the agent.
Transaction Cost Economic Theory
The third party agent involved took several months to notify the principle of the data breach which means that the consumer was notified of their vulnerability even later. This points to the possible costs of notification. In this circumstance the length of time for the notification puts the customer at even greater risk which could also lead to loss in customer loyalty and retention.
Journal Entry #13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
Use of the bug bounty principal can have great cost value. Long term benefits out wight the cost even for smaller or less profitable companies. (Dridhar and Ming, 2021) This article had several significant findings. What I found most interesting about it was the dynamic by which bug bounty hackers have to take care not to be sued for their assistance. Hacking a company in order to clue them to their vulnerabilities still teeters a fine line. As hackers are looked down upon in certain populations of society. This article highlighted the benefit of using bug bounty hackers and ways to make their contract economically feasible.
Reference:
- Kiran Sridhar, Ming Ng, Hacking for good: Leveraging HackerOne data to develop an economic model of ug Bounties, Journal of Cybersecurity, Volume 7, Issue 1, 2021, tyab007, https://doi.org/10.1093/cybsec/tyab007
Journal Entry #14
4/13/2025
Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
Navigating laws and policies on the internet are difficult for many of us. According to Andriy Slynchuk, “One could be an internet outlaw and not even know it.” (Slynchuk, 2021) There are some internet laws in this article that are to be considered serious. First, the act of sharing the passwords, photos and addresses of others is definitely a serious issue. It is possible that you could put the persons life in danger if the wrong bad actor gets hold of their information. Second, Bullying and trolling have often proven to be serious illegal internet offenses. Often these acts can take a fatal toll on a persons mental health. It could even lead to the victim harming themselves. Third, faking your identity online or using someone else’s identity is also quite serious. This can lead to many criminal acts. Of course this one really depends on the intent of the person using the other identity. Fourth, using another person’s network without their permission is serious because it is stealing. You could also expose a person to have their data stolen by third parties as well. Fifth, performing illegal searches on the internet is definitely serious. This is especially dangerous if you are unaware that what you are searching is illegal. If you are researching certain key words and find yourself monitored and possibly imprisoned it could ruin your life and the lives of those connected to you. We must be careful about the decisions we make while we are online and try to stay educated so that we can protect ourselves from committing these cybercrimes.
Reference:
Slynchuk, A. (2021). 11 Illegal Things You Unknowingly Do on the Internet. par. 1 https://clario.co/blog/illegal-things-you-do-online/
Journal Entry #15
4/27/25
- Digital Forensics | Davin Teo | TEDxHongKongSalon– YouTubeLinks to an external site.Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
The social science behind digital forensics investigations is complex due to the field’s multidisciplinary nature. A digital forensics investigator must have a deep understanding of human factors to piece together the who, what, when, where, and why behind cybercriminal activity, making the collected evidence presentable for court trials. They rely heavily on the social science of criminology to better understand the motivations behind crimes, helping to establish motive and aid in prosecution and conviction. Knowledge of criminal justice is also essential, as understanding the legal system ensures that evidence is properly handled and admissible in court. Additionally, investigators must be well-versed in cybersecurity, particularly regarding the integrity and preservation of data and metadata. In some cases, understanding victimology is necessary to fully determine the extent of the cybercrime and its impact.