-
Cybersecurity and Social Sciences- Presentation Assignment
{Video File Missing: No Source}
-
Journal Entry 15 – Evil AI!?
My main concerns from the video provided are about consenual data usage and law-related precedent. Firstly, how are non-consensual uses of data relating to AI going to be treated in law? OpenAI tested the waters pretty recently with the release of their newest version of Sora, which is a video-generating AI tool. It had seemed……
-
Journal Entry 14 Ranking Crime!
I think the most serious of these internet offences are collecting info about a child, sharing passwords\log in info/photos without consent, bullying, using other people’s internet and recording VoIP without consent in that order (1st is worst). I think that all of these are at least somewhat bad, but some of these matters are more……
-
Journal Entry 13 – Bug Bounty
This is a very unique way of finding bugs in systems, offering a bounty offers non-malicious incentive to hack systems and in return both sides win from this scenario. The paper finds that smaller bounty rewards still lead to similar numbers of bug reports meaning that smaller budgeted cybersecurity teams can make great results while……
-
Journal Entry 12 – Economic Theory
The first theory that this is related to is classical economics. It’s related to the company’s lack of government involvement. They leave the reaching out to government help on the affected parties rather than themselves. The next is rational choice which is related because it is in the company’s best rational interest to notify affected……
-
Journal Entry 11
The main social themes that show up in this video are cultures of different cities and networking. The culture of cities is important to take into account when choosing which job opportunities to pursue. The author of this video makes it a serious point to consider the circumstances of the location. She describes the social……
-
Journal Entry 10 – Mini-Article Review
Mulahuwaish et al. discuss what social cybersecurity is, examples of cybercrime and potential solutions. They consider past studies that cover every category possible and what roles those studies play. This article is very informative, and that is evident in the many tables that explain problems, solutions, previous studies and detection methods referenced from those studies….…
-
Journal Entry 9 – Social Media Disorder
On the disorder quiz, I scored a 3, which is considered “risky usage”. This was a bit surprising to me. I do use social media like YouTube and Instagram more than I probably should. I love watching long videos that discuss obscure topics or video essays about movies, shows or games. YouTube is amazing for……
-
Journal Entry 6 – Spoof Sites
In the first example I used I found that a fake website can have an unfamiliar UI while using the name of a different widely used company to bait in users with a familiar name. The second example I used I found that “spoof” sites will have a very similar UI to other popular or……