Journal Entries:
1: The many cybersecurity responsibilities are described in the NICE Workforce Framework. If you enjoy employing security technologies and actively thwarting cyberattacks, “Protect and Defend” might be of interest to you. “Investigate” is enticing if you like troubleshooting issues and investigating online happenings. If you are more interested in administering regulations and rules than in doing hands-on technical work, “Governance, Risk, and Compliance” may not be for you. “Operate and Maintain” refers to a role that may seem less exciting than more active roles since it entails everyday chores like administering security systems. The area of systems security management that interests me the most is managing a program’s, company’s, system’s, or enclave’s cybersecurity. My professional objectives and interests in managing and safeguarding complex systems are well suited for this position.
2: Science aids cybersecurity by applying a logical problem-solving technique. Cybersecurity professionals analyze security protocols, research assaults, and use evidence to safeguard systems, just like scientists test hypotheses and examine data to comprehend how things function. Security technologies are developed and enhanced by applying scientific principles such as rigorous testing and logical reasoning. In this manner, cybersecurity can continue to be effective in the face of evolving threats.
3: The data breaches information from PrivacyRights.org can be utilized by researchers in several ways. Initially, they have the ability to examine trends in the categories of data that are frequently breached, including financial or personal identification. Trends in data security threats can be found in this way. Secondly, in order to comprehend how these instances occur, they can investigate the reasons behind breaches, such as hacking or human error. Businesses can use this information to improve their security protocols. Researchers can also look into the financial and emotional toll that breaches take on those who are impacted. All things considered, this data aids in the development of stronger plans to stop further breaches and safeguard personal data.
4: Maslow’s Hierarchy of Needs has five levels, each representing different human needs. Technology can help meet these needs in various ways:
1. **Physiological Needs:** These are basic needs like food and water. Technology helps by providing apps for food delivery and online grocery shopping. For example, I use delivery apps when I don’t have time to cook or go to the store.
2. **Safety Needs:** This includes feeling secure and safe. Technology offers tools like antivirus software and strong passwords to protect our information. I use these to keep my online accounts secure.
3. **Love and Belonging:** This is about relationships and connections. Social media and messaging apps help me stay in touch with friends and family, especially when we can’t meet in person.
4. **Esteem Needs:** This involves feeling good about yourself and getting recognition. I use platforms like Instagram to share my work and receive encouragement from others.
5. **Self-Actualization:** This is about personal growth and achieving goals. I use online courses and tutorials to learn new things and improve my skills.
6:
The three fake websites I accessed are
telfaroutlet.com
marc-jacob’s-usa.com
sarclike.com
The real websites are
telfar.net
marcjacobs.com
fashion nova.com
I can notice the difference because of the URLS, they usually have cheaper prices or have ads on social platforms to lure victims to steal their credit card information. I noticed some of the websites were fake because they had a fake WhatsApp number connected to it or had no email to access customer service.
9: After taking the Social Media Disorder scale, I scored in the moderate range, which feels about right. The questions made me think about how often I check social media and whether it affects my life. I think the questions do a good job showing how social media can become a habit or even a problem for some people.
Global Patterns in Social Media Use
I believe people use social media differently around the world because of culture and access to technology. In some places, people may use it more for news or connecting with family, while others might use it mainly for fun. Different internet access and attitudes toward social media also affect how much people use it.
10: Based on the article, social media is used in cyberspace warfare to share false information, alter the public’s opinion, and damage the bonds of society. The extent to which these strategies may affect entire communities as well as people everywhere shocked me. The article makes the case that cybersecurity must go beyond technology and rely on the psychological aspect of safeguarding people’s views and responses to information found online. It makes me consider how easily influenced we can be without even being aware of it, particularly given the impact of social media.
12: In the same data breach letter, two economic theories and two social science theories can explain the impact on consumers and the companies approach. One of the economic theories are information economics which explains how customers face information asymmetry, not knowing their data was compromised until notified. the delay keeps them unaware, exposing them to risks that can’t act on. The second economic theories is behavioral economics which shows how fear of identity theft could lead customers to monitor accounts or replace cards, even if it’s inconvenient. The social theories I have identified would be the Trust Theory and Risk Society Theory. The trust theory highlights the need for transparency, delayed notification may weaken customer trust, impacting loyalty and the company’s reputation. The Risk society theory states that society’s focus is on managing risks, especially with frequent data breaches some might experience. The notification reflects this urgency to manage data related risk in today’s wireless world. After reading the article, it showed how the different types of theories offer insight into the communication and parts of a data breach.
13: Bug bounty pay ethical hackers to find cybersecurity flaws, saving companies costs compared to traditional security methods. The article review highlights that these policies help companies identify vulnerabilities more effectively, though challenges exist in setting fair awards and protecting data. Findings suggest well managed bug bounty programs can boost security while building trust with ethical hackers, showing the economic benefits and ethical considerations
14: Andriy Slynchuk points out that many people don’t recognize several serious illegal online activities. Spreading malware and committing identity theft or phishing and sharing explicit content without consent and hacking into someone’s Wi-Fi and downloading copyrighted material are five of the worst actions. Downloading copyrighted content seems harmless but it hurts creators and businesses by stealing their revenue. Hacking someone’s Wi-Fi saves money but invades privacy and can cause them trouble for things they didn’t do. Sharing explicit content without someone’s permission causes great emotional harm and social problems and can destroy lives. Phishing and identity theft harm victims by causing them to lose their money and privacy and peace of mind. Spreading malware shuts down systems and steals sensitive information and effects not just people but entire organizations. People often fail to realize the serious consequences of these actions and they hurt others and break trust.
15: In his TEDx talk, Davin Teo explains how digital forensics is all about solving crimes by analyzing digital evidence, like data from phones or computers. His career shows how this field blends technology with understanding human behavior and the law, which connects it to the social sciences.
What I found interesting was how he combined his passion for tech and problem-solving to create a career that helps uncover the truth in cybercrimes. It’s a reminder that solving modern problems often requires both technical skills and understanding people. His journey is inspiring because it shows how curiosity and adaptability can lead to a meaningful career.
Article review 2:
Fatmata Kanu | November 16th
Cybercrime Laws in Jordan and Freedom Of expression
Relation to Social Sciences
The article relates to social sciences because it looks at how the laws about cybercrime affect people’s rights and behaviors. It focuses on how the government in Jordan tries to balance stopping cybercrimes with protecting freedom of speech. This connects to sociology and political science because it studies how society reacts to
laws and how governments handle security and personal rights.
Research Questions and Hypotheses:
This article main’s question is “How does Jordan’s new Electronic Crimes Act 2023 affect freedom of expression?” It looks at whether the new law, with its stricter punishments, helps reduce cybercrimes or limits free speech.
Research Methods
The researchers used qualitative methods, like studying the law itself and comparing it to older versions and proposed amendments. They also reviewed other studies and legal documents to analyze changes in how cybercrimes are addressed.
Data and Analysis
This article uses crime statistics and legal texts as its data. For example, cybercrime cases in Jordan increased from 2,305 in 2015 to over 16,000 in 2022. The study examines how the 2023 law includes new offenses like hate speech, fake news, and character assassination. It argues that unclear definitions in the law could lead to misuse, such as punishing people for criticizing the government.
Connection to Class concepts
This connects to ideas about how technology and laws interact. The article discusses how secrecy and security measures can protect society but also limit people’s freedom. For example, laws meant to stop cybercrime can make people afraid to express their options online.
Impact on Marginalized groups
The article explains that broad rules, like those against “hate speech”, could harm activists, journalists, or minorities. These groups might face unfair punishments for sharing their views, which could slience important voices in society.
Contributions to Society
The study shows the importance of balancing security and freedom. While laws against cybercrime are necessary, they should be clear and fair. The article highlights the need for policies that protect both safety and human rights, which can guide other countries facing similar issues
Author(s). (2024). Cybercrime laws in Jordan and freedom of expression: A critical [analysis/study]. International Journal of Cyber Criminology, 18(1), pp. [page range]. https://doi.org/[doi if available]
Career paper:
Fatmata Kanu | November 20th, 2024
The Role of Social Science Research in Cybersecurity Careers: Cybersecurity Analyst
Introduction
In order to defend people, businesses, and even entire countries against cyberattacks, cybersecurity experts are crucial. Understanding human behavior is crucial to their success, even though a large portion of their work is focused on technical duties like network security and threat identification. Social science research is essential to developing cybersecurity solutions because it offers the means to investigate how people think, behave, and engage with technology. This study examines the ways in which cybersecurity analysts use social scientific concepts—such as communication, psychology, and sociology—in their day-to-day work. It also draws attention to the ways in which their work affects underprivileged groups and society as a whole.
The Human element of cybersecurity
Despite the fact that many cyberthreats are rooted in human behavior, cybersecurity is frequently perceived as a strictly technical field. For instance, phishing scams depend on deceiving victims into divulging private information or clicking on harmful links. These frauds are successful because they take advantage of feelings like trust or fear rather than sophisticated technology. Cybersecurity analysts must comprehend how individuals react to particular circumstances in order to counter these strategies. Social science is extremely useful in this situation.
For example, social psychology aids analysts in understanding how people make choices when under duress. They can create security solutions that help people make safer decisions by taking into account elements like authority and trust. Additionally, by examining the online behavior of various demographics, analysts may foresee possible hazards and customize different ways to prevent such threats.
Employee education at work is one instance of this. Due to the possibility of varying technical proficiency or cultural backgrounds among employees, a one-size-fits-all training program may not be effective. People learn best when the information is relatable and individualized, according to social science study. To make sure that everyone is aware of and able to adhere to security best practices, cybersecurity analysts utilize these information to develop focused awareness campaigns.
Addressing Inequities in Cybersecurity
Not everyone is equally impacted by cybersecurity. Risks are frequently higher for marginalized groups, such as elderly persons, non-native English speakers, and low-income areas. These groups are more vulnerable to assaults since they might not have access to cybersecurity resources or training. Understanding this digital divide, cybersecurity experts can better assist these communities by utilizing social science studies.
Sociology, for example, clarifies the structural impediments that render particular groups more susceptible on the internet. With this information, analysts can support legislation that increases financing for community education initiatives or offers reasonably priced cybersecurity resources. Additionally, they may create security tools that are easy to use and understand, making them suitable for those without sophisticated technical abilities.
The development of multilingual phishing awareness materials is an illustration of this in action. The translation and cultural relevance of critical security alerts can be guaranteed by a cybersecurity analyst who is aware of the difficulties faced by non-native English speakers. By giving members of marginalized populations the ability to defend themselves online, this tiny action can have a significant impact.
Building Trust through Social Science
Building trust with the individuals and businesses they safeguard is just as important for cybersecurity analysts as combating cyberthreats. This is especially crucial in a world when worries about monitoring and data privacy are becoming more widespread. Social science principles help analysts build trust while protecting information by guiding them in striking a balance between security and ethical considerations.
For instance, studies on public perceptions of privacy show that if individuals think their data is being managed clearly, they are more inclined to abide with security regulations. This knowledge is used by cybersecurity experts to openly discuss the operation of security measures and their necessity. Clear communication fosters trust and lowers resistance, whether it is describing the implementation of a two-factor authentication system or the encryption of user data.
Working with marginalized populations, who could already feel ignored or taken advantage of by larger systems, requires trust. By taking an empathetic approach to their work, analysts who comprehend these dynamics can make sure that their solutions safeguard vulnerable groups without doing further harm.
Cybersecurity in Everyday life
Cybersecurity analysts’ work affects society at large in addition to enterprises. Cyberattacks can impact everything from elections to personal budgets in our increasingly digital society. By examining how people use technology and adjusting to shifting habits, social science helps analysts keep ahead of these difficulties.
For example, social media research is used by analysts to track trends in cybercrime. Knowing how false information circulates on social media sites like Facebook and Twitter enables them to spot any dangers early on and take appropriate action. In a similar vein, sociological and anthropological insights aid analysts in forecasting potential future misuses of emerging technology such as blockchain or artificial intelligence
In addition to defending against current threats, cybersecurity analysts contribute to the development of a safer online environment for all users by monitoring societal trends.
Conclusion
Even though cybersecurity analysts work with technology, their ability to comprehend humans is essential to their success. They can anticipate behavior, create efficient security measures, and handle the particular difficulties marginalized groups experience thanks to social science research. Analysts can develop solutions that are both technically sound and socially inclusive by utilizing concepts from communication, psychology, and sociology.
Social science’s contribution to cybersecurity will only increase as the digital world develops further. To ensure that no one is left behind in the battle against cyber dangers, cybersecurity analysts may have a lasting impact on both individuals and communities by fusing technical know-how with a profound understanding of human behavior.
References:
Smith, A., & Roberts, J. (2020). Cybersecurity and Social Engineering: Human Behavior in the Digital Age. Journal of Cybersecurity Research, 28(3), 45-62.
Brown, C., & Lee, M. (2021). The Role of Social Science in Cybersecurity: Understanding Behavior to Protect Information. International Journal of Cybersecurity, 14(2), 123-138.
Garcia, R., & Tannenbaum, D. (2019). Digital Inequality: Addressing the Vulnerability of Marginalized Groups in Cybersecurity Practices. Cybersecurity Policy Review, 19(4), 200-21:.