{"id":141,"date":"2025-09-19T01:15:10","date_gmt":"2025-09-19T01:15:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-12-08T04:48:03","modified_gmt":"2025-12-08T04:48:03","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ivaneport\/cyse-300\/","title":{"rendered":"CYSE 201S\u00a0"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\"><strong>Cybersecurity and the Social Sciences\u00a0<\/strong><\/h1>\n<h2 class=\"p1\">Article review 1<\/h2>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Introduction\/BLUF<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This article investigates how accurately people can identify StyleGAN2-generated deepfake<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">images and whether simple interventions\u2014familiarization or advice\u2014improve detection<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">accuracy. People are slightly better than chance at detecting deepfakes, but the interventions<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">tested did not improve performance, and participants were overconfident in their inaccurate<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">judgments.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Relation\/Connection to Social Science Principles<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This study strongly incorporates multiple principles of social science:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">1.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Validity of Observation<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2013 The experiment examines how human perception processes<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">visual stimuli and judges authenticity.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Empiricism<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2013 The study uses systematic data collection from over 1,000 participants to<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">test human detection accuracy.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Parsimony<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2013 Only two simple interventions were tested to determine whether minimal<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">guidance could help users.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">4.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Objectivity<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2013 Images, advice cues, and scoring metrics were standardized to remove<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">researcher bias.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">5.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Theory Construction<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2013 The study contributes to theories of human decision-making,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">deception detection, and confidence miscalibration.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">6.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Ethical Neutrality<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2013 Deepfake technology is examined without moral judgment,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">focusing instead on its observable impact.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">7.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cumulative Knowledge<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2013 Findings extend prior research on misinformation, AI<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">manipulation, and human cognitive biases.<\/span><\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\u00a0<\/div>\n<div class=\"PageAnnotations\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\n<div>\u00a0<\/div>\n<div class=\"Page-comment-line-top-margin\">\u00a0<\/div>\n<div class=\"PageContainerComments\">\n<div>\n<div class=\"CommentContainerOffset\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Page-canvas-container\">\u00a0<\/div>\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Research Question \/Hypothesis\/ Independent Variable\/Dependent Variable<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The article addresses the following questions:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">1.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">How accurately can people distinguish real images from StyleGAN2 deepfake images?<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Do the Familiarization or Advice interventions improve participants\u2019 detection accuracy<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">or confidence?<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Hypotheses<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The authors propose that:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Participants given Familiarization or Advice will show improved accuracy compared to<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the control group.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Participants may exhibit confidence in their judgments regardless of actual accuracy.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Independent Variables<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Presence or absence of Familiarization intervention (viewing 20 deepfake examples<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">beforehand).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Presence or absence of Advice intervention (receiving specific cues for spotting<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">deepfakes).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Image type (real vs. StyleGAN2-generated deepfake).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Dependent Variables<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Accuracy of identifying each image as real or deepfake.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Confidence ratings associated with judgments.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Use of advice cues reported by participants.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Types of Research Methods used<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This study used quantitative experimental research.<\/span><\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\u00a0<\/div>\n<div class=\"PageAnnotations\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\n<div>\u00a0<\/div>\n<div class=\"Page-comment-line-top-margin\">\u00a0<\/div>\n<div class=\"PageContainerComments\">\n<div>\n<div class=\"CommentContainerOffset\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-3\" class=\"Page PageComponent\">\n<div class=\"Page-canvas-container\">\u00a0<\/div>\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">4<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Over 1,000 participants were randomly assigned to control, Familiarization, or Advice<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">conditions.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Participants viewed 100 images and made binary judgments (real or deepfake).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">They provided confidence ratings and self-reported cues used to make decisions.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Data were collected through a structured online decision task.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Types of Data Analysis used<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The authors used several quantitative analysis techniques:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Accuracy scoring<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to determine overall performance.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Signal Detection Theory (d\u2032)<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to measure sensitivity independent of response bias.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ANOVA tests<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to compare d\u2032 across conditions and assess statistical significance.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Descriptive statistics<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(mean accuracy, confidence levels, response times).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Comparisons of per-image accuracy<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to see which stimuli were most or least difficult.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Connections to other Course Concepts<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This study directly connects to cybersecurity and social science concepts discussed in class:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Human Vulnerability &amp; Social Engineering:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The research shows humans are<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">overconfident and inaccurate\u2014conditions that attackers exploit.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Misinformation and Trust:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Deepfakes challenge trust in digital media, a recurring topic<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">in the course.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cognitive Biases:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Overconfidence bias appears clearly\u2014participants believed they were<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">accurate even when they were not.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Media Effects:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Exposure to synthetic media influences perception and judgment.<\/span><\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\u00a0<\/div>\n<div class=\"PageAnnotations\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\n<div>\u00a0<\/div>\n<div class=\"Page-comment-line-top-margin\">\u00a0<\/div>\n<div class=\"PageContainerComments\">\n<div>\n<div class=\"CommentContainerOffset\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-4\" class=\"Page PageComponent\">\n<div class=\"Page-canvas-container\">\u00a0<\/div>\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">5<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Technological Determinism:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The power of StyleGAN2 demonstrates how technology<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">shapes human behavior and societal risks.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Risk Perception:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Users assume they can detect fakes, but the study shows this<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">perception is flawed.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cybercrime &amp; Fraud:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Deepfakes can enable identity theft, impersonation, and online<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">scam activities, reinforcing course lessons.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Connections to the Concerns or contributions of Marginalized Groups<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The article notes that<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">older adults<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">may be especially vulnerable to deepfake deception due to<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">reduced familiarity with technology, potential visual limitations, or increased targeting by<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">fraudsters. While the study\u2019s sample was mostly young adults, it emphasizes the need for future<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">research focused on older populations to assess their risk.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Overall societal contributions of the study\/Conclusion<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This study contributes to society by demonstrating that humans are not reliable detectors<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of deepfakes and that simple interventions are ineffective. As deepfake technology becomes<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">more advanced\u2014allowing changes in lighting, background, facial expression, and even matching<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">an existing person\u2019s identity\u2014the potential for misuse increases. Combined with accessible<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">audio deepfakes, attackers can construct fully synthetic identities at scale.<\/span><\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\u00a0<\/div>\n<div class=\"PageAnnotations\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\n<div>\u00a0<\/div>\n<div class=\"Page-comment-line-top-margin\">\u00a0<\/div>\n<div class=\"PageContainerComments\">\n<div>\n<div class=\"CommentContainerOffset\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-5\" class=\"Page PageComponent\">\n<div class=\"Page-canvas-container\">\u00a0<\/div>\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">6<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Reference<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Article Link:<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Testing human ability to detect \u2018deepfake\u2019 images of human faces<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Sergi D<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Bray<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Shane D Johnson<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Bennett Kleinberg<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Journal of Cybersecurity<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, Volume 9, Issue 1, 2023, tyad011,<br \/><br \/><br \/><br \/><\/span><\/div>\n<\/div>\n<h2>Article review 2<\/h2>\n<div class=\"Page-container\">\n<div>\n<div class=\"PageContainerComments\">\n<div>\n<div class=\"CommentContainerOffset\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Page-canvas-container\">\u00a0<\/div>\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Assessing the impacts of cyberbullying is hindered by the challenges of the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">evolving nature of digital communication.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Independent Variables (IV)<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">o<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Age groups of social media users<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">o<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Types of social media platforms<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">o<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Definition criteria used in studies<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Dependent Variable (DV)<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">o<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Incidence and severity of cyberbullying incidents<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">o<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Reported psychological and social impacts on victims<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Research Methods<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The study employs systematic literature review, analyzing existing research articles,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">surveys, and case studies related to cyberbullying on social media. This approach allows<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the authors to synthesize a wide range of data and perspectives, providing a<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">comprehensive overview of the current state of knowledge on the topic. By reviewing<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">various studies, the research identifies common themes, discrepancies, and gaps in<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">existing literature, offering insights into the complexities of defining and measuring<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cyberbullying.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Data Types and Analysis<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The data analyzed in this study are primarily qualitative, derived from peer-reviewed<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">journal articles, reports, and surveys. The authors categorize and compare findings from<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">different studies to identify patterns and inconsistencies. The analysis focuses on the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">definitions of cyberbullying, reported prevalence rates, and the methodologies used to<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">assess its impacts. By examining these aspects, the study highlights the challenges in<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">creating standardized measures for cyberbullying and underscores the need for more<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">robust research designs.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Connection to PowerPoint Concepts<\/span><\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\u00a0<\/div>\n<div class=\"PageAnnotations\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\n<div>\u00a0<\/div>\n<div class=\"Page-comment-line-top-margin\">\u00a0<\/div>\n<div class=\"PageContainerComments\">\n<div>\n<div class=\"CommentContainerOffset\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Page-canvas-container\">\u00a0<\/div>\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The concepts discussed in the course PowerPoint presentations, such as social norms,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">digital ethics, and the role of technology in shaping behavior, are directly applicable to the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">findings of this study. The research underscores how social media platforms can influence<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">individual behavior and societal norms, often in ways that are not fully understood or<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">regulated. It also touches upon ethical considerations in digital interactions, emphasizing<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the need for responsible use of technology and the development of policies to protect<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">users from harm.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Relation to Marginalized Groups<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cyberbullying disproportionately affects marginalized groups, including LGBTQ+<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">individuals, racial minorities, and those with disabilities. The study highlights how these<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">groups are often targeted more frequently and severely on social media platforms. The<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">challenges in defining and measuring cyberbullying can exacerbate the difficulties faced<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">by these individuals, as their experiences may be underreported or misunderstood. The<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">research calls for more inclusive and sensitive approaches to studying and addressing<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cyberbullying, ensuring that the voices of marginalized communities are heard and their<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">needs are met.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Contributions to Society<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This study contributes to society by providing a clearer understanding of the complexities<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">surrounding cyberbullying on social media. It emphasizes the importance of standardized<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">definitions and methodologies in researching digital harassment, which can inform policy<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">development, educational programs, and support services for victims. By shedding light on<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the prevalence and impact of cyberbullying, the research advocates for a more informed<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and proactive approach to combating this issue, ultimately fostering safer and more<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">inclusive online environments.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Conclusion<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In conclusion, Ray et al.&#8217;s study offers valuable insights into the multifaceted issue of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cyberbullying on social media platforms. By examining definitions, prevalence, and impact<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">assessment challenges, the research contributes to a deeper understanding of how digital<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">interactions can affect individuals and society. The study&#8217;s findings underscore the need<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for standardized approaches in researching cyberbullying and highlight the importance of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">addressing the concerns of marginalized groups. As social media continues to play a<\/span><\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\u00a0<\/div>\n<div class=\"PageAnnotations\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\n<div>\u00a0<\/div>\n<div class=\"Page-comment-line-top-margin\">\u00a0<\/div>\n<div class=\"PageContainerComments\">\n<div>\n<div class=\"CommentContainerOffset\">\u00a0<\/div>\n<\/div>\n<\/div>\n<div>\u00a0<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-3\" class=\"Page PageComponent\">\n<div class=\"Page-canvas-container\">\u00a0<\/div>\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">central role in daily life, this research is crucial in guiding efforts to create safer and more<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">equitable digital spaces.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">References<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/academic.oup.com\/cybersecurity\/article\/10\/1\/tyae026\/7928395?searchresult=1<\/span><\/div>\n<\/div>\n<div>\u00a0<\/div>\n<\/div>\n<div><br \/>\n<p><strong>Cybersecurity Professional Career Paper<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Student Name: Ivan Ofosu<\/p>\n<p>School of Cybersecurity, Old Dominion University<\/p>\n<p>CYSE 201S: Cybersecurity and the Social Sciences<\/p>\n<p>Instructor Name: Diwalkar Yalpi<\/p>\n<p>Date: 11\/16\/2005<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Introduction<\/strong><\/p>\n<p>With cyber threats constantly evolving, the role of a Cyber Defense Analyst is more crucial than ever. These professionals serve as the first line of defense against cyberattacks, monitoring networks, analyzing threats, and mitigating vulnerabilities to protect critical information. As organizations increasingly rely on digital infrastructure, Cyber Defense Analysts ensure the confidentiality, integrity, and availability of data, helping maintain public trust and operational continuity I will explore how social science principles intersect with the work of Cyber Defense Analysts, the application of key cybersecurity concepts, the implications for marginalized groups, and the societal contributions of the profession.<\/p>\n<p><strong>Social science principles<\/strong><\/p>\n<p>Cyber Defense Analysts rely heavily on social science research to understand human behaviors that impact cybersecurity. Social science principles, such as behavioral analysis, decision-making, and risk perception, help analysts anticipate how users may respond to phishing attempts, malware, or insider threats (Huntress, n.d.). By understanding organizational culture and human factors, analysts can design effective security training programs, influence user behavior, and implement policies that reduce human error\u2014a major contributor to cybersecurity incidents. Additionally, ethical considerations rooted in social sciences guide analysts in balancing security with privacy and accessibility (CISA, n.d.).<\/p>\n<p><strong>Application of Key Concepts<\/strong><\/p>\n<p>Cyber Defense Analysts integrate technical and social science concepts in their daily routines. They use Security Information and Event Management (SIEM) tools, intrusion detection systems, and network analysis frameworks to monitor anomalies and detect threats proactively (Huntress, n.d.; CISA, n.d.). Knowledge of risk management, human-computer interaction, and decision-making under uncertainty allows analysts to prioritize threats and coordinate incident response effectively. These professionals also apply threat intelligence to predict adversary behavior, assess organizational vulnerabilities, and develop mitigation strategies, reflecting the application of key cybersecurity concepts learned in class (Merit America, n.d.).<\/p>\n<p>For example, understanding how social engineering exploits human behavior enables analysts to craft policies that prevent successful phishing attacks. They combine this knowledge with technical skills in Python, SQL, and endpoint detection to analyze data and implement security measures, illustrating the interplay between social science and cybersecurity expertise (Huntress, n.d.).<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Marginalization<\/strong><\/p>\n<p>Cyber Defense Analysts must consider the implications of cybersecurity for marginalized groups. Unequal access to technology, limited digital literacy, and increased targeting in cyberattacks make certain populations more vulnerable. Analysts design training and security policies that are accessible and inclusive, addressing disparities in understanding and access (CISA, n.d.). Furthermore, the cybersecurity profession increasingly emphasizes diversity in hiring to better represent and understand the needs of all user populations. By integrating equity into their strategies, analysts help ensure that cybersecurity measures protect everyone fairly, reducing the disproportionate impact of cyber threats on marginalized communities (Merit America, n.d.; Huntress, n.d.).<\/p>\n<p><strong>Career Connection to Society<\/strong><\/p>\n<p>Cyber Defense Analysts play a critical role in maintaining societal infrastructure and public trust. They protect financial systems, healthcare networks, government databases, and other essential services from disruption. Their work supports compliance with regulations such as HIPAA and GDPR, preventing breaches that could compromise sensitive information or endanger lives (Huntress, n.d.; CISA, n.d.). Public policies governing cybersecurity benefit from the insights these analysts provide, enabling organizations to implement standards that strengthen overall societal resilience.<\/p>\n<p><strong>Scholarly Journal Articles<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Source 1: CISA. (n.d.). <em>Cyber defense analyst.<\/em> Cybersecurity &amp; Infrastructure Security Agency. <a href=\"https:\/\/www.cisa.gov\/careers\/work-rolescyber-defense-analyst\">https:\/\/www.cisa.gov\/careers\/work-rolescyber-defense-analyst<\/a><\/li>\n<li>Source: 2Huntress. (n.d.). <em>What does a security analyst do?<\/em> Huntress. <a href=\"https:\/\/www.huntress.com\/cybersecurity-101\/topic\/what-does-security-analyst-do\">https:\/\/www.huntress.com\/cybersecurity-101\/topic\/what-does-security-analyst-do<\/a><\/li>\n<li>Source 3: Merit America. (n.d.). <em>Cybersecurity career track.<\/em> Merit America. <a href=\"https:\/\/meritamerica.org\/career-tracks\/cybersecurity\/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=Google_Grants_Search_NB_Cybersecurity_Broad&amp;utm_term=cyber%20security%20course&amp;gclid=Cj0KCQiAiebIBhDmARIsAE8PGNK5qthmNBa6zR283snqZ3HFO_o0jvCb88lmfMphvC04n1gc44Ps3VoaAlBfEALw_wcB&amp;gad_source=1&amp;gad_campaignid=20766177523&amp;gbraid=0AAAAAo9cod5xdSgf5jYiM7gCBBpKURnQA\">https:\/\/meritamerica.org\/career-tracks\/cybersecurity\/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=Google_Grants_Search_NB_Cybersecurity_Broad&amp;utm_term=cyber%20security%20course&amp;gclid=Cj0KCQiAiebIBhDmARIsAE8PGNK5qthmNBa6zR283snqZ3HFO_o0jvCb88lmfMphvC04n1gc44Ps3VoaAlBfEALw_wcB&amp;gad_source=1&amp;gad_campaignid=20766177523&amp;gbraid=0AAAAAo9cod5xdSgf5jYiM7gCBBpKURnQA<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-content\/uploads\/sites\/39733\/2025\/12\/annotated-Cybersecurity20Presentation.pptx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Cybersecurity20Presentation.pptx.\"><\/object><a id=\"wp-block-file--media-869f9f7a-9834-455f-891d-fe4a86a533fe\" href=\"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-content\/uploads\/sites\/39733\/2025\/12\/annotated-Cybersecurity20Presentation.pptx.pdf\">annotated-Cybersecurity20Presentation.pptx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-content\/uploads\/sites\/39733\/2025\/12\/annotated-Cybersecurity20Presentation.pptx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-869f9f7a-9834-455f-891d-fe4a86a533fe\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences\u00a0 Article review 1 Introduction\/BLUFThis article investigates how accurately people can identify StyleGAN2-generated deepfakeimages and whether simple interventions\u2014familiarization or advice\u2014improve detectionaccuracy. People are slightly better than chance at detecting deepfakes, but the interventionstested did not improve performance, and participants were overconfident in their inaccuratejudgments.Relation\/Connection to Social Science PrinciplesThis study strongly incorporates&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ivaneport\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":30669,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-json\/wp\/v2\/users\/30669"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-json\/wp\/v2\/pages\/141\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ivaneport\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}