Digital Forensics Investigator Career’s Relation to the Social Sciences

In this video, Davin Teo describes what a digital forensic investigator is. He talks about his career path, starting when he was an accountant, and how his experience in IT work began while he was simultaneously handling his accounting responsibilities. Ultimately, he became the director of the Forensic Technology team within Alvarez & Marsal Global…

Career Paper – The Role of Social Science in Security Awareness and Training

Introduction to Security Awareness and Training SpecialistsIn the ever-evolving landscape of cybersecurity, security awareness and training (SAT) specialists play a pivotal role in safeguarding individuals and organizations from cyberattacks.  Their expertise lies in educating and empowering individuals to protect themselves from cyber threats, a task which requires a deep understanding of human behavior and social…

Illegal Internet Activities

This blog post is about illegal activities on the Internet.  The author describes them as things that are “quite common, but may lead to unwanted consequences” (Slynchuk, 2021).  The top 5 activities that it discusses includes using unofficial streaming services, torrent services, copyrighted images, sharing personal information, and cyberbullying.  Unofficial streaming services essentially include any…

Summary of Journal Article about Bug Bounty Programs using HackerOne data

This article, “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties,” by Kiran Sridhar and Ming Ng, discusses the use of bug bounty policies to improve cybersecurity.  They present bug bounty policies as something that relates cybersecurity to economics, because they’re based on cost/benefits principles.  This journal article is based…

A cybersecurity analyst job’s relation to social behaviors

In this video, Nicole describes what a cybersecurity analyst is.  Within this, she either mentions or refers to a few different social themes.  One of these is awareness; as a cybersecurity analyst, one would “be providing guidance and training for user awareness” (Enesse 2021).  Also, this includes being aware of the latest cyber threats, as…

Social Cybersecurity as a National Security Requirement

Today, I read the article “Social Cybersecurity: An Emerging National Security Requirement” by Lieutenant Colonel David M. Beskow and Dr. Kathleen M. Carley.  The article discusses the growing threat of social cybersecurity attacks and the need for a comprehensive approach to defending against them.  I was especially interested in the sections of the article that…

Article Review of “‘Elder Scam’ Risk Profiles”

Introduction and research questions/hypothesis“‘Elder Scam’ Risk Profiles: Individual and Situational Factors of Younger and Older Age Groups’ Fraud Victimization,” written by Katalin Parti, Ph.D., and published in the International Journal of Cybersecurity Intelligence & Cybercrime in November of 2022, collected quantitative and qualitative data from 2,558 individuals who were remaining in the final sample of…

Social Media Disorder

The video attached to this assignment (youtube.com/watch?v=Zbqo7MGVElw) was interesting because it shows how addicted Dave is to the social media platform he’s using.  It doesn’t really matter what social media it is (e.g., WhatsApp, SnapChat, Instagram, Twitter, Facebook, Google+, Pinterest, forums, weblogs); what matters is the realization of how much his social network means to…

Hacking in the Media

While technology has been an interesting subject in movies for a long time, cybersecurity in particular has become an increasingly popular topic in movies since sometime in the 80’s.  However, the media does not always necessarily portray the reality of the cybersecurity field, and what the best computer security habits and processes are.  There have…