{"id":303,"date":"2025-02-07T00:08:32","date_gmt":"2025-02-07T00:08:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jbran053\/?page_id=303"},"modified":"2025-05-02T02:38:12","modified_gmt":"2025-05-02T02:38:12","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jbran053\/cyse-201s\/","title":{"rendered":"CYSE 201"},"content":{"rendered":"\n<p>Article Review #1<\/p>\n\n\n\n<p>Article Review #1<\/p>\n\n\n\n<p>Links: https:\/\/vc.bridgew.edu\/ijcic\/<br>https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/4<br>DIRECTOR<br>The counterattack of cybercrime Article 1<br>Jeremiah Branch<br>02\/22\/25<\/p>\n\n\n\n<p><br>BLUF: Today, I am writing a research article about how Dr. Choi attempts to counterattack<br>his research about humans and technology with crime using the Cyber-RAT theory he<br>developed.<\/p>\n\n\n\n<p><br>Principles of Social Science:<br>After reading these three articles, I like how they bring out the principle of social<br>sciences. They use empiricism to study criminology attacks on us to prepare for<br>upcoming situations. They use parsimony to help them bring the human approach to a<br>simplified matter in need.<\/p>\n\n\n\n<p><br>Research and Hypothesis<br>Dr. Choi was researching the intersection of humans and technology and how criminal justice<br>can be responded to faster when a crime occurs. He used Track records of law enforcement<br>training programs and came up with a theory called Cyber-Routine Activities Theory (Cyber-<br>RAT). It explains the specifics of cybercrime and how to figure out the pattern of what will<br>happen from the activities that have been happening in crime. With the newly founded theory he<br>introduced, we can bring the cybercrime rate down to a bare minimum.<\/p>\n\n\n\n<p><br>Data and Analysis<br>Cyber-RAT, used in healthcare, has been revolutionized by Cyberattacks, which have been<br>causing risks and causing hackers to target it. The data collected shows that we have very<br>vulnerable security when it comes to hiding patients&#8217; files within the computer system, causing<br>their information to get stolen. The analysis explores the motives behind these attacks and<br>makes more things susceptible.<\/p>\n\n\n\n<p><br>Concept of PowerPoint slide and topics<br>The whole article is about using the empiricism of the social sciences from PowerPoint to study<br>cases of crime attacks to prevent any new ones from the Cyber-RAT with the framework shown.<br>The challenge with dealing with this problem is that cyberspace and technology are constantly<br>evolving; each time, we must prepare ourselves for what will happen.<\/p>\n\n\n\n<p>Links: https:\/\/vc.bridgew.edu\/ijcic\/<br>https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/4<br>DIRECTOR<br>I conclude that Dr. Choi is using his theory and the data he gathers to attempt to help criminal<br>justice out to a bare minimum. Still, as technology improves, we keep adapting towards it to a<br>better understanding between the years of having it.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Article Review #2<\/p>\n\n\n\n<p>Article #2<br>By: Jeremiah Branch<br>4\/ 17\/ 2025<br>Electronic Civil Contract and Commercial Codes<br>BLUF: Today, we are going to read various journals from different cybersecurity fields to gain<br>an understanding, such as Criminology, Sociology, Victimology, and Internet science. And we<br>are going under one of those Articles from the Title above.<\/p>\n\n\n\n<p>Reading this article and going through it shows different types of principles in what we talk about, and it mostly talks about Sociology and different theories of criminology, because it&#8217;s under some law too. This is about electronic contracts and how significant they can be, as well as contracts that are used under legal agreements and are formed and executed through a digital print. It&#8217;s under those two points because they can impact the world differently. They use Pasiomy when they do hypothesis and exams, and choose the simplest task because it&#8217;s the most straightforward one. They use Empiricism and they analyze the data from observation experiences, from looking at online transaction behaviors, preferences from customers, and how advanced our technology it will tell us how the lawmakers should act accordingly. They use a Determinism a small bit because with the information they collected, they can determine how they should proceed with the process of lawmaking and how to manifest the regulations online. Finally, they use skepticism to justify the questions that were going on within the ECCC and accept the beliefs that there was no evidence when doing the electronic transaction.&nbsp;<\/p>\n\n\n\n<p>Hypothesis or Question<\/p>\n\n\n\n<p>I hypothesize that as technology grows and evolves at a fastly rate then there will be a significant increase in legal identification in the contracts when it comes to jurisdiction. I created this hypothesis because it was how we need to adapt to the electronic contract agreement, and they are starting to realize the beginning of the forms to actual be legal in the world and we need to shift our perspective and try to inspire the change with technology growing as a whole and making things more outdated<\/p>\n\n\n\n<p>The 3 questions I have are&nbsp;<\/p>\n\n\n\n<ul>\n<li>How and what do current codes accommodate on contracts?<\/li>\n\n\n\n<li>What challenges can occur from doing this?<\/li>\n\n\n\n<li>How do they attack large groups from an economic standpoint?<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Different Methods Used<\/strong><\/h3>\n\n\n\n<p>In this article, they use a giant analysis like case studies, interviews from big companies, or targeted locations to gain their data. They mostly use the number of people doing the electronic contract and see if they are going to sign the agreement before just clicking. We all had a point or time where we just went to the bottom and signed the agreement instead of reading it.<\/p>\n\n\n\n<p>Challenges found within the group<\/p>\n\n\n\n<p>This Article talks about a couple of different challenges that were found in doing the electronic contract. There were issues with digital literacy and footprint, people needing help with internet access, and Privacy and security can take a toll because in groups we all share information within the contract, and what will happen if someone doesn&#8217;t follow and we terminate the contract, but still know all the information.<\/p>\n\n\n\n<p>Overall in the Society<\/p>\n\n\n\n<p>The summary is that when it comes to electronic agreements and contracts, we rely on them too heavily, and it has a huge impact on the cyber world. Leaving a lot of open questions and confusion on how we can improve our infrastructure.<\/p>\n\n\n\n<p>Conclusion<\/p>\n\n\n\n<p>After reading this article, I conclude that this ECCC has made a significant impact in many different ways, and it has been revealed as a technology enhancement, and it has changed the way we sign documents without having to be physically there to sign them with ink. With the data and information they collect and they not only force the electronic contract but they also connect with some practices. As Digital contracts increase, we have to make sure that the agreements have to come with an understanding behind them.<\/p>\n\n\n\n<p><a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/267\/95\">View of The Electronic Contract in Civil and Commercial Codes<\/a><\/p>\n\n\n\n<p>Career Paper:<\/p>\n\n\n\n<p>Data Analyst Career Paper<br>By: Jeremiah Branch Date: 4\/17\/2025<br>Student from Old Dominion University<\/p>\n\n\n\n<p><br>BLUF: Today, I will write a career paper that relies on social science research and the<br>principles of those careers and how professionals will use them in their day-to-day lives.<\/p>\n\n\n\n<p><br>Social science principles. When you enter the field of data analysis, there&#8217;s a basic context of<br>applied behaviors when doing so cannot forget the philosophical social principles of<br>cybersecurity. Each of the roles in the principles plays a key part in making sure our data is<br>collected fast and effectively. Parsiomy can be used in being a data analyst when they ask for the<br>simplest or \u201cstraight to the point \u201c when asking for an alternative instead of making it complex.<br>Empiricism can rely on evidence or observational details when leading it up to conclusions with<br>quantitative data. Determinism is trying to understand that not everything was a conscious<br>decision, and with all the past information that was being studied, there must be a pattern or a<br>behavior that is happening within the system, and we need to determine when the next action<br>will be. Objectivism is the final one, and we need to highlight our collections of data to so our<br>results can be replicated across the board.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Key concepts of Applications&nbsp;<\/strong><\/h4>\n\n\n\n<p>The key concepts of applications when it comes to being a data analyst come down to whether you are ready to put these skills you have acquired in the real world. Skills like being able to soft program and technical skills, being able to use the application of both can get you very far. Another one is turning it into a purpose and a passion of learning a new set of data to choose from, and then applying it within your job for the experience. The third one is the hands-on experience when learning how to do it because it may be frustrating at first, but you can learn from different people there. The final one is the versatility of options you can be a data analyst from because it can open many different doors.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Marginalized Groups&nbsp;<\/strong><\/h2>\n\n\n\n<p>A Data Analyst plays a significant role when understanding and addressing the needs of marginalized groups. However, they face many different challenges when doing so. Data is very important when it comes to unique skillsets and challenges, which can include a lot of human factors. Many different challenges include: Access to data when the information is overlooked at and then the lack of access is handed out. Resource limitations, when groups get together, they tend to make a plan, limit budgets, and make it difficult to do robust data collections, handouts, and many more activities that can happen when in a group.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Connection with Society<\/strong><\/h3>\n\n\n\n<p>When we connect this to a real-world society, data analyst can do so much with their versatility when it comes to doing their jobs. It can make a lot of business decisions when it comes to a market plan, or when being in a job. They can analyze data sets and watch how the sales data, consumer marketing feedback, and research are so they can develop strategies to do so. Data analysis can also be used to solve health matters. They can pull up a giant data set of different patients or people that have been coming past the hospital and come up with strategies to cure or diagnose whatever they have so like a disease outbreak happens with the risk of everyone having the same diagnosis or test then they can come up with something so they can prevent it from happening.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Conculsion&nbsp;<\/strong><\/h5>\n\n\n\n<p>Overall, when I chose this topic of being a data analyst, it made me realize a lot of different stuff you can do with it, with just knowing how to make a data set and having the fundamentals and understanding of it. I know it&#8217;s not just what it is, but a data analyst is but knowing how to be one can open so many doors for someone and encourage people to do great things with it.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.geeksforgeeks.org\/data-analyst-roadmap\/\">Data Analyst Roadmap 2025 \u2013 A Complete Guide | GeeksforGeeks<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/viehealthcare.com\/healthcare-consulting\/\">Healthcare Consulting Services | VIE Healthcare Consulting<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/generalassemb.ly\/students\/courses\/data-analytics-bootcamp?utm_source=bing&amp;utm_medium=paid-search-nbr&amp;utm_campaign=SEM%7CNon_Brand%7CUSA%7CBootcamp%7CData_Analytics\">Data Analytics Bootcamp &amp; Certification | General Assembly<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"237\" src=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image.png\" alt=\"\" class=\"wp-image-310\" style=\"width:424px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image.png 474w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-300x150.png 300w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"790\" src=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-1-1024x790.png\" alt=\"\" class=\"wp-image-311\" style=\"width:458px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-1-1024x790.png 1024w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-1-300x232.png 300w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-1-768x593.png 768w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-1-389x300.png 389w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-1.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"567\" src=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-2-1024x567.png\" alt=\"\" class=\"wp-image-314\" style=\"width:484px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-2-1024x567.png 1024w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-2-300x166.png 300w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-2-768x426.png 768w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-2-541x300.png 541w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-2.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"954\" src=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-3.png\" alt=\"\" class=\"wp-image-315\" style=\"width:459px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-3.png 1024w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-3-300x279.png 300w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-3-768x716.png 768w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-3-322x300.png 322w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"316\" src=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-4.png\" alt=\"\" class=\"wp-image-316\" srcset=\"https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-4.png 474w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-4-300x200.png 300w, https:\/\/sites.wp.odu.edu\/jbran053\/wp-content\/uploads\/sites\/37418\/2025\/02\/image-4-450x300.png 450w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1 Article Review #1 Links: https:\/\/vc.bridgew.edu\/ijcic\/https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/4DIRECTORThe counterattack of cybercrime Article 1Jeremiah Branch02\/22\/25 BLUF: Today, I am writing a research article about how Dr. Choi attempts to counterattackhis research about humans and technology with crime using the Cyber-RAT theory hedeveloped. Principles of Social Science:After reading these three articles, I like how they bring out&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jbran053\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":29888,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/pages\/303"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/users\/29888"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/comments?post=303"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/pages\/303\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/pages\/303\/revisions\/342"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jbran053\/wp-json\/wp\/v2\/media?parent=303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}