Journal #12

In analyzing the sample breach letter, we can explore how two different economic theories and two different social sciences theories relate to the situation described. Let’s discuss some possible connections: 1. Economic Theories: a) Cost-Benefit Analysis: This theory can be applied to understand the response and actions taken by the company regarding the data breach….

Journal #15

I find it fascinating how Davin Teo was able to find his passion in the intersection of technology and the social sciences. Digital forensics, as a field, requires a deep understanding of both the technical aspects of computer systems and the legal and ethical considerations that come into play. It seems that Davin was able…

Career Paper

In today’s digital landscape, cybersecurity analysts play a critical role in protecting organizations from evolving cyber threats. While technical expertise is vital, a thorough understanding of social science research and principles is equally essential. This essay explores how cybersecurity analysts require and depend on social science research and principles within their careers, highlighting the complexities…

Article Review 2

The International Journal Cybersecurity Intelligence & Cybercrime is a vital resource for in the field of social science cybersecurity. This article review focuses on the journal’s adherence to social science principles, the research questions and hypotheses it explores, the research methods employed, the types of data and analysis conducted, the intersection of sociology and cybersecurity,…

Article Review 1

The international Journal of Cybercriminology serves as an invaluable resource in the field of social science cybersecurity. This article review aims to explore the journal’s contributions to the principles of the social sciences, the research questions and hypotheses explored, the research methods and data analysis employed, how the concepts of the interconnectedness of psychology and…

Journal #14

Among the list of offenses listed the five violations that are particularly serious are faking your identity online, sharing private information of others, collecting information about children, illegal searches on the internet, and bullying and trolling. Faking your identity online can have serious repercussions as these individuals often use fake identities to commit fraud, deceive…

Journal #13

The article titled “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties” by Kiran Sridhar and Ming Ng provides insights into bug bounty programs and their economic implications. The authors present a literature review and discuss the findings based on their analysis of data from HackerOne, a leading bug bounty…

Journal #10

After reading the article I have gained valuable insights into the significance of social cybersecurity in the context of national security. The authors highlight the growing importance of addressing social cybersecurity threats, emphasizing that traditional cybersecurity measures are not sufficient in protecting against emerging risks in the digital age. They argue that social media platforms…

Journal #9

I scored 1-9 on the Social Media Disorder Scale. The items on the scale are interesting to me because I find it hard to believe that people would be addicted to social media enough to say yes to some of these things. Different patterns might be discovered as a result of various cultures and groups….

Journal #8

On screen, cybersecurity is depicted on screens as a series of rapid-fire keyboard strokes, a flurry of random lines of code replicated in real-time on a dark-themed screen. Rarely does the real underpinning knowledge, the effort required, and the actual methods utilized in hacking receive accurate representation in these dramatized versions of reality. This media…

Journal #7

The meme humorously anthropomorphizes a dog a s a cybersecurity specialist, reflecting the need to consider user characteristics when designing interactive cybersecurity systems. This highlights the importance of HSI in cybersecurity; just like a system that works for humans wouldn’t work for a dog, a system designed without considering the unique needs, characteristics, and limitations…

Journal #4

Maslow’s Hierarchy of Needs is a psychological theory proposed by Abraham Maslow that describes human motivation and the fulfillment of specific needs. The hierarchy is typically depicted as a pyramid divided into five levels, with each level building upon the previous one. These levels are psychological needs, safety needs, love and belonging needs, esteem needs,…

Journal #3

Researchers can use the information available on PrivacyRights.org to study data breaches in several ways. Researchers will be able to use the publicly available data to identify common patterns and trends. They can look for similarities in the types of organizations targeted, the methods used for the breach, the type of information compromised, and the…

Journal #2

The principles of science play a crucial role in the field of cybersecurity so I will take a look at each principal individually:

Journal #1

When reviewing the NICE Workforce Framework there are certain areas that I would want to focus my potential career as a cybersecurity analyst on. Some areas that appeal to me the most are: On the other hand, the areas that appeal to me the least are:

Journal #1

I am interested in cybersecurity technology because it plays a crucial role in ensuring the security and privacy of individuals, organizations, and nations in the modern digital age. With there being an increasing reliance on technology and the multiplication of online threats, cybersecurity has become an essential field to protect sensitive information, prevent cyber attacks,…