After watching the digital forensics video, I suddenly realized how much this profession is aligned with the social sciences. Teo’s career journey shows that understanding human behaviors is just as important as understanding the technology. Digital forensics specialists are not simply file recovery experts. Digital forensics investigators are looking to discover the “why” behind their actions, very similar to a psychologist or a sociologist. I thought it was cool how Teo hadn’t planned to enter the field of digital forensics, but that his interest in figuring problems out and how people behaved eventually brought him to this career path. His journey shows how a career in digital forensics requires technological skills and an understanding of human beings, so this was a good example of the intersection of technology and social sciences.
Journal Entry 14
Andriy Slynchuk points out a lot of things people do online that might seem harmless but areactually illegal, and some of them are pretty serious. An example is collecting information aboutkids online without proper consent is a big deal because it puts minors at risk and violatesprivacy laws like COPPA. Pretending to be someone else…
Journal Entry 13
This article looks at how bug bounty programs help companies find security flaws by paying ethical hackers to test their systems. The literature review explains that these programs are popular because they’re often more cost-effective than hiring large in-house security teams. In the findings, the authors point out that the success of a program really…
Journal Entry 12
The data breach letter from Glasswasherparts.com connects to a few key ideas from economics and psychology. Economically, it shows information asymmetry—the company and its platform provider knew about the breach before telling customers, which meant people were at risk without even knowing it. It also ties into transaction cost economics, because now customers have to…
Journal Entry 9
Social Media Disorder Scale (SMD Scale) Please answer the question by thinking of yourexperience with using social media (e.g., WhatsApp, Snapchat, Instagram, Twitter, Facebook,Google+, Pinterest, forums, weblogs) in past year. Answer the questions as honestly aspossible. According to DSM, at least five (out of the nine) criteria must be met for a formaldiagnosis of “disordered…
Journal Entry 8
After watching the video, I noticed how much the media is in cybersecurity. Movies and TV shows sometimes exaggerate hacking, making it look very flashy and instant, but in real life, it usually requires patience, skill, and knowing what you are doing, which requires a lot of knowledge. In movies and shows, usually the hackers…
Journal Entry 7
When the system says your password is too weak, but you’ve already used all the ones you can remember.” This shows the struggle of password fatigue, where users create weak or repeated passwords because remembering complex ones is too difficult. A human-centered approach would promote password managers or alternative authentication methods to ease the burden….
Journal Entry 6
Memcyco Forest VPN
Journal Entry 5
1. Psychological Theories of Cyber Offending – This covers a wide range of factors influencing cybercrime, making it the best overall explanation. 2. Cognitive Theories and Cyber Offending – Explains how offenders think, justify their actions, and assess risks, which is crucial in cybercrime. 3. Neutralization Theory – Shows how offenders rationalize their behavior to avoid guilt, which…
Journal Entry 11
I learned that this job requires a lot of communication and that picking the place where you want to work would depend on whom you talk to and interview for. If you are trying to work in a place like Washington, D.C., you would most likely need a clearance because you will be working a…