Career Paper

Jaden Lewis The Security Analyst Profession and Social Science’s Role CYSE 201S 4/17/2025 Introduction In today’s global, connected world, cyber security professionals must understand not only code and infrastructure but human nature, social systems, and cybercrime motivators as well. A Security Analyst is one of the front lines of defending organizations against a wide variety…

Article Review #2

How AI Is Changing Cybercrime Jaden Lewis 4/12/2025 Introduction I have read, “Understanding the Use of Artificial Intelligence in Cybercrime” by Choi, Dearden, and Parti (2024), published in the International Journal of Cybersecurity Intelligence and Cybercrime. It is an introduction to an article on how artificial intelligence (AI) is used in cybercrime today. The article…

Article Review #1

Cyberbullying and Social Control Jaden Lewis 2/20/2025 Introduction I reviewed the article “Cyberbullying and Social Control: An Analysis of School Disciplinary Policies” by Kristen Zgoba (2023), published in the International Journal of Cybersecurity Intelligence and Cybercrime. The study explores how different high schools in the U.S. are addressing cyberbullying through policy, discipline, and education. It…

Journal Entry #15

After watching the video, I learned how the speaker’s path to becoming a digital forensics investigator ties into social sciences in many ways. His job involves understanding not just the technical side of cybercrime, but also the behavior and intentions of the people behind it. That means learning how people think, why they commit certain…

Journal Entry #14

After reading the article by Andriy Slynchuk, I think the five most serious online violations are cyberbullying, hacking, piracy, identity theft, and spreading malware. Cyberbullying can seriously affect someone’s mental health and even lead to tragic outcomes. Hacking is a major offense because it invades people’s privacy and can damage important systems. Piracy may seem…

Journal Entry #13

After reading the article, I learned that bug bounty policies are a smart way for companies to protect themselves by paying ethical hackers to find vulnerabilities before bad actors do. The literature review showed that companies are starting to realize how cost-effective these programs are compared to dealing with a major breach after it happens….

Journal Entry #12

After reading the sample breach letter, I can see how economics and social sciences relate to it. One economic theory that connects is cost-benefit analysis because the company had to weigh the cost of sending out notifications against the possible legal or trust issues if they didn’t. Another economic theory is supply and demand since…

Journal Entry #11

After watching the video, I noticed that being a cybersecurity analyst relates a lot to social behaviors. One big theme is trust, because analysts are trusted to protect personal and company information. Another social theme is teamwork. Analysts often have to work with different departments and communicate clearly to solve problems. Understanding human behavior is…

Journal Entry #10

After reading the article on social cybersecurity, I realized how important it is to look at cybersecurity from both a technical and social point of view. The article explained how threats aren’t just about hacking systems but also about targeting people’s beliefs and behaviors online. Things like fake news, misinformation, and online influence campaigns are…

Journal Entry #9

I scored a 2 on the Social Media Disorder Scale, which means I fall into the risky usage range. The only two “yes” answers I gave were for neglecting other activities and having occasional arguments related to my use. I think the items in the scale are good because they ask about more than just…