Career Paper

https://docs.google.com/document/d/1FhDzlgNr9TutMYi5wpjLGcbAszUpoIChQfUZhEujh4A/edit?usp=sharing Career Paper: Security Consultant Abstract In this paper, we will discuss the complexities of the cybersecurity career of security consultant and its interdependence on social science. With details on the career and its tasks, we will gain further insight into some of the foundational concepts of science that are included. There are many different…

Article Review 02

https://docs.google.com/document/d/1oOhf0O-8NlWT_wlSapB0-iTMJkHOsoZYeHwXr9jUthM/edit?usp=sharing Cyber Criminology: An analysis of the Indonesian and the United States Police Perception: An Article Review Principles of Social Science This article, Cyber Criminology: An analysis of the Indonesian and the United States Police Perception, allows for the understanding that cyber crime throughout the world contains elements of social science. Indonesia, in contrast to…

Article Review 01

https://docs.google.com/document/d/19e_4GBu-KPy66MbN-AjPVzPvW-0g5TBdqV5f3VEDGoc/edit?usp=sharing Article Review: Digital Criminal Investigations in the Era of Artificial Intelligence: A Comprehensive Overview Principles of Social Science The article dives right into some of the core principles of social science: the scientific method, analytical methods of data collection, and empirical observation of evidence. The scientific method details: a question posed, research of a…

Journal Entry 15

The Pathway to your Career: In this TED Talk, David goes on to tell his story on how he traveled through the difficult stages of settling down into a career. For him, it was not a straight shot into his final choice. Choosing a career path can be very scary, especially when you don’t know…

Journal Entry 14

Top 5 Violations: https://clario.co/blog/illegal-things-you-do-online/ Using unofficial streaming services – involves accessing copyrighted content through unauthorized streaming platforms instead of using legal streaming services like Netflix or Hulu. It’s severe because it undermines the rights of content creators and distributors. When people use unofficial streaming services, they’re essentially stealing content, depriving creators of the income they…

Journal Entry 13

Literary Review, the use of policies: https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true Essentially, bug bounties are like big games where companies invite people, hackers, to find problems with their websites, apps, or computer systems. These hackers aren’t bad guys; they’re actually good at finding mistakes that could let in the bad guys. When they find a problem, they tell the…

Journal Entry 12

Economic Theories & Social Science Theories: https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf This letter is an example showing the response of a company that has reported a data breach to its clients. In this instance, a data breach had occurred the previous year and was informing member of the instance. See the following chart based upon a few theories, both…

Journal Entry 11

Cybersecurity Analyst & Social Behaviors: The biggest takeaway could be argued as: awareness. Many users that conduct business and operations online, do not know enough about protecting themselves, their data, or their devices. Cybersecurity Analysts monitor security systems, provide incident responses and reports, develop policy, and more. In relation to social behaviors, there is a…

Journal Entry 10

An Article on Social Cybersecurity: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ In this article, we discuss the increasing concern and respect to cybersecurity as a means of national security. Cyber criminals have had a large increase in attack rates and even so, success rates. With a rise in criminal activity, the need for prevention and refurbishing has become more prominent….

Journal Entry 09

The Social Media Disorder Scale/Internet Gaming Disorder Scale: https://www.brieftherapyconference.com/download/handouts/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf After completing the social media disorder scale, I tested pretty well. While we do live in a more digital age, where everyone is “addicted” to their phones, I feel that it not difficult for me to disconnect. While I do have social media apps on my…