CYSE 201S Cybersecurity and Social Science

Journals

  • Career Professional Paper

    Introduction Cybersecurity policy analysts are pivotal in shaping effective strategies to safeguard digital infrastructures, yet their impact extends beyond technology. In today’s interconnected world, where the intersection of technology, society, and governance becomes increasingly intricate, a comprehensive understanding of human behavior, societal dynamics, and policy implications has become imperative. Social science research forms the cornerstone……

  • Journal #15 Digital Forensics Investigator Davin Teo

    Davin Teo’s talk was fascinating as there was no established training or formal program for digital forensics when he got his big start. I found his story of how he succeeded as a digital forensics investigator to be unique and lucky to get into the ground floor of digital forensics. His first real opportunity was……

  • Journal #14 Five things you unknowingly do online that are illegal.

    The article provides excellent insight for the average user to reflect on their activities on the internet and correct any behavior that may lead to unforeseen consequences. The average internet user will probably not think twice about visiting illegal streaming sites hosting movies and TV shows to avoid paying a subscription or one-time fee. Using……

  • Journal #13 Bug Bounty and Vulnerability Disclosure Policy

    Bug bounty programs and vulnerability disclosure policies represent crucial aspects of cybersecurity that promote proactive identification and resolution of security flaws. These initiatives signify a shift towards a more collaborative and transparent approach to addressing systems and software vulnerabilities. Bug bounty programs incentivize ethical hackers to responsibly report vulnerabilities, fostering a community-driven effort to enhance……

  • Journal #12 Data Breach Notification in relation to Economics theories and Social Science theories

    A data breach notification letter, which informs individuals or organizations about a security incident involving their data, can be analyzed through various economic and social science theories: Classical economics theory focuses on market efficiency, rational decision-making, and the role of self-interest in economic interactions. Individuals and organizations may act rationally based on their self-interests and……

  • Journal #11 Cybersecurity Analyst

    The role of a cybersecurity analyst intertwines with various social themes, reflecting a complex interplay between technology and human behavior: These themes highlight how the responsibilities of a cybersecurity analyst resonate with broader societal values, emphasizing security, collaboration, and ethical considerations in the digital landscape.