Article Review #1: Testing Human Ability to Detect ‘Deepfake’ Images of Human Faces:Kevin Person February 15,2025IntroductionThe Article “Testing Human Ability to Detect ‘Deepfake’ Images of Human Faces” by Nightingale, Wade, and Watson (2023), publishes in the Journal of Cybersecurity, explores the effectiveness of human detection of deepfake images generated by StyleGAN2. The study examines the…
Category: CYSE 201S
Article #2
Article Review 2Cyberbullying and Psychological Stress among Female EmployeesThe article “Cyberbullying and Psychological Stress among Female Employees”by Mohammed A. Al Doghan and Saman Arshad explores the negative impact ofworkplace cyberbullying on female employees in Saudi Arabia. The study examines the relationship between cyberbullying, psychological stress, organizational commitment, perceived interactional justice, and job satisfaction. This research…
NICE Framework
The seven categories of the NICE workforce framework of Cybersecurity are all very important, but oversight and governance (OG), investigation (IN), and cyberspace effect (CE) is more appealing to my employment history. I always held a position of leadership in my career and with these certain focus roles, I could easily adapted to the role…
Maslow’s Hierarchy of Need
Maslow’s Hierarchy of Needs connects to my digital experiences in various ways. The bottom tier is physiological needs, it provides access essential services like food and health. DoorDash and Uber Eats are useful when no time to cook. Fitness apps provide improvements in health by monitoring levels and goals. Safety needs is the next tier…
Top 3 Motives
1. Financial Gain (Most Sensible): The article “Sex, Drugs, and Toilet Rolls” article discusses how cybercriminals use stolen funds to support their lifestyles. Money is the most common and practical reason for cybercrime. Hackers often steal data, conduct fraud, or use ransomware to make money. 2. Hacktivism (Political/Activism): The “Hacktivism Wave” article describes how young…
Fake Website
Fake websites attempt to deceive users by imitating legitimate platforms. For example, a fake PayPal website (e.g., “paypall-login.com”) mimics PayPal’s login page to steal credentials, whereas the real PayPal site (paypal.com) has a secure HTTPS connection and verified domain (Aura). Another is DMV sites (e.g., “dmv-services.org”) tricks users into paying fake fees, while official DMV…
Funny Memes
file:///Users/kevinperson79icloud.com/Downloads/annotated-Meme%2520journal.docx.pdf
Hacker Movies. Are they true?
After watching this video, I am convinced that Hollywood hackers have the easiest jobs in the world. In. ovies, all they need to do is dramatically type random gibberish, yell “I’M IN,” and suddenly, the Pentagon’s security system collapses like a house of cards. Meanwhile real hackers spend hours troubleshooting why their Wi-Fi will not…
Social Disorder
1. How did I score? I received a score of 0 “yes” on the Social Media Disorder scale, indicating that I do not exhibit signs of social media addition based in the criteria used in the assessment. 2. What do you think about the items on the scale? The items in the scaled seem to…
Military Review of Social Cybersecurity
The Military Review of Social Cybersecurity highlights the critical role human behavior plays in cybersecurity threats and defenses. It shows how adversaries manipulate social structures and behaviors to exploit vulnerabilities, particularly through misinformation, phishing, and psychological operations. One key takeaway is the use of social engineering tactics by actors with malicious intent. Instead of relying…