Career paper Cybersecurity Analysts: The Role of Social Science in Cybersecurity The career of a cybersecurity analyst is critical in the digital age. These professionals are tasked with protecting information systems from cyber threats, analyzing security breaches, and ensuring that… Continue Reading →
Article Review 2(Introduction) Cyber resilience relates to the principles of the social sciences. Cyber resilience is an interdisciplinary concept that intersects with various principles of social sciences(Dupont 2019). In sociology, the concept relates to studying social systems and their ability… Continue Reading →
Article review 1(Introduction) Artificial Intelligence relates to the principles of the social sciences through Behavioral analysis: Social sciences often study human behavior, motivation, and interaction. In cybersecurity, Al can be used to analyze user behavior to detect anomalies that may… Continue Reading →
Internet users may engage in various activities that are considered illegal. These can range from downloading and distributing copyrighted material without permission to engaging in cyberbullying, identity theft, phishing scams, and participating in illegal online markets. The five most serious… Continue Reading →
Drawing upon a comprehensive data set of bug bounty programs, we removed many of the sources of endogeneity plaguing research in the crowdsourced cybersecurity field and identified many of the factors that influence the quantity of valid vulnerability reports bug… Continue Reading →
Economic theories such as rational choice theory and information asymmetry could be relevant to a data breach notification letter. Rational Choice Theory posits that individuals decide by weighing the costs and benefits to maximize their advantage. Here, companies might respond… Continue Reading →
The role of a cybersecurity analyst intersects significantly with social behaviors, as these professionals are tasked with safeguarding information systems from threats that often originate from human actions. Whether through malicious intent, such as hacking and phishing, or inadvertent risks,… Continue Reading →
The Russian propaganda apparatus, long directed at its society and the satellite states of the former Soviet Union is now aiming at targets abroad. In 2013, Gen. Valery Gerasimov identified information warfare as an essential aspect of Russian warfare going… Continue Reading →
1. Regularly found that you can’t think of anything else but the moment you will be able to use social media again? Yes/No (Preoccupation). 2. Regularly felt dissatisfied because you want to spend more time on social media? Yes/No (Tolerance)…. Continue Reading →
Recently, I’ve realized the profound impact the media has on shaping our perceptions of cybersecurity. The media often amplifies the sense of urgency and fear surrounding cyber threats through sensational headlines and dramatic narratives. This can lead to heightened awareness,… Continue Reading →
© 2025 Eportfolio — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑