Ethical data handling is non-negotiable for online business. My paper explores the moral and legal liabilities of IP and user data, detailing the risks of collection, use, and security failure. Protect your brand trust and avoid lawsuits.
Category: Ethics
First Amendment Freedoms & Protections: The Cyber World and You
This paper analyzes First Amendment freedoms in the digital world, examining the roles of government institutions and private platforms in moderating misleading or harmful content. It explores legal limits on speech, platform responsibility, protest rights, and the impact of technology on democratic discourse and cybersecurity law.
“Going Dark”
The “Going Dark” debate: Should tech companies build backdoors into encrypted devices to aid law enforcement? My CYSE-406 paper analyzes the national security risks against the fundamental right to digital privacy. Where do you stand? Read my analysis!
Cybercrime: Using Psychological Theories to Understand & Prevent It
To beat cybercrime, you must understand the cybercriminal. My paper uses psychological theories—like Social Learning Theory and Rational Choice Theory—to model and predict criminal behavior. Learn how to build defenses that work.
Hacking Humans
A zero-trust network isn’t enough. You need a human firewall. My research details the critical importance of human-centric defense, exposing how easily people are exploited in sophisticated attacks. Click for the Hacking Humans paper.
The Threat of Deepfakes: An Overview of Human Ability to Detect Them
The biggest threat of deepfakes isn’t the AI—it’s your brain. I detail the psychological reasons (like the “seeing-is-believing” bias) why humans fail to detect these fakes. Don’t be fooled. Read the full research!
Artificial Intelligence in Digital Forensics: Opportunities, Risks, and Future Directions
Analysis of how artificial intelligence enhances digital forensics, including automation, threat detection, associated risks, and future trends in AI-driven investigations.
Determinism within Cybersecurity & Computer Hacking
An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.
Security Polices from a CISO’s Perspective
Explores security policies from a CISO’s perspective, highlighting their role in governance, risk management, strategic decision-making, and building organizational security.
Ensuring Accessibility when Implementing the CIA Triad
Examines how to preserve accessibility while implementing the CIA Triad, ensuring systems remain usable, resilient, and secure without disrupting organizational operations.
“Going Dark”
An Overview and Analysis of Former FBI Director James Comey’s Security Concerns aboutLaw Enforcement and Encryption