CYSE 201S Journal Entries

Journal #1

  1. Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

Based on the reading, I think my top choice would be Cybercrime Investigation. It’s kind of why I left Aviation, and it seems to be the most interesting work. It doesn’t necessarily have to be for a government agency, it can be for any ecommerce company or any organization that has an online footprint that is attractive to criminals.

Another interesting choice for me would be an Incident Response roll. I like working in teams and responding aggressively and timely to problems with bad actors. I spent a career in aviation operations in the Emergency Medical field so this seems to align with my joy for high pace high stress environments.  

Some I like the least would be anything on the development side. I don’t really want to code or try and design products for Cybersecurity. I’m more of an action/operations type person.

Journal #2

  1. Explain how the principles of science [Empiricism, Determinism, Parsimony, Objectivity etc.,] relate to cybersecurity?

These principles relate to cybersecurity by creating a framework to approach digital security. Empiricism focuses on real tangible threats, for example, this is what we see happening. Determinism says that if an action occurs, there is a predictable reaction. So, we should be able to determine security needs based on past events. Parsimony simply means simplicity and effectiveness. Design what we need not what we want. Keep it to necessary items and be able to build on the system. Objectivity simply states the facts. These are the attacks we are seeing, let’s focus on defending based on those attacks.

All together they provide an evidence-based framework for designing a simple, yet effective, fact-based system.

Journal #3

  1. Using PrivacyRights.org look to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

Researchers can really dig into the data from PrivacyRights.org to study breaches in a bunch of ways. They can look at trends over time, figuring out which sectors get hit the most, what kind of information gets stolen, and how often it happens. This could help predict where the next breach might come from.

They can also assess the impact, seeing how bad it is when sensitive information like health or legal records are breached compared to less critical information. It’s clear that small offices, like those for health or legal services, often don’t have the security they should, especially when it comes to protecting our most critical secrets like medical or psychiatric records. Researchers could use all this info to push for better security practices, maybe even come up with guidelines or standards that these smaller practices would need to follow before they can even start operating.

With all this data, researchers might push for new laws or stricter rules on how data is handled, especially in areas where personal information that is most sensitive. It’s about making sure everyone, from big companies to tiny offices, know how to protect our information better. By sharing all this, they could help educate everyone on why good data security matters, pushing for a general uplift in how we all handle personal data.

Journal #4

  1. Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

Self-Actualization Needs: My pursuit of education aligns well with self-actualization, where technology plays a key role. With numerous resources available online for learning, from free courses to formal settings like college, I can expand my knowledge, filling my desire to grow personally and mentally.

Esteem Needs: Gaming also relates to my esteem needs by providing platforms where you can achieve, compete, and earn respect from peers.

Love and Belongingness Needs: I have an interest in gaming, I’m using technology to combat loneliness or to connect with others. Online gaming, for me, can sometimes create communities where I feel a sense of belonging, offering friendships or social interaction that might be missing in real life.

Safety Needs: My use of social media for staying informed about world events reflects a reliance on technology for safety. Social media can be used for gathering information or news, although some may contribute to anxiety if it’s unreliable.

Physiological Needs: While technology doesn’t directly address basic survival needs like food or shelter, it can contribute to accessing experiences that help maintain health or comfort. For example, if I’m feeling isolated or lonely I can use technology to order food or manage my health. Some of these can indirectly support my needs by reducing stress or providing comfort.

Journal #5

  1. Review the the below motives and rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.

Multiple Reasons – This is my number one. I don’t think many cybercrimes are just one obvious factor, any of the below reasons or a combination of them, could push someone to do something illegal on the internet. It could also be one reason that starts them down that path then they have other reasons that make them continue to commit crimes over a period.

For Money – Monetary gain is why many criminals do the things they do. It’s close to the top because it’s a big motivator to get into the life of crime. Especially now when people are feeling costs around them rise and get themselves into a feeling of desperation. Money scams are probably the most common things I see on the internet and it’s an international issue.

Political – I think there’s an argument to be made that this is probably increasing. Governments and large organizations are into the political game to influence outcomes. The use and access of political information, misinformation and social media provides some extremist types with information that may cause them to lash out at politicians and the system. Although, if governments were more transparent at what they are doing to their citizens, this might not be increasing so fast.

Recognition – This is an interesting one, I do think this plays into the behavior model of groupthink. Some of these hackers do want to get caught. They can get notoriety and build their activism social media accounts especially if they gather a following on the internet.

Boredom – This one is problematic for sure. Parents are busy, especially when both must work full time to afford just a basic lifestyle. Robust education for kids and maybe more content filters throughout cell companies and internet providers could go a long way into preventing these types of things. Also, it just may come to a point where we as adults don’t allow screen time, and we need to provide alternative activities to keep boredom to a minimum.

Revenge – This is certainly an issue. It really is on us to watch what we’re recording or what photos we take. Especially for our young ones that may not know what they are doing. However, there should also be an easier way to get this kind of content removed quickly and perpetrators of this kind of behavior get severe consequences.

Entertainment – I tend to rate this one on the bottom. People do need to take care of what kind of information they put on the internet. In this case if it’s publicly available then the user should watch out for that. On the other hand, he also did it for money, which doesn’t really align with the entertainment factor.

Journal #6

  1. Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent.

Fake websites are a real problem for sure. I just received a text message last week about a toll road scam that wanted me to go pay a toll at https://thetollroads-paytollgci.world.us, you can pretty much tell when its not a .com, .gov. or .edu. right away. I usually look for something weird like their domain name. Sites will have a https://somesite.gov.pe or unusual nomenclature. Just like when you get scam emails that say they are from someone you know but you click on the address and its something that is way off and it has been masked.

Typically, if you have a concern about giving money or personal information you should do your research, check whether they are registered as a business, double check bbb, there are many site advisor websites where you can check the domain name and if it’s blacklisted or safe. In a quick search. I found:

  1. Tiffanycoshop[.]com
  2. Sheingivesback[.]com
  3. Thetollroads-paytollgci.world.us

ExpressVPN. (n.d.). List of scam shopping websites. Retrieved February 23, 2025, from https://www.expressvpn.com/blog/list-of-scam-shopping-websites/?srsltid=AfmBOorqh6lUi8s3nrqQMv9iPQIYy_vhxPYgK7e7mu3d-iaNQYS5IFqV

I think it’s less important to have a running list of web addresses that can be fake but more importantly, be able to identify one if you see it. It’s also very easy to register a domain name and or buy or sell a domain name. Whenever you are dealing with any organization that wants to gather information it’s important to note, while they may be cheaper or a good deal or whatever, its very unlikely they are securing your personal information correctly. Any small organization, even if legitimate, is still at risk and probably not prepared for a cybersecurity breach.

Journal #8

  1. Write a journal entry about how you think the media influences our understanding about cybersecurity.

In my experience, movies or tv shows do tend to exaggerate certain elements of concepts introduced in the story telling. Certainly, based on this YouTube video, there are elements of hacking and cyber security that were flat out wrong or exaggerated. There were also some media moments that got it somewhat correct. I think if we have knowledge about a certain topic and see it represented in a film or tv show, we are going to be critical of the accuracy of that concept. I think when watching different types of media, if you’re a critical thinker, you’re going to realize that some things that are represented are going to be focused on the theatrics and not necessarily factually accurate. That’s the nature of entertainment. Also, movies and shows have advisors to help them with accuracy and sometimes budget constraints may not allow an expert to advise on all aspects of the script.

Journal #9

  1. Complete the Social Media Disorder scale.

Social Media Disorder Scale (SMD Scale)

Please answer the question by thinking of your experience with using social media (e.g., WhatsApp, Snapchat, Instagram, Twitter, Facebook, Google+, Pinterest, forums, weblogs) in past year. Answer the questions as honestly as possible. According to DSM, at least five (out of the nine) criteria must be met for a formal diagnosis of “disordered social media user”. This is designed for personal insight and is not a substitute for professional diagnosis or advice. For each statement below, answer “Yes” or “No” based on your experiences over the past 12 months.

  1. Preoccupation: – Do you frequently find yourself thinking about social media or planning to use it? No – Being in my mid 40’s the last social media I used was Facebook. Before that Myspace. I have not been on social media for the last 5 or so years. I don’t miss it. I will say that as I get closer to graduating and re-enter the professional workforce, having a social/professional profile like LinkedIn would probably be necessary to be considered competitive in today’s job market. Other than that, I’m old school, I interact social with others in person.
  2. Tolerance: – Have you felt dissatisfied because you want to spend more time on social media? No – once I finally got rid of Facebook many years ago, my life improved dramatically. Social media can be a place where you might feel like you can’t live up to unattainable expectations and people’s lives are not as good as they make them out to be on social media. Withdrawal: – Do you feel restless, irritable, felt bad or upset when you are unable to use social media? No – don’t miss it at all, but I do acknowledge some social media may be necessary in a professional capacity at some point.
  3. Persistence: – Have you tried to spend less time on social media, but failed? No
  4. Displacement: – Regularly neglected other activities (i.e. hobbies, sports, homework) because you wanted to use social media? No – I play golf with a big group weekly and get way more social interaction, and genuine interaction then I ever did on social media.
  5. Problems: – Regularly had arguments with others because of your social media use? No
  6. Deception: – Regularly lied to your parents or friends about the amount of time you spend on social media? No
  7. Escape: – Do you use social media to forget about personal problems or to relieve negative feelings such as guilt or anxiety? No
  8. Conflict: – Had serious conflict with parents, brother, sister (friends, relationships etc.) because of your social media use? No

    Scoring
  • Count the number of “Yes” answers.
  • The scale involves summing the number of “Yes” answers; a score of 1 or lower indicates normative social media usage, 2-5 indicates risky usage, and 6-9 indicates problematic usage.

    0

    I scored a zero, as indicated I have not been on social media for many years, and I don’t miss it. It can be toxic and an unrealistic depiction of real life. I’m certainly familiar with the DSM and how it
    classifies certain criteria for diagnosing mental illness. I do see it in my kids. 11 and 13, they are addicted to phones and Tik Tok or Instagram or short videos. It does seem to influence them as far
    as attention span or willingness to take time to enjoy real life without checking their likes. Personally, I’m glad at my age I didn’t get wrapped up in all of that. I can still read a 600-page book and finish it without getting bored right away and wanting to do something else.

    Citation

    van den Eijnden, R. J. J. M., Lemmens, J. S., & Valkenburg, P. M. (2016). The Social Media
    Disorder Scale. Computers in Human Behavior, 61, 478–487.

Journal #10

  1. Read this and write a journal entry summarizing your response to the article on social cybersecurity.

This article is interesting to say the least. Having spent 20+ years in aviation operations, including military time, civilian time, and combat deployments, has been all about managing risk, ensuring compliance, and keeping my people safe. This piece certainly illustrates a new kind of battlefield—not something you can physically see, but a seemingly invisible force that attacks through information and human behavior.

The article defines social cybersecurity as using tech to “hack” people, not just systems. Governments and institutions have been trying to predict and modify human behavior for as long as I can remember. It’s overwhelming now, the speed and accuracy that they have to push certain folks in one direction or another to accomplish a goal and yet remain clandestine in their mission. What motivates someone to assassinate a public official or destroy the property of a business based on a political view? I’ve personally never taken part in a protest or a rally or really any political-minded event that could cause severe harm to someone or someone’s property. Are there social science “traits” that make someone susceptible to this type of activity? Clearly, some people are motivated to commit acts that most would consider outside of societal norms.

Using bots or algorithms, as mentioned, would certainly amplify these types of threats, providing bad actors quick analysis of a potential target of social modification. My background was mostly rigid and heavily regulated. We live in an open and free society where people can say what they want and have, through social media, an almost unlimited audience. I imagine before this, finding a person that can be influenced to conduct malicious acts requires a lot of personnel who had to develop certain individuals over time. Now, through social media and algorithms, people that are susceptible to this type of influence can be found online, gaining information on large populations to identify several people willing to act criminally.

In closing, this article emphasizes that this isn’t just a tech problem but also a people problem. If on the side of good, as the article states, we need to analyze the person’s behavior, background, and predisposition—not only tech—to predict possible behavior. This is difficult to do because we don’t want to live in a society that has decided you can do bad things but have not done anything yet and possibly singling you out or punishing you based on what might happen as opposed to what has happened.

Journal #12

  1. Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

Looking at the data breach notification through a social science lens, criminology clearly plays a role. The letter describes a cybercrime involving malware placed on the platform provider’s servers, potentially leading to identity theft or fraud. The system breach also triggered a criminal case involving a law enforcement investigation. In terms of psychology, which focuses on everyday human interactions, the company notified clients of the intrusion and recommended steps to reduce the risk of identity theft or fraud. The objective of the letter seems to try and put customers at ease and provide solutions and a helpline number for additional assistance.

From an economic perspective, the Rational Choice Theory suggests that businesses make decisions based on their own best interests. The company likely used a cost-benefit analysis to allocate resources for cybersecurity on its website and select a third-party platform manager. The delayed notification shows a rational choice to prioritize cooperation with law enforcement investigation, potentially preventing larger issues later, even at the risk of reducing customer trust. Keynesian Economics may also apply, as the letter advises contacting credit or debit card companies and visiting the California Office of Privacy Protection website. This implies a role for the government or regulatory intervention to calm the customer and mitigate the risk of economic consequences from the data breach.

Journal #14

  1. Andriy and Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

In Andriy Slynchuk’s article, she outlines eleven internet activities that may be considered illegal. Among the eleven I think the five most serious are bullying and trolling, collecting information about people younger than 13, using copyrighted images, sharing passwords, addresses, or photos of others, and faking your identity online. Bullying and trolling can cause harm to someone online just as it would in real life. I think this can be very serious for the mental health of an individual which could cause that person to take their own life or harm themselves or someone else. If the bully was linked to the cause of this behavior, you could get into legal trouble. Collecting information about children is bad. Again, this could
violate child protection laws and depending on what is collected, could land that person into legal problems by violating several crimes against children. Using copyrighted images is straight forward, it’s against copyright law. There could be a fine associated with this if the user doesn’t react promptly by removing the stolen images. Illegal searches on the internet if it violates the terms of a search provider or it’s considered a crime against national security could put you on a watch list and have you questioned and possibly charged by law enforcement depending on the search and your intent with the information.
Sharing passwords, addresses or photos depends on the person or intent. If it’s without consent this could create legal issues for you if there is damage to the person you violated. Faking your identity, while diƯerent than remaining anonymous online, if you use another person’s identity and were trying to use it for nefarious reasons. This could also create legal issues for the violator.

Just because someone is doing it online does not make it different than doing these things in the real world. Crime tends to rely heavily on intent and damage to an individual or society. If I share my password with my child to use a streaming service. That’s not going to be considered illegal. If I share a coworkers bank password to the dark web, that’s a different story.

Journal #15

  1. Think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

Davin Teo’s story about his digital forensics career is very interesting, not your typical lab job. As Director at Alvarez & Marsal in Asia, he takes fascinating cases like catching fraudsters or tracing death threats. His 17-year path from Australia to London and now Hong Kong. He started with a Commerce degree from Queensland. I think his work ties to social sciences, like criminology, since he examines human motives to solve digital crimes. His global cases, even at Chevron, show how social dynamics play a role. Combining tech with cultural issues is impressive. Balancing late nights and four kids makes him relatable. His career shows that social sciences, like psychology, make forensics exciting.