Journal Entries

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

I am particularly enthused about Cybersecurity Analyst and Digital forensic Investigator because of their critical role in protecting online or digital data from online threats, and safeguarding information.

The Cybersecurity Analyst specializes in protecting digital data from online threats such hacking, malware, and phishing attacks. The Digital Forensic Investigator on the other hand specializes in collecting, analyzing and preserving electronic evidence to be used in court or legal proceedings, by using techniques to recover data from computers, mobile devices and other digital storage media.

On a contrary, I am less appealed to risk management as this career mostly involves regulatory compliance and may lack the dynamic problem-solving aspects. I rather want to focus on careers that promotes innovation and proactive solutions.  

Describe the top three careers of social science graduates that you would be interested in considering. What is it about those jobs that you find interesting? Respond to one other entry.

The top three (3) social science careers I may be interested in considering are Political Science, Economics and Sociology.

POLITICAL SCIENCE:

As a political scientist, you study the origin, development and operations of political systems. Again, you carry-out research into topics such as public opinions, political decision making, and ideology. This career is fascinating to me because you are able to shape public policies and decisions through critical thinking analysis and communication. Political Scientists enjoy high renumeration for their positions.

ECONOMICS:

Economists collect and analyze data related to the economy, labor force, trade etc., and predict future economic conditions. They also prepare budgets and offer potential economic solutions and advice to identified economic problems. What makes this career interesting to me is the ability to influence economic policies and make strategic decisions that affects society.  

SOCIOLOGY:

This field of profession study and analyze human society, social behavior, and the relationships that shape the way individuals interact with one another and their environment. What enthuse me about this career is the ability to observe everyday life, conduct research on social behaviors and analyze these data using scientific methods to find empirical solutions to complex social problems. 

Explain how the principles of science relate to cybersecurity.

The principles of science are related to cybersecurity in some of these key areas.

RELATIVISM:

All things are related to one another. Social systems such as the health care system, political science, educational system, the technological system, criminal justice system etc. are related to the cyberspace. Changes in any of these systems could as well lead to changes in cybersecurity.

OBJECTIVITY:

This is where you need to base your conclusions on observable phenomena and facts, and not personal emotions and opinions. Objectivity is pivotal in assessing threats and vulnerabilities by relying on data and evidential materials because science is supposed to advance objective knowledge.

PARSIMONY:

As a principle of science, the scientist must keep the explanation as simple as possible. This is easier to do in the natural science than in the social science. keeping a simple and straightforward explanations help to give better understanding to the outcomes of your research findings.

EMPIRICISM:

Empiricism mostly focuses on knowledge gained through observation and experimentation. Empiricism studies mainly behaviors that are real to the human senses. Empirical methods are used to test security measures and understand cybercrimes in the cyberspace.

ETHICAL NEUTRALITY:

Social scientists are expected to adhere to ethical guidelines and standards when conducting their research. It’s imperative that researchers protect the rights and privacy of individuals that they study, even as they observe the ethical standards for the research they are understudying.

DETERMINISM:

Determinism in the principle of science means that all events, including human actions and behaviors are caused or determine by preceding events. Understanding these behaviors help to identify strategies in combating or mitigating cyber threats and attacks.

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

There are several data breach information that are documented on PrivacyRights.org which are particularly valuable for research purposes. The site provides an access to a comprehensive collection of data breaches that are publicly reported, highlighting the important details such as the affected organization and individuals, date of breaches, the sort of data compromised, provides analytical trends, identifying related vulnerabilities across industries, and evaluate the present data protection guidelines and practices, and its effectiveness in current/future circumstances. The information collected on PrivacyRights.org by researchers could be used as a predictive model for possible future data breaches, and influence policy formulations to safeguard and enhance cybersecurity measures to combat future threats and attacks.

REVIEW MASLOW’S HIERARCHY OF NEEDS AND EXPLAIN HOW EACH LEVEL RELATES TO YOUR EXPERIENCES WITH TECHNOLOGY. GIVE SPECIFIC EXAMPLES OF HOW YOUR DIGITAL EXPERIENCES RELATE TO EACH LEVEL OF NEED

The Maslow’s Hierarchy of needs addresses five categories or levels of human needs, where technology and digital experience applications can really help foster the fulfillment of these needs.

Psychological Needs:

In the area of psychological needs such as food, water and shelter, technology aids in the use of food apps to order food groceries, relying on health tracker to check hydration level and using sleeping apps that helps to ensure adequate rest.

Safety and Security:

In the aspect of Safety and Security, technology help individuals to use strong passwords and two-factor authentication on their online accounts and protection against malware using antivirus, and monitoring privacy settings on social media platforms.

Love and Belongingness:

This aspect of Maslow’s Hierarchy of needs looks at the relationship and connection with families and friends. Technology makes it possible to communicate and socially interact with families and friends via social media platforms such as Facebook, Zoom, Facetime, WhatsApp, TikTok etc. this helps us to stay connected with our families and friends.

Esteem Needs:

This aspect of the human needs is about recognition and self-esteem. Technology plays a role in this through platforms that permits self-expressions and achievements, for instance sharing an accomplishment on LinkedIn or receiving likes and comments on social media can enhance the feeling of self-worth and recognition.

Self-Actualization:

Technology has made it possible to take online courses to acquire new skills, making contribution to open-source projects, creating and sharing contents on YouTube and Blogs, and the use of productivity applications to optimize personal projects. The use of technology can help one realize personal goals and self-fulfillment in this area of needs.

Review the articles linked with each individual motive in the presentation page or Slide #3.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

Here is how I ranked the motives from 1 to 7, along with why I chose each number:

1. For Money: Making money is a strong and global drive. Cybercriminals often do things like theft, ransomware, and phishing to make money. The story about how cybercriminals spend their money shows how important money is to them in committing these crimes.

2. Status and recognition: A lot of cybercriminals want to be known and respected in their groups. The story about Bradley Niblock’s DDoS attack on the election shows how people may commit cybercrimes to get attention and respect.

3. Revenge: People with grudges against others may commit cybercrimes. The story of revenge porn victims in Wales demonstrates how very personal reasons can lead to harmful actions taken online.

4. Political: Hacktivism and hacking done for political reasons are on the rise. The story about young hackers joining the hacktivism movement shows how people’s political views can make them break the law online.

5. Entertainment: Some people commit cybercrimes just for fun or to get a thrill. The LinkedIn scraping case shows that some criminals do illicit things because they find hacking fun and challenging.

6. Boredom: People, especially younger people, can do things online like stalking or online grooming when they are bored. The story about how these activities are becoming more popular among kids shows how being bored can make people do undesirable things.

7. Multiple Reasons: Some hackers are driven by complicated reasons that include more than one thing. It’s challenging to pinpoint a single motivation behind hackers’ actions due to the diverse range of factors that contribute to their criminal behavior.

I have ranked this list according to the frequency and severity of each motive’s contribution to cybercrime. The most powerful reasons are money and fame, while boredom and a lot of different reasons are put lower because they have less of an effect.

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?

Suspicious URLs, low-quality images, and deals that don’t make sense may be signs of a fake website. To find out if a website is real, you can use a website checker and look for security signs.

Examples of fake websites

PayPalsecurity.com is a fake site that looks like PayPal’s login page to get people to enter their account information.

PiloSaleLtd.com: For unknown reasons, someone set up a fake shopping site in December 2022.

PiloLtd.com is a fake shopping website that was set up in January 2023.

How to spot fake websites

• Domain name: Fake websites may have similar domain names that sound like genuine ones, or they may even use a legitimate URL in their name.

• Indicators of security: To find a safe link, look for a padlock or “https” in the address bar.

• Images: Images from real websites that are stolen are often of poor quality and have a lot of pixels.

• Text: Check for spelling mistakes, typos, and poor grammar.

• Offers: Deals that seem too good to be true could be a sign of a scam.

• Reviews: You can look for a site on the Better Business Bureau’s Scam Tracker website if it doesn’t have any reviews.

Making sure a website is real

• Check websites with a tool like Google’s Safe Browsing Site Status.

• Check for an “https” or padlock in the address bar.

• Look for an emblem that says, “Not Secure.”

• Look for weird payment processes.

• Check if the sitemap is too short or if the “About Us” part is missing.

• Check for social media links that don’t work.

When you enter personal information on websites that don’t have adequate security, you should be careful.

Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration.

In this digital age, the rise in cyber threats makes it even more important for users to learn more about cybersecurity. The funny puppy meme sums up online safety very well: “Nope!” I’m not clicking that link, buddy. I am security conscious now than before. My eyes are wide open!!” As a joke, the meme makes fun of the way people often act when they click on links without checking to see if they are safe. By showing a puppy that is “security conscious,” it shows how important it is to be skeptical about links you didn’t ask for, especially ones that come from sources you don’t know or that seem sketchy.

This meme’s message fits with good safety habits like checking the URL before clicking on it, using strong, unique passwords, and staying up to date on phishing tricks. Cybersecurity isn’t just the job of IT teams; everyone who uses digital devices needs to work together to keep them safe. Thinking about possible dangers is the first thing that can help you protect your personal information and stay away from cybercrime, just like our puppy.

Finally, this funny meme is a good reminder of how important it is to be aware of safety in your everyday digital life. Our internet activities will be safer if we are more careful.

AFTER WATCHING THE VIDEO, WRITE A JOURNAL ENTRY ABOUT HOW YOU THINK THE MEDIA INFLUENCES OUR UNDERSTANDING ABOUT CYBERSECURITY.

I took some time to watch the video about how the media influences our understanding of Cybersecurity. It’s fascinating to see how movies, TV shows, and news stories change how we think about hacking and safety. One of the most interesting things I have noticed is how hacking is acted out in movies and TV shows. A lot of the time, characters use flashy platforms and unrealistic methods to do complicated hacks in a matter of seconds. Scenes where hackers break into systems with just a few keystrokes or use gadgets that don’t exist in real life can give people the wrong idea about how hard and skilled cybersecurity really is.

This can make people think hacking is easier and faster than it really is, which could make them underestimate how hard and long real-life cyberattacks are. Also, the media tends to paint hackers as either good guys or bad guys, which can make the complex reasons and moral issues in the cybersecurity community seem too simple. Movies and TV shows like “Hackers” and “Mr. Robot” have made the idea of a lone, clever hacker popular. This is fun to watch, but it doesn’t always reflect how collaborative and boring cybersecurity work is.

On the positive side, news coverage can make people more aware of hacking risks and how important it is to keep personal and business data safe. People and companies may take cybersecurity more seriously after hearing about high-profile breaches and cyberattacks in the news. They may change how they do things and spend money on security measures.

Fear and confusion can also come from the drama and sensationalism in the media as well. People use phrases like “cyber warfare” and “digital espionage” without thinking about what they mean. This can make people feel threatened in a way that isn’t always true. People may become either too anxious or not concerned about real cybersecurity risks as a result.

In conclusion, the media is very important for keeping people informed about safety, but it’s important to be skeptical of what they say. Knowing the difference between dramatization and reality can help us understand how challenging cybersecurity is, and how many people are trying to keep our digital world safe.

Complete the Social Media Disorder scale.  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world?

During the past year have you…

1. Regularly found that you can’t think of anything else but the moment you will be able to use social media again? Yes/No (Preoccupation).

Answer: NO

2. Regularly felt dissatisfied because you want to spend more time on social media? Yes/No (Tolerance).

Answer: NO

3. Often felt bad when you could not use social media? Yes/No (Withdrawal).

Answer: YES

4. Tried to spend less time on social media, but failed? Yes/No (Persistence).

Answer: YES

5. Regularly neglected other activities (i.e. hobbies, sports, homework) because you wanted to use social media? Yes/No (Displacement).

Answer: NO

6. Regularly had arguments with others because of your social media use? Yes/No (Problems).

Answer: NO

7. Regularly lied to your parents or friends about the amount of time you spend on social media? Yes/No (Deception)

 Answer: NO

8. Often used social media to escape from negative feelings? Yes/No (Escape).

Answer: YES

9. Had serious conflict with parents, brother, sister (friends, relationships etc.) because of your social media use? Yes/No (Conflict).

Answer: NO


I counted about two (2) of “YES” responses after I have answered the above questions.

The Itemized scale is a criteria to classify a “disordered social media user” as one who receives at least five “yes” responses. Upon reflecting on the items in the scale, it appears that they encompass a variety of social media usage factors that can affect daily life, including preoccupation, tolerance, withdrawal, persistence, deception and conflict. The purpose of these items is to identify behaviors that could indicate a problematic relationship with social media. Various factors, including cultural differences, the availability of technology, social norms, and economic conditions, contribute to the diverse patterns of social media use that are observed worldwide. For instance, in certain cultures, social media may be more deeply ingrained in daily life and social interactions, whereas in others, it may be less prevalent or utilized differently. Furthermore, individuals’ access to technology and internet infrastructure can significantly influence their social media usage.

Read this and write a journal entry summarizing your response to the article on social cybersecurity

 https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site.

NAME: DUUT EMMANUEL

TITLE: SOCIAL CYBERSECURITY, A NEW AREA OF NATIONAL SECURITY.

DATE: 03/29/2025

I read an intriguing piece today about social cybersecurity, a new area of national security that will have a big effect on future wars. The article by Lt. Col. David M. Beskow and Kathleen M. Carley, PhD, goes into excellent detail about the complicated field of social cybersecurity. They define it as the study of figuring out and predicting how people’s behavior, culture, and politics will change because of technology. It stresses how important it is to build cyber-infrastructure to protect society from cyber risks. One important thing that was talked about is the change from standard cybersecurity, which is about keeping computer systems safe, to social cybersecurity, which is about protecting people and how societies work. This new way of doing things, which is sometimes called “cognitive hacking,” uses technology to change people’s views and ideas at a speed and on a scale that have never been seen before.

The piece shows how important information warfare is from a strategic perspective, mainly by looking at Russian operations. It talks about how Russia has used lies in the past to weaken enemies and how new technology has made these efforts stronger. It presents the concept of an “information blitzkrieg,” akin to the swift and overwhelming tactics employed in physical warfare. A big part of the piece is about the BEND model, which divides different types of social-cyber maneuvering into good and bad actions that affect how information and networks are manipulated. This model helps us understand how enemies can join, clarify, energize, improve, dismiss, twist, confuse, and divert conversations, as well as use social networks to achieve their strategy objectives. The use of bots to enhance the power of information operations was also highlighted. Bots can operate automatically on social media, enabling them to disseminate false information and sway public opinion on a vast scale. To keep the country safe, the article stresses how important it is for military leaders to understand these dangers and act against them.

In the end, the piece suggests that social cybersecurity should be studied from different fields and stresses how important it is to teach both the military and the public about how decentralized modern information environments are. It supports flexible rules that let people act in a decent way in the information space while still protecting people’s privacy. This piece helped me learn more about how cybersecurity is changing and how important social cybersecurity is to national defense. As technology keeps getting better, the battlefield will expand to include more and more people. We will need new tactics to protect society’s integrity.

Watch this video Link: https://www.youtube.com/watch?v=iYtmuHbhmS0.  As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation.

The job description for a cybersecurity analyst in the presentation brings out a number of social behaviors and themes. First, it stresses how important it is to be flexible and ready to work odd hours, like graveyard jobs, which can affect family and social life. The video also highlights how important it is to network and get involved in the community. It suggests that joining local groups or technical meetups and making connections can be very helpful for getting experience and moving up in the field. Furthermore, being able to communicate clearly and write a good resume are examples of the social skills needed to present oneself properly to prospective employers. The requirement for a government security clearance brings up issues of social duty and how important it is to keep your personal record clean. Overall, the document says cybersecurity success isn’t just about technical skills; it’s about how you act, interact, and help your community. ​

Read this sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

The file given is an example of a letter notified of a data breach. It mostly discusses the event of someone getting into customer information without permission. Even though the letter doesn’t discuss economic or social science ideas directly, we can figure out how they might apply to the situation being described.


#1. Theories of economics

(a) Information Asymmetry:
The idea behind this theory is that in many deals, one side has more or better information than the other. In the case of the data breach, buyers didn’t know about it until the company told them, which made the information less balanced. When it comes to the letter, the fact that the company didn’t tell customers about the breach until after the law enforcement body had investigated it indicates that the company has more information than its customers. Customers suffered because they remained unaware of the stolen data for months.

(b) Externalities:
What are externalities? Externalities are costs or rewards that affect people who did not choose to bear them. Negative effects happen when a business does something that hurts other people.
Linked to the letter: The data breach is an example of a negative externality because customers were hurt when someone broke into the platform provider’s systems and saw their personal and payment information. Customers may now have to deal with identity theft and scams, which are costs they would rather not have. ​


#2. Theories in the social sciences

(a) Trust in Society:
Social trust refers to people’s faith in the honesty and dependability of institutions and other people. Trust is a key part of keeping people together and getting things done.
The company and its customers may not trust each other as much after the data hack. The breach and the delay in informing customers may make them less likely to do business with the company again. ​


(b) Risk Perception:
The way people or groups think about the possible dangers they face is called risk perception. Factors such as personal experience, gathered knowledge, and faith in authorities influence risk perception.
Linked to the letter: The letter is meant to manage customers’ sense of risk by telling them about the breach and giving them steps to take to protect themselves from identity theft or scams. The company is trying to change how customers see and react to the risk by telling them about the hack and giving them advice. ​

If you want to know how the data breach affected the economy and society, these ideas can help.

Read the article “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties” and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings.

The article “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties” talks in depth about bug bounty programs. Companies pay freelance security researchers to identify and clarify bugs in their codebases through these schemes. The literature review talks about the theoretical and practical benefits of bug bounties. It focuses on the fact that there aren’t enough cybersecurity workers in the world and that bug bounties can find holes in systems that internal teams might miss. The review also mentions factors that may affect the number of security researcher reports, such as the program’s age, industry, brand image, bounty amount, time to solve the problem, revenue, scope, new programs added, and whether it’s public or private.
The study’s results are important and have many aspects.

First, the study indicates that hackers aren’t really concerned about price. At the median, their price elasticity of supply is between 0.1 and 0.2, which suggests that they are motivated by things apart from money, like image and helping others. The result is good news for small businesses that don’t have many resources.

Second, the study indicates that the number of accurate reports doesn’t depend much on how much money the company makes or how well-known its brand is. This means that bug bounties work for companies of all sizes and levels of fame.

Third, companies in the healthcare, retail, and finance sectors get fewer true reports. This could be because it’s easy to make money off of weaknesses in these sectors.

Fourth, the number of new programs doesn’t have a big effect on the number of reports that come in. This evidence suggests that HackerOne has been able to attract more hackers and increase their involvement.

Fifth, programs get fewer reviews as they get older. This finding indicates that programs need to improve their reach to keep getting value.

Finally, the study highlights the need for further research, as many factors influencing hacker supply remain unknown.

Overall, the piece provides useful information about how bug bounty programs work and how they can be used to improve cybersecurity in many different fields. The results back up the idea that bug payments make it easier for everyone to get good cybersecurity skills, which is good for all companies, no matter how big or famous they are. But the study also shows how complicated the bug bounty market is and how much more research is needed to fully understand what makes hackers want to participate and file reports. ​

WRITE A PARAGRAPH DESCRIBING THE FIVE MOST SERIOUS VIOLATIONS AND WHY YOU THINK THOSE OFFENSES ARE SERIOUS.

After reviewing the document, the five most serious Internet violations are as follows: using torrents or unofficial streaming services, cyberbullying and trolling, gathering information about children under 13 years old, and doing illegal searches on the Internet. Doing these things can hurt others, and as well get you into legal issues. People who use unofficial streaming and torrent services break copyright laws. Such behavior means that artists don’t get the money they deserve, and users’ risk having their data stolen. Cyberbullying and mocking can make people feel awful and can even lead to criminal charges. The Children’s Online Protection Act prohibits the collection of information about children under 13 and exposes them to potential exploitation. Lastly, searching the Internet for things that are against the law, like child pornography or making bombs, can lead to serious legal problems and put people’s safety at risk. Not only do these actions hurt people, but they also break internet rules for what is right and wrong.

Digital Forensics | Davin Teo | TEDxHongKongSalon– YouTubeLinks to an external site. WATCH THIS VIDEO AND THINK ABOUT HOW THE CAREER OF DIGITAL FORENSICS INVESTIGATORS RELATE TO SOCIAL SCIENCES. WRITE A JOURNAL ENTRY DESCRIBING WHAT YOU THINK ABOUT THE SPEAKER’S PATHWAY TO HIS CAREER.

The biggest pathway to a career indicator forensic is pro-fascinating and unconventional highlighting the intersection of technology, investigative work, and social sciences. Initially, the speaker did not set out to pursue digital forensics but rather stumbled into it through his accounting profession.

This unexpected transition underscores how diverse scale sets such as analytical thinking and problem solving can be applied across fields. His journey also replaced the importance of adaptability and curiosity in career development. Data forensics investigators play a critical role in understanding human behavior through the lines of technology. You’re working boss analyzing data, uncovering parties, and interpreting digital evidence, which often ties back to social interactions, ethical considerations, and organizational dynamics. For example, the speaker describes investigating misuse of company resources, identifying bad actors, and resolving conflicts within organizations.

These tasks require not only technical expertise but also an understanding of human motives, organizational culture, and legal frameworks dash key elements of the social sciences food store the speakers carrier part also highlights the evolving nature of Technology and its impact on society from floppy disk to terabyte drives the tools and meters of the guitar forensics have advanced significantly, reflecting broader societal changes in how we store and interact with information. This evolution requires investigators to continuously learn and attack, bridging the gap between technological innovation and human behavior.

Overall, the speaker’s story demonstrates how digital forensic is deeply interwind with the social sciences. It is a field that not only relies on taking the card skills but also demands insight into human behavior and societal structures. His genius serves as a reminder that career paths are rarely linear, and that interdisciplinary knowledge can lead to impactful and rewarding work.