ARTICLE REVIEW #2

The studies in this article look at how artificial intelligence is being used in cybercrime and how this is changing the way crimes like phishing and deep fakes are committed. These studies connect to criminology and sociology, which study crime and human behavior. They use a concept called Routine Activity Theory (RAT), which says crimes…

Article Review #1 : “Bugs in Our Pockets : The Risks of Client-Side Scanning”

How does the topic relate to the principles of the social sciences? The topic of Client Side Scanning (CSS) intersects with multiple principles of the social sciences, mainly within sociology, political science, and ethics. It addresses how technology impacts societal norms around privacy, security, and individual rights. This discussion involves understanding the power dynamics between…

CAREER FINAL PAPER : “PENETRATION TESTING AND SOCIAL SCIENCE CAREER FINAL PAPER”

Introduction Penetration testing, also known as ethical hacking, is a job where cyber professionals test the security of computer systems by simulating cyberattacks. These cyber professionals are often referred to as Penetration Testers and Ethical Hackers. They find weaknesses in a company’s system before hackers try to exploit them. While penetration testers need strong technical…

WEEK 15 : DAVIN TEO “DIGITAL FORENSICS”

After listening to the speaker talk about how he got into digital forensics, it was really interesting to see how he didn’t plan on doing this kind of work. He started in regular IT but ended up dealing with more complicated cases, like tracking down emails and recovering lost data. What stood out to me…

WEEK 14: The author has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

The author talks about five serious internet offenses. First off, using torrent services todownload pirated movies or music is illegal because it steals from the creators. Obviously this iscutting off deserved funds from the rightful owners. Second, sharing someone’s personalinformation, like their address or photos, online without permission can hurt them and is againstthe law,…

WEEK 12: Read “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

The data breach can be understood through two economic theories. First, market failure occurredbecause customers didn’t know their information was at risk. The company delayed informingthem, which hurt trust in the market. Second, transaction costs increased because customers nowhave to spend time and effort checking for fraud, while the company faces costs to repair itsreputation…

WEEK 11: Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

The job of a cybersecurity analyst highlights how social behaviors impact security. Analystswork to protect systems from threats that often take advantage of people’s habits, like clicking onsuspicious links or trusting unknown sources. They also have to understand how attackers use“social engineering” to trick people, showing that security isn’t just about technology—it’s alsoabout knowing how…

WEEK 10: Write a journal entry summarizing your response to the article on social cybersecurity.

After reading about social cybersecurity, I realized cybersecurity is not just aboutprotecting computers anymore, it’s also about how technology can influence what people thinkand do. This type of cognitive hacking uses information to change opinions, cause confusion,and divide people.The article explains that information itself has become a weapon. Countries and groupscan create serious problems without…