• Digital Forensics and Social Science
    While watching Davin Teo’s TEDx talk on digital forensics, I found his career path very intriguing. During his talk, Teo described how he got started in the field of digital forensics, starting with his early fascination with computers and technology… Continue Reading →
  • Illegal Things Internet Users Unknowingly Do
    The five most severe offenses among the illegal activities done by internet users are sharing passwords, addresses, or photos of others; bullying and trolling; recording a VoIP call without consent; collecting child information; and running illegal searches on the internet…. Continue Reading →
  • Bug Bounties Economic Model for Cybersecurity
    In “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties,” Kiran Sridhar and Ming Ng discuss how to build an economic model for bug bounties using data from HackerOne, a platform for vulnerability coordination and… Continue Reading →
  • Data Breaches and Economic/Social Theories
    Customers who visit the website www.glasswasherparts.com are notified of a data breach. The breach happened between February and December 2016 but was found in November. Hackers could obtain their clients’ credit card information by installing malware on the server platform…. Continue Reading →
  • Cybersecurity Analysts and Social Behaviors
    In Nicole Enesse’s YouTube video “What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook,” several social elements highlight the connections between cybersecurity and social behavior. Firstly, the focus on teamwork and communication emphasizes how crucial relationships are for… Continue Reading →
  • Social Cybersecurity
    Lt. Col. David M. Beskow and Kathleen M. Carley’s “Social Cybersecurity: An Emerging National Security Requirement” explores social cybersecurity as an essential component of national security. This article stresses the necessity for a strategy to address these issues by highlighting… Continue Reading →
  • Social Media and Cybersecurity
    When taking the Social Media Disorder Scale, I scored a two out of nine. I said yes to persistence and displacement traits, neglecting other activities to use social media and trying to use social media but failing. I think the… Continue Reading →
  • Media Influences on Cybersecurity
    In today’s digital era, where technology is ingrained in every part of our lives, the media is crucial in influencing how we perceive cybersecurity. Thinking back on how the media shapes our understanding of cybersecurity, it is clear the media… Continue Reading →
  • Cybersecurity Memes
    The man in this first meme is a cybercriminal. He is setting up a fake network disguised as the Starbucks network to bait victims into connecting. The man hs a devious grin on his face as he executed this phishing… Continue Reading →
  • Spotting Fake Websites
    When determining whether a website is real or fake, there are a couple of identifiers to help someone avoid fake, shady websites. Firstly, checking the domain can identify whether a website is fake. Fake websites will try to resemble the… Continue Reading →
  • A Social Science Review of “Discrimination and Cyberbullying against Women in Iraq: Exploring Social Media and Perceived Norms”
    Introduction When reviewing the article “Discrimination and Cyberbullying against Women in Iraq: Exploring Social Media and Perceived Norms,” I found that this article explores the social sciences of the relationship between gender-based discrimination, cyberbullying, and social media in the context… Continue Reading →
  • A Ranking of Individual Motives: Cybercrimes
    When looking at individual motives for cybercrimes: Entertainment, Political, Revenge, Boredom, Recognition, Money, and Multiple Reasons, some motives make more sense than others. Starting with number 7, Boredom: Although boredom is a motive for cybercrime, it doesn’t seem as significant… Continue Reading →
  • Maslow’s Hierarchy of Needs: My Digital Experience and Needs
    Maslow’s hierarchy of needs is a ranking of human needs arranged in ascending levels from basic needs to psychological needs to self-fulfillment needs, which form a pyramid. Basic needs consist of Physiological needs, such as food, water, shelter, and rest,… Continue Reading →
  • PrivacyRights.org and Data Breaches
    When visiting PrivacyRights.org, I saw all the available information on data breaches. The site had timelines of data breaches spanning back nearly 20 years ago. There is information on records and reporting of data breaches in the U.S., where you… Continue Reading →
  • The Principles of Social Science and Cybersecurity
     The application of the principles of social science to cybersecurity offers an efficient way to comprehend and handle numerous aspects of information security. The principle of relativism is the philosophy that all things are related. For example, technological advancements lead… Continue Reading →
  • The NICE Workforce Framework: Careers and my areas of interest.
    When reviewing the NICE framework of the cybersecurity workforce categories: Analyze, Collect and Operate, Investigate, Operate and Maintain, Oversee and Govern, Protect and Defend, and Securely Provision, a few caught my attention. I would be interested in focusing my career… Continue Reading →