Article Review 2 CYSE 201 S

Cyberbullying During Pandemic
Article Review #2
Lana Kopacki
3/24/2024

With this article, we can delve into the issue of cyberbullying during the COVID-19 pandemic and its relation to perceived social isolation among college and university students. We can explore the social science principles involved in understanding this phenomenon, such as psychology, sociology, and communication. The article aims to shed light on the impact of cyberbullying on students’ mental health and social lives and how it can be mitigated through social support. This article will raise awareness about the importance of tackling cyberbullying and promoting social support, particularly in the context of a global crisis such as the COVID-19 pandemic.
Relation to principles
The issue of cyberbullying in the COVID-19 era is related to various social science principles, including psychology, sociology, and communication. It involves examining human behavior, social interactions, and communication patterns in a global health crisis context.
Research Questions
The research questions in this study are primarily focused on the connection between cyberbullying and perceived social isolation among college and university students during the pandemic. The hypothesis is that an increase in social isolation due to COVID-19 may result in a higher incidence of cyberbullying.
In this study, researchers conducted an online survey to collect data from college and university students. The main objective was to analyze the correlation between cyberbullying and perceived social isolation. The collected data was then put through rigorous statistical methods to determine the extent of this relationship. The researchers aimed to explore the impact of cyberbullying on students’ social lives and their sense of belongingness in the academic setting.
Research Methods and Types of Analysis
As part of the research study, participants were asked to report any instances of cyberbullying they had experienced and also to indicate their level of perceived social isolation. The data collected was then analyzed using statistical techniques such as correlation and regression analysis, which helped identify potential relationships between the two variables. This type of data analysis is commonly used in social science research to uncover patterns and associations between different factors.
Relations to Concepts
The PowerPoint presentations related to the article highlight several vital concepts, such as social isolation, social support, and mental health. The study underlines the adverse effects of social isolation on mental health and emphasizes the significance of social support in minimizing the impacts of cyberbullying.
Challenges and Concerns to marginalized groups
The issue of cyberbullying in the context of the COVID-19 pandemic is closely linked to the difficulties, apprehensions, and efforts of marginalized communities, particularly those of low-income backgrounds, people of color, and members of the LGBTQ+ community. These groups are at greater risk of experiencing cyberbullying and social exclusion due to institutional inequalities and prejudice.
Overall Contributions
This study is significant as it raises awareness about the detrimental effects of cyberbullying and social isolation on mental health, particularly in the midst of a global crisis such as the COVID-19 pandemic. It has the potential to inform policies and interventions that can help tackle and prevent cyberbullying while promoting social support among college and university students.
Conclusion
The issue of cyberbullying in the COVID-19 era is a complex problem that involves various principles of social sciences, such as psychology, sociology, and communication. A recent study was conducted to examine the connection between cyberbullying and perceived social isolation among college and university students during the pandemic. The research collected data through an online survey and analyzed it using statistical methods to identify relationships between variables. The study highlighted the adverse effects of social isolation on mental health and emphasized the significance of social support in minimizing the impacts of cyberbullying. The study is significant as it raises awareness about the detrimental effects of cyberbullying and social isolation on mental health, particularly in the midst of a global crisis such as the COVID-19 pandemic.

Reference

Neuhaeusler, N. S. (2024). Cyberbullying during COVID-19 pandemic: Relation to perceived social isolation among college and university students . International Journal of Cybersecurity Intelligence & Cybercrime, 7(1), – . DOI: https://doi.org/10.52306/2578-3289.1140

Article Review 1 CYSE 201 S

Cybercrime Victimization
Article Review #1
Lana Kopacki
2/11/2024

The International Journal of Cyber Criminology recently published an analysis of cybercrime victimization. The article looks at studies on cybercrime victimization and identifies the types of cybercrimes that people are most vulnerable to. It also examines the factors that increase the likelihood of victimization and the impact of cybercrime victimization on victims. The article stresses the importance of considering human behavior, social dynamics, cultural differences, and societal norms while studying cybercrime and creating effective prevention and intervention strategies. The International Journal of Cyber Criminology is an excellent resource for anyone interested in learning about cybercrime issues, especially among marginalized groups. The journal covers various topics related to cybercrime, such as cyberbullying, identity theft, online fraud, hacking, and cyberterrorism.
Relation to principles
The article discusses how social science principles relate to the topic. It covers psychology, sociology, and anthropology, explaining how human behavior and social dynamics are essential factors in the topic and can impact our decisions and actions. Cultural differences and societal norms are also essential when studying the topic. We can better understand complex issues and phenomena using social science principles.
Research Questions
An article published in The International Journal of Cyber Criminology discusses studies on cybercrime victimization. The article aims to answer questions about the types of cybercrimes that people are most vulnerable to, the factors that increase the likelihood of victimization, and the impact of cybercrime on victims. The study also explores how cybercriminals target individuals and the effectiveness of preventive measures. The authors hope this review will provide insights into the current state of cybercrime victimization research and help identify areas for future research.
Research Methods and Types of Analysis
Understanding research methods is essential to evaluate the quality and validity of a study. The most common research methods are surveys, interviews, experiments, and case studies. To ensure that others can reproduce and build upon the study’s findings, it is crucial to be transparent about the research methods used. This means reporting the methods clearly and openly. The International Journal of Cybercriminology examines cybercriminology, cybercrime, and cybersecurity through research articles, conceptual papers, and book reviews. The journal uses different techniques to analyze data, such as qualitative and quantitative data analysis, case studies, surveys, or statistical methods. The journal aims to comprehensively understand cybercrime and cybersecurity issues by conducting rigorous research and analysis.
Relations to Concepts
The article on cybercrime victimization in The International Journal of Cyber Criminology discusses how different fields of study, such as sociology, psychology, anthropology, and political science, are related to cybercrime. These concepts can help us understand the social environment surrounding cybercrime. Sociology helps us analyze the structures and institutions that affect people’s behavior and motivation. Psychology provides insights into the psychological factors that lead individuals to engage in cybercrime, like personality traits, cognitive biases, and mental health issues. Anthropology helps us understand how cultural norms and values affect people’s attitudes and behavior toward cybercrime. Finally, political science gives us insights into the legal and policy frameworks that can be used to prevent and mitigate cybercrime.
Challenges and Concerns to marginalized groups
Cybercrime affects people and communities worldwide. However, it tends to affect marginalized groups disproportionately. These groups often need more access to resources and information technology and may also have lower social and economic status. It is essential to consider these factors when studying cybercrime and developing effective prevention and intervention strategies. The International Journal of Cyber Criminology offers a unique opportunity to explore these marginalized groups’ challenges, concerns, and contributions. This article provides a comprehensive understanding of cybercrime victimization and its societal impact. It emphasizes the need to consider these factors to develop effective strategies.
The International Journal of Cyber Criminology is a valuable resource for those interested in learning and addressing cybercrime issues among marginalized groups. The journal provides insights into these groups’ experiences, concerns, and contributions and offers guidance on how to create a more just and equal digital world. It is a must-read for scholars, practitioners, and policymakers looking to tackle the challenges of cybercrime.
Overall Contributions
The International Journal of Cybercriminology aims to enhance our understanding of cybercrime and its societal consequences. It covers a wide range of topics, such as cyberbullying, identity theft, online fraud, hacking, and cyberterrorism. The journal’s articles offer a broad perspective on these issues and how they can be addressed.
Conclusion
In conclusion, the International Journal of Cybercriminology is a helpful resource for understanding cybercrime and its impact on society. This journal uses social science principles – like sociology, psychology, anthropology, and political science – to explain how human behavior, social dynamics, cultural norms, and legal frameworks can affect cybercrime prevention and victimization. The goal is to expand our knowledge of cybercrime and cybersecurity through comprehensive research and analysis, covering various topics related to cybercrime. The journal also focuses on the challenges faced by marginalized groups and offers insights into creating a more just and fairer digital world. In summary, the International Journal of Cyber Criminology is a crucial resource for anyone seeking to address cybercrime issues and develop effective prevention and intervention strategies.

Reference

Multidisciplinary field that encompasses. International Journal of Cyber Criminology. (n.d.). https://www.cybercrimejournal.com/

Career Paper CYSE 201 S

The Intersection of Social Science and Cybersecurity: A Case Study of Cybersecurity Policy Analysts
Career Paper
Lana Kopacki
4/7/2024

Introduction:
In today’s interconnected world, cybersecurity has become a paramount concern for individuals, businesses, and governments. As cyber threats evolve in complexity and sophistication, professionals in the field must employ a multifaceted approach to safeguarding digital assets and infrastructures. One crucial aspect of this approach involves understanding the human factors that influence cybersecurity, which is where social science research and principles come into play. This paper will explore how cybersecurity policy analysts depend on social science research and principles in their careers, focusing on key concepts learned in class and their application in daily routines. Additionally, I will examine the implications of cybersecurity policies on marginalized groups and society.
Understanding Human Behavior in Cybersecurity:
Cybersecurity policy analysts play a pivotal role in shaping the policies and regulations that govern cybersecurity practices in various sectors, including government agencies, corporations, and critical infrastructure providers. One fundamental concept learned in class is understanding human behavior in cybersecurity. Social science research provides invaluable insights into threat actors’ motivations, intentions, behaviors, and the end-users targeted by cyber-attacks.
Understanding human behavior is essential for cybersecurity policy analysts in crafting effective policies and strategies to mitigate cyber risks. By drawing upon psychology, sociology, and behavioral economics principles, analysts can develop user-centric approaches to cybersecurity that account for human factors such as cognitive biases, decision-making processes, and social dynamics. For example, research on user awareness and training programs can inform the design of educational initiatives to promote cybersecurity best practices among employees and the public.
Ethical and Legal Implications:
Another critical aspect of cybersecurity policy analysis is considering cybersecurity practices and policies’ ethical and legal implications. Social science research helps professionals in this field navigate complex ethical dilemmas and anticipate the societal impacts of their decisions. Class discussions on ethics, privacy, and human rights provide a framework for evaluating the consequences of cybersecurity policies on marginalized groups and vulnerable populations.
For instance, cybersecurity policy analysts must weigh the need for security against individual rights to privacy and freedom from unjust discrimination when developing data privacy and surveillance regulations. By drawing upon social science research on surveillance studies, algorithmic bias, and digital inequality, analysts can advocate for policies that balance security imperatives and civil liberties. Moreover, understanding the social determinants of cybersecurity can help identify and address disparities in access to resources and protection among marginalized communities.
Inclusive Policy Design:
Cybersecurity policies must be designed with inclusivity in today’s diverse and interconnected society. Social science research offers valuable insights into the diverse needs, preferences, and experiences of different social groups, enabling cybersecurity policy analysts to develop policies that are equitable and accessible to all. Intersectionality and cultural competence are particularly relevant in this context, as they emphasize recognizing and addressing the intersecting identities and inequalities that shape individuals’ cybersecurity experiences.
For example, research on the digital divide highlights disparities in internet access and digital literacy across demographic groups, with marginalized communities often facing more significant barriers to participation in the digital economy and accessing cybersecurity resources. By incorporating insights from social science research into their policy recommendations, cybersecurity policy analysts can advocate for initiatives that promote digital inclusion and bridge the gap between privileged and marginalized populations.
Conclusion:
In conclusion, cybersecurity policy analysts rely on social science research and principles to understand the human dimensions of cybersecurity, navigate ethical and legal challenges, and design inclusive policies that benefit society. By integrating insights from psychology, sociology, ethics, and other social science disciplines into their daily routines, professionals in this field can effectively address the complex and evolving cybersecurity threats facing our interconnected world. Moreover, by paying specific attention to the needs of marginalized groups and advocating for equitable policies, cybersecurity policy analysts can contribute to building a more secure and inclusive digital future for all.

References

(PDF) a bibliometric analysis of cyber security and cyber forensics … (n.d.). https://www.researchgate.net/publication/367302652_A_bibliometric_analysis_of_cyber_security_and_cyber_forensics_research
Author links open overlay panelAlok Mishra a b, a, b, c, d, Highlights•This study investigates cybersecurity attributes used in seven nations including the USA, & AbstractCyber threats have risen because of the growing usage of the Internet. Organizations must have effective cybersecurity policies in place to respond to escalating cyber threats. Individual users and corporations are not the only ones who are af. (2022, June 30). Attributes impacting cybersecurity policy development: An evidence from Seven nations. Computers & Security. https://www.sciencedirect.com/science/article/pii/S0167404822002140
Carley, K. M. (2020, November 16). Social Cybersecurity: An emerging science – computational and mathematical organization theory. SpringerLink. https://link.springer.com/article/10.1007/s10588-020-09322-9


CYSE 201 S Entry #15

Digital Forensics | Davin Teo | TEDxHongKongSalon
Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.

I recently came across an intriguing TEDxHongKongSalon video by Davin Teo, which delved into digital forensics investigation. I was captivated by the presentation, which highlighted how digital evidence can be utilized to solve crimes and bring criminals to justice. The talk shed light on the intricacies of the field and left me with a newfound appreciation for the vital work of digital forensic investigators.
What struck me the most about the speaker’s pathway to his career was how he initially pursued a degree in social sciences before discovering his passion for digital forensics. It made me think about how interconnected different fields of study can be and how they can lead to unexpected career paths. I was also impressed by the speaker’s dedication and perseverance in pursuing his career despite his challenges. It was inspiring to hear how he overcame obstacles and continued to pursue his passion for digital forensics.
After listening to the speaker, I gained a greater understanding of the importance of digital forensics in today’s society. The talk was informative and thought-provoking, leaving me with a new perspective.

CYSE 201 S Entry #14

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

Andriy Slynchuk’s delineation of eleven potentially illegal actions committed by internet users provides a comprehensive insight into online misconduct. Among the plethora of infractions, five are particularly serious due to their potential to cause significant harm or disruption. Firstly, hacking into computer systems and networks poses a grave threat to cybersecurity, jeopardizing sensitive data and infrastructure integrity. Secondly, distributing or accessing child pornography not only violates the law but also perpetuates heinous crimes against minors, warranting stringent enforcement measures. Thirdly, engaging in online harassment, such as cyberbullying or stalking, can inflict severe psychological distress and undermine individuals’ safety and well-being. Fourthly, committing identity theft by unlawfully obtaining personal information poses substantial financial and reputational risks to victims, necessitating robust legal intervention. Lastly, participating in online fraud schemes, including phishing and financial scams, undermines trust in digital transactions and incurs substantial economic losses for individuals and businesses. These offenses are severe due to their potential to harm individuals, communities, and society, highlighting the imperative for stringent enforcement and preventive measures.

CYSE 201 S Entry #13

A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.

I read the article on bug bounty policies and found it quite informative. The literature review I read provided an in-depth understanding of the history and development of policies to identify vulnerabilities in a company’s cyber infrastructure. The review also discussed the effectiveness of these policies in enhancing cybersecurity and preventing cyber attacks. One of the most exciting findings was that major companies such as Google, Microsoft, and Facebook have implemented these policies, and the review provided examples of successful bug bounty programs. Learning how these bug bounty programs incentivize ethical hackers to identify and report vulnerabilities in a company’s IT systems in exchange for rewards was fascinating.

The review also explained the economic principles behind these policies, highlighting the role of cost-benefit analysis in determining the rewards for ethical hackers. It was intriguing to see that this approach ensures that the rewards offered are sufficient to attract ethical hackers while being cost-effective for companies. The literature review provided compelling evidence that bug bounty policies enhance companies’ cybersecurity. It strongly recommends that more companies adopt these policies to minimize the risk of cyber-attacks and protect their sensitive data.

CYSE 201 S Entry #12

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf Links to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

The letter can be analyzed using various economic and social science theories. Here are some examples:

Two economics theories that relate to the letter are game theory and behavioral economics. Game theory can be used to analyze the incentives and strategies of the company and the affected customers in response to the breach. The company may compensate the affected customers by minimizing costs and legal liabilities. In contrast, the customers may try to maximize their benefits by demanding additional compensation or taking legal action against the company. Behavioral economics can be used to analyze the psychological factors that affect the decision-making of the company and the customers. For example, the company may underestimate the probability and severity of a data breach because of overconfidence or cognitive biases. At the same time, the customers may overestimate the risks and harms of the violation because of loss aversion or social influence.

Two social sciences theories related to the letter are social network and cultural theories. Social network theory can be used to analyze the social relationships and interactions among the company, the affected customers, and other stakeholders. The breach may affect the trust, reputation, and legitimacy of the company, as well as the social norms and expectations of the customers regarding privacy and security. Cultural theory can be used to analyze the cultural values and beliefs that shape the company’s and customers’ attitudes and behaviors toward data security and privacy. For example, the company may prioritize economic efficiency and innovation over data protection and transparency because of neoliberal or technocratic culture. In contrast, the customers may prioritize data sovereignty and autonomy over convenience and customization because of a democratic or communitarian culture.

CYSE 201 S Entry #11

What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook
As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

The presentation on the cybersecurity analyst job highlights several social themes that are relevant to the field. One of the most prominent themes is the importance of communication and collaboration. The presenter emphasizes that cybersecurity analysts must be able to work effectively with colleagues from different departments and backgrounds and must also be able to communicate complex technical concepts to non-technical stakeholders. This requires strong interpersonal skills and a willingness to adapt to changing circumstances.
Another essential theme discussed was the need for continuous learning and development. The presenter emphasized that in today’s rapidly evolving world, it is crucial to keep learning and updating one’s skills to stay relevant. This holds for individuals as well as organizations.
Finally, the presentation discussed cybersecurity’s critical role in protecting sensitive data and information. The presenter highlighted the importance of implementing robust cybersecurity measures to safeguard against cyber threats like hacking, data breaches, and cyber-attacks. This is particularly crucial in today’s digital age, where cyber threats are becoming increasingly sophisticated and prevalent.
Overall, the presentation suggests that cybersecurity analysts must be highly skilled and knowledgeable professionals who can work effectively in a dynamic and rapidly changing environment.

CYSE 201 S Entry #10

Read this and write a journal entry summarizing your response to the article on social cybersecurity

 https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site.

I read the article on social cybersecurity and found it very informative and eye-opening. The article highlighted the importance of being careful about what we share online and the potential risks and consequences associated with oversharing personal information. It was interesting to learn how cybercriminals can use social media to gather information and target individuals for fraud or other malicious activities.
One key takeaway from the article was the need to be vigilant about our privacy settings and carefully consider who we connect with and share information with online. It’s also important to be aware of the types of information that cybercriminals seek, such as birth dates, phone numbers, and other personal details that can be used to steal identities or perpetrate different types of fraud.
Overall, the article reminded us of the importance of being mindful and cautious when it comes to our online activities. While social media can be a great way to connect with others and share information, it’s also important to be aware of the potential risks and protect ourselves and our information.

CYSE 201 S Entry #9

Complete the Social Media Disorder scaleLinks to an external site.. How did you score? 0 out of 9 What do you think about the items in the scale? Why do you think that different patterns are found across the world?

I do not use social media often, so I scored nothing on the Social Media Disorder scale. The scale assesses how much social media usage impacts one’s daily life and overall well-being. It comprises several items that evaluate various aspects of social media use, such as time spent on social media, difficulty controlling social media usage, and the impact of social media usage on relationships, work, and self-esteem. Different patterns are found worldwide, which could be due to various factors such as cultural differences, access to technology, and individual differences in social media usage habits. Cultural differences are crucial in shaping social media usage patterns, as different cultures have different attitudes and norms toward technology and social media. Countries with better technological infrastructure and higher rates of internet penetration tend to have higher rates of social media usage than those with lower rates of internet penetration. Finally, individual differences in social media usage habits can also contribute to the observed patterns.