{"id":12,"date":"2024-01-15T17:56:40","date_gmt":"2024-01-15T17:56:40","guid":{"rendered":"https:\/\/wp.pprd.odu.edu\/spring2017-met330-template\/?page_id=12"},"modified":"2024-04-18T10:35:44","modified_gmt":"2024-04-18T10:35:44","slug":"hw","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/hw\/","title":{"rendered":"Journals"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">#2<\/h2>\n\n\n\n<p>Science principles, like observation and experimentation, are fundamental in cybersecurity. Continuous monitoring and analysis of system behavior help identify anomalies or threats. The scientific method guides incident response, where hypotheses are formed and tested to understand and mitigate security breaches. Additionally, the reliance on empirical evidence and data-driven decision-making aligns with the scientific approach, enhancing the effectiveness of cybersecurity measures.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#3<\/h2>\n\n\n\n<p><br>Researchers can leverage the information provided by PrivacyRights.org by collecting the data the website acquires, utilizing it for their studies on data breaches. The publicly available information on data breaches offers researchers valuable insights into trends, patterns, and the characteristics of these incidents. By analyzing the frequency, size, and affected industries, researchers can better understand the evolving landscape of cyber threats. Examining common attack vectors and geographical distribution provides crucial knowledge for developing targeted cybersecurity measures and international cooperation. Additionally, researchers can assess the impact on individuals, the types of exposed personal information, and the efficacy of response and mitigation strategies. This comprehensive approach enables researchers to contribute to the improvement of cybersecurity practices, inform regulatory frameworks, and ultimately enhance strategies for preventing and mitigating the impact of data breaches. It is imperative, however, that researchers handle this information ethically, respecting privacy considerations and legal guidelines throughout their studies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"># 4<\/h2>\n\n\n\n<p>Maslow&#8217;s Hierarchy of Needs provides a framework to understand human motivation. In the context of technology, these needs manifest in various ways.<\/p>\n\n\n\n<p>At the foundational level, the physiological needs are met through technology by ensuring access to basic necessities like food, water, and shelter. Online grocery shopping and food delivery apps, for instance, contribute to the fulfillment of these needs. Moving up to safety needs, technology plays a role in providing security. Home security systems, password-protected devices, and online safety measures contribute to a sense of safety and protection in the digital realm.<\/p>\n\n\n\n<p>Social needs find expression in the use of social media and communication platforms. Connecting with others, whether through messaging apps or social networking sites, satisfies the need for belongingness and social interaction in the digital space. The esteem needs are reflected in online self-expression. Social media platforms, personal blogs, or professional networking sites allow individuals to showcase achievements, garner recognition, and enhance their digital reputation.<\/p>\n\n\n\n<p>At the pinnacle, self-actualization is facilitated by educational and self-improvement resources available online. Online courses, informational websites, and digital content contribute to personal growth and fulfillment. In my own experiences, using technology to order groceries online, setting up secure passwords and privacy settings, engaging in social media to connect with friends, showcasing achievements on professional networking sites, and pursuing online courses for self-improvement all align with Maslow&#8217;s Hierarchy of Needs, demonstrating how technology intertwines with our fundamental motivations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#5 <\/h2>\n\n\n\n<p>Real Website 1: Amazon.com Characteristics: Professional design, secure payment options, extensive product listings, customer reviews. Fake Website 2: &#8220;LuxuryBagsOutlet.com&#8221; Characteristics: Spelling errors, unrealistically low prices, limited payment options, no brand affiliations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#7 <\/h2>\n\n\n\n<p>Why did the old lady smile at her phone? Because it passed the &#8220;granny test&#8221; for Human Systems Integration! Just like ensuring grandma can effortlessly navigate her phone, HSI ensures technology fits seamlessly into people&#8217;s lives, regardless of age or tech-savviness. So, if granny&#8217;s grinning, you know your system&#8217;s got it right!<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"282\" height=\"188\" src=\"http:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-content\/uploads\/sites\/35454\/2024\/02\/granny.jpg\" alt=\"\" class=\"wp-image-69\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">#8<\/h2>\n\n\n\n<p>After watching the video about how Hollywood misrepresents hacking, I&#8217;ve been thinking a lot about how the media shapes our understanding of cybersecurity. It&#8217;s clear that Hollywood often exaggerates and glamorizes hacking, making it seem easier and more glamorous than it really is. This can lead to misconceptions and misunderstandings about the real risks and challenges of cybersecurity. It&#8217;s important to remember that cybersecurity is a complex and ever-evolving field that requires constant vigilance and expertise. While the media can help raise awareness about cybersecurity issues, we should always approach portrayals of hacking with a critical eye and seek out accurate information from reliable sources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#9<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-content\/uploads\/sites\/35454\/2024\/03\/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Tobi-Goldfus-Social-Media-Disorder-Scale.\"><\/object><a id=\"wp-block-file--media-450b7a2e-c9ac-468b-b31b-22c18d84589f\" href=\"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-content\/uploads\/sites\/35454\/2024\/03\/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf\">Tobi-Goldfus-Social-Media-Disorder-Scale<\/a><a href=\"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-content\/uploads\/sites\/35454\/2024\/03\/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-450b7a2e-c9ac-468b-b31b-22c18d84589f\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">#10<\/h2>\n\n\n\n<p>After reading the article on social cybersecurity, I am struck by the profound implications it holds for national security and warfare in the modern era. The concept of social cybersecurity goes beyond traditional cyber defense and delves into the manipulation of human behavior and societal structures through technology, which is a fascinating yet concerning development.<\/p>\n\n\n\n<p>The article highlights how technology has empowered both state and nonstate actors to wage information warfare at an unprecedented scale and speed. This includes manipulating beliefs, spreading disinformation, and sowing discord to weaken nations and alliances. The notion that wars are no longer declared but are already underway in the information domain is particularly sobering.<\/p>\n\n\n\n<p>The comparison to the blitzkrieg of World War II underscores the strategic importance of social cybersecurity. Just as the physical blitzkrieg reshaped the battlefield, the information blitzkrieg has the potential to reshape societies and international relations. It&#8217;s a reminder of the evolving nature of warfare and the need for comprehensive defense strategies.<\/p>\n\n\n\n<p>One aspect that stands out is the multidisciplinary nature of social cybersecurity, blending fields like political science, sociology, psychology, and technology. This interdisciplinary approach is crucial for understanding and addressing the complex challenges posed by information warfare.<\/p>\n\n\n\n<p>The example of Russian information operations serves as a stark illustration of the real-world impact of social cybersecurity. By exploiting divisions and leveraging propaganda, Russia has demonstrated how information can be used as a powerful weapon to undermine adversaries.<\/p>\n\n\n\n<p>In conclusion, the article underscores the urgent need for governments and defense organizations to prioritize social cybersecurity in their strategies. As technology continues to evolve, so too must our defenses against threats in the information domain. It&#8217;s a reminder that in the digital age, protecting societies and values requires more than just securing networks\u2014it necessitates safeguarding against cognitive hacking and information manipulation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#11<\/h2>\n\n\n\n<p><br>The description of the cybersecurity analyst job intersects with social behaviors in several ways. Firstly, it involves understanding human psychology and behavior patterns to anticipate and prevent cyber threats that exploit social engineering tactics. Secondly, cybersecurity analysts often deal with issues of trust and communication within organizations, emphasizing the importance of fostering a culture of cybersecurity awareness among employees. Additionally, the job requires analyzing social media trends and online interactions to identify potential threats or vulnerabilities stemming from human interactions on digital platforms. Overall, the role of a cybersecurity analyst is deeply intertwined with social themes such as trust, communication, human behavior, and online interactions, highlighting the complex interplay between technology and society in the realm of cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#12<\/h2>\n\n\n\n<p>Two economic theories relevant to this situation are Game Theory and Information Economics. Game Theory helps us strategize responses, considering customer trust and financial impacts. Information Economics stresses the value of data protection and potential costs like regulatory fines. In terms of social sciences, Social Identity Theory explains customer reactions based on group identity, affecting trust and interactions. Diffusion of Innovation Theory shows how security practices spread post-breach, with early adopters promoting data protection standards.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#13<\/h2>\n\n\n\n<p><br>Bug bounty programs, hailed as cost-effective cybersecurity tools, are supported by our study&#8217;s empirical evidence. We used a large dataset and instrumental variables to analyze security researchers&#8217; motivations and their impact on bug bounties. Our findings suggest researchers are largely motivated by non-monetary factors. Surprisingly, a company&#8217;s revenue and brand don&#8217;t significantly affect bug reports received. However, sectors like finance, retail, and healthcare receive fewer valid vulnerabilities, albeit not statistically significant. New companies joining bug bounty platforms don&#8217;t reduce reports. Older programs face challenges finding bugs, but expanding the code base could counteract this negative age effect. These insights call for sector-specific strategies and ongoing program innovation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#14<\/h2>\n\n\n\n<p><br>Using unofficial streaming services deprives content creators of their rightful earnings, leading to profit loss. Bullying and trolling online can cause harm to individuals, potentially resulting in self-harm or harm to others. Faking your identity online can spread misinformation and lead to exploitation of personal information. Collecting information about individuals younger than 13 on adult-oriented sites can pose risks to their safety and privacy. Engaging in illegal searches on the internet, such as for child pornography or bomb-making instructions, can lead to serious legal consequences, including imprisonment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#15<\/h2>\n\n\n\n<p>I admire how the speaker&#8217;s pathway reflects adaptability and continuous learning. His transition from psychology to cybersecurity exemplifies the evolving nature of investigative work, where professionals must continuously update their skills to keep pace with advancing technologies and emerging cyber threats. It&#8217;s inspiring to see how his background in social sciences has equipped him with valuable insights into human behavior, which he applies to understand cybercriminals and the impact of their actions on individuals and society.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>#2 Science principles, like observation and experimentation, are fundamental in cybersecurity. Continuous monitoring and analysis of system behavior help identify anomalies or threats. The scientific method guides incident response, where hypotheses are formed and tested to understand and mitigate security&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/hw\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26153,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-json\/wp\/v2\/pages\/12"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-json\/wp\/v2\/users\/26153"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":91,"href":"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-json\/wp\/v2\/pages\/12\/revisions\/91"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pauls201seportfolio\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}