{"id":142,"date":"2026-04-27T21:30:32","date_gmt":"2026-04-27T21:30:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ramankpaul\/?page_id=142"},"modified":"2026-04-27T22:38:38","modified_gmt":"2026-04-27T22:38:38","slug":"case-study","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ramankpaul\/cyse-201s-course-tab\/case-study\/","title":{"rendered":"Case Study"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>Cybersecurity and Social Sciences Case Study<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Student Name: Raman Paul<\/p>\n\n\n\n<p class=\"has-text-align-center\">School of Cybersecurity, Old Dominion University<\/p>\n\n\n\n<p class=\"has-text-align-center\">CYSE 201S: Cybersecurity as a Social Science<\/p>\n\n\n\n<p class=\"has-text-align-center\">Instructor Name: Diwakar Yalpi<\/p>\n\n\n\n<p class=\"has-text-align-center\">April 19, 2026<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Cybersecurity and Social Sciences Case Study<\/strong><\/p>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>The most recent cyberattack on the Mexican government in 2025, 2026, shows how<\/p>\n\n\n\n<p>cybersecurity dangers are becoming more advanced, especially now by using artificial<\/p>\n\n\n\n<p>intelligence (AI). In this attack, the hackers were able to steal a large amount of sensitive data,<\/p>\n\n\n\n<p>like personal and government data, by using AI tools to automate and improve their attacking<\/p>\n\n\n\n<p>methods. This case is significant because it highlights both the technological side of<\/p>\n\n\n\n<p>cybersecurity and the human and social factors that make these attacks possible.<\/p>\n\n\n\n<p><strong>Analysis<\/strong><\/p>\n\n\n\n<p>As for the social science point of view, psychology helps us to understand how attackers<\/p>\n\n\n\n<p>use people&#8217;s weaknesses to their advantage. Like for example, employees can fall for phishing<\/p>\n\n\n\n<p>emails or fail to follow proper security procedures, which lets the hackers gain access (Brown,<\/p>\n\n\n\n<p>2025). By using AI, it makes these attacks even more effective because it can create more<\/p>\n\n\n\n<p>convincing messages and identify system vulnerabilities faster (Smith, 2026).<\/p>\n\n\n\n<p>Sociology can also play a part because companies and governments often have cultural<\/p>\n\n\n\n<p>and structural issues, like the lack of training and weak communication about cybersecurity<\/p>\n\n\n\n<p>practices (Brown, 2025). Most people think systems are safe and don&#8217;t need extra precautions,<\/p>\n\n\n\n<p>which increases the risk of attacks. This attack on the Mexican government also had a bigger<\/p>\n\n\n\n<p>social impact because it affected public trust in government systems and it made people<\/p>\n\n\n\n<p>concerned about how their personal data is protected.<\/p>\n\n\n\n<p><strong>Solutions<\/strong><\/p>\n\n\n\n<p>To address this concern, the government needed a combination of technical and social<\/p>\n\n\n\n<p>solutions. For. the technical side, the governments should look into advanced cybersecurity3<\/p>\n\n\n\n<p>systems that can detect these AI attacks, like machine learning based threat detection and have<\/p>\n\n\n\n<p>stronger encryption methods (Smith, 2026). Regular system updates and monitoring are also<\/p>\n\n\n\n<p>important to have and implement.<\/p>\n\n\n\n<p>From a social science point of view, organizations should focus on their employee<\/p>\n\n\n\n<p>training and awareness programs. Teaching their people how to better recognize phishing<\/p>\n\n\n\n<p>attempts and follow security best practices can lower the human error. In addition, promoting<\/p>\n\n\n\n<p>ethical use of AI and setting clear policies can help prevent AI issues or using it incorrectly.<\/p>\n\n\n\n<p><strong>Barriers<\/strong><\/p>\n\n\n\n<p>There are lots of difficulties when it comes to implementing these solutions. One major<\/p>\n\n\n\n<p>barrier is the cost because these advanced cybersecurity systems and training programs can be<\/p>\n\n\n\n<p>very expensive. The other issue is the fast development of AI, which can makes it difficult for<\/p>\n\n\n\n<p>security measures to keep up with all the new updates. Also, some employees may resist training<\/p>\n\n\n\n<p>or not take it seriously or just delay in completing it.<\/p>\n\n\n\n<p>To overcome these issues, the governments can include more funding for its<\/p>\n\n\n\n<p>cybersecurity and enforce tougher regulations and policies. Making training simple and effective<\/p>\n\n\n\n<p>can also help improve participation and awareness.<\/p>\n\n\n\n<p><strong>Reflection<\/strong><\/p>\n\n\n\n<p>This case shows that cybersecurity is not only about technology but also about human<\/p>\n\n\n\n<p>behavior and social systems. Understanding how people interact with technology is essential for<\/p>\n\n\n\n<p>preventing cyberattacks. Combining cybersecurity with social sciences provides a more complete<\/p>\n\n\n\n<p>approach to solving these problems and helps create stronger and more effective defenses.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>In conclusion, the Mexican government cyberattack demonstrates the growing risks of AI<\/p>\n\n\n\n<p>driven threats. By combining technical solutions with social science insights and training, with<\/p>\n\n\n\n<p>these factors in mind and being mindful of implementing these solutions, it\u2019s possible to better<\/p>\n\n\n\n<p>protect systems from risk and reduce the chances of attacks.5<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Brown, T. (2025). Human factors in cybersecurity breaches. <em>International Journal of<\/em><\/p>\n\n\n\n<p><em>Information Security<\/em>.<\/p>\n\n\n\n<p>Smith, J. (2026). AI and modern cyberattacks: Emerging threats and solutions. <em>Journal of<\/em><\/p>\n\n\n\n<p><em>Cybersecurity Studies<\/em>.<\/p>\n\n\n\n<p>AI Usage<\/p>\n\n\n\n<p>I used AI to help me organize my paper, check the flow, and clean up the formatting. I just used<\/p>\n\n\n\n<p>it as a tool to keep things neat and structured.<\/p>\n\n\n\n<p><a href=\"https:\/\/olddominion-my.sharepoint.com\/:b:\/r\/personal\/rpaul008_odu_edu\/Documents\/presentation\/Raman%20Paul%20Case%20Study%20Assignment.pdf?csf=1&amp;web=1&amp;e=nleYdr\">https:\/\/olddominion-my.sharepoint.com\/:b:\/r\/personal\/rpaul008_odu_edu\/Documents\/presentation\/Raman%20Paul%20Case%20Study%20Assignment.pdf?csf=1&amp;web=1&amp;e=nleYdr<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and Social Sciences Case Study Student Name: Raman Paul School of Cybersecurity, Old Dominion University CYSE 201S: Cybersecurity as a Social Science Instructor Name: Diwakar Yalpi April 19, 2026 Cybersecurity and Social Sciences Case Study Introduction The most recent&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/ramankpaul\/cyse-201s-course-tab\/case-study\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31289,"featured_media":0,"parent":126,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/142"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/users\/31289"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/comments?post=142"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/142\/revisions"}],"predecessor-version":[{"id":177,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/142\/revisions\/177"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/126"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/media?parent=142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}