CYSE201S/Article Review 2

Title of the article: Cyberbullying on Social Media: Definitions, Prevalence, andImpact ChallengesLink: Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges |Journal of Cybersecurity | Oxford Academic(1) How does the topic relate to the principles of the social sciences?The topic of Cyberbullying on Social Media relates to the principles of social sciences inseveral ways. It…

Article Review 2

Title of the article: Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges Link: Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges | Journal of Cybersecurity | Oxford Academic (1) How does the topic relate to the principles of the social sciences? The topic of Cyberbullying on Social Media relates to the principles of…

Article Review 1

Title of the article: Developing metrics to assess the effectiveness ofcybersecurity awareness programLink: Developing metrics to assess the effectiveness of cybersecurity awareness program | Journal of Cybersecurity | Oxford Academic Title of the article: Developing metrics to assess the effectiveness of cybersecurity awareness program Link: Developing metrics to assess the effectiveness of cybersecurity awareness program…

How Technology Promotes Workplace Deviance?

Cyber technology has created opportunities for workplace deviance in many ways.  The easy accessibility to a great amount of sensitive information has created significant opportunities for employees to misuse it for personal gain. For instance, an employee could steal or alter confidential data and sell it to competitors for financial profit. Furthermore, employees holding animosity…

Human Factor vs. Technology in Cybersecurity

Both training and advanced technology play crucial roles in protecting valuable data or information. However, with limited funds and resources, prioritizing employee training over additional cybersecurity technology is the more effective approach. The human factor in CybersecurityEvidently, the human factor is the weakest link in the IT infrastructure. Most of the past breaches have been…

Is Digitizing Human DNA a Threat?

As we advance in the fields of science and technology, numerous benefits and positive outcomes have emerged. In the past, thousands of lives were lost due to some untreatable diseases that could have been prevented with effective vaccinations, medicines or treatment. Undoubtedly, advancement in medical science has undeniably improved our quality of life. In the…

Foundation Principles of Information Security: The CIA Triad

Information Security is built upon the three basic foundational principles: Confidentiality, Integrity and, Availability, the CIA Triad. It ensures that the data is kept private, accurate and accessible to authorized users when needed. The CIA TriadThe CIA Triad is a designed model or a framework to guide information security policies within an organization. CIA refers…