CYSE 201S

This page shows the coursework of Cybersecurity and Social Science.

Article Review #1:

Rudaina Quorishi 

CYSE 201S

School of Cybersecurity, Old Dominion University

Professor Yalpi

October 2, 2025 

Article Review 1

Article: Controlling Cyber Crime through Information Security Compliance Behavior: Role of Cybersecurity Awareness, Organizational Culture and Trust In Management

The article looks into the human and organizational aspects of cybersecurity. As cybercrime is seen as a technical issue, we can argue that security policies are a social and behavioral concern. This perspective connects the research closely to social science principles, which analyze how human beliefs, values, and interactions influence actions within larger institutional frameworks. The study highlights the social science interest in the relationship between individual agencies like employee awareness, participation, and structural elements like trust in leadership. 

The research is driven by many questions. The author developed hypotheses suggesting that culture, awareness, and participation would have a positive impact on compliance behavior and that trust in management would improve these such effects. The independent variables identified in the study include the organized culture, cybersecurity awareness, and employee involvement, while the dependent variable focus on employee compliance behavior regarding information security. Management was considered a moderate variable, explaining the process by which organizational factors influence compliance. 

The study took advantage of a quantitative approach. Data was gathered from employees across a good amount of departments, employing tools to display the approach of awareness, culture, involvement, trust, and compliance. SEM was then employed to test the hypothesized relationships and mediation effects. SEM enabled the researchers to examine both direct and indirect relationships and assess how well the model fit the data overall.

The analytical strategy of the study reflects broader theories found in social science and cybersecurity. The application directly connects to principles of research design, while the focus on an organized culture aligns with theories of social and group behavior. The results include norms and intentions to behave. Cybersecurity awareness, organized culture, and employee involvement outlooks compliance. The article highlights the significance of trust, a theme in organized sociology and psychology, indicating that compliance is more useful when employees view their leaders as reliable and supportive.

There’s consequences for workplace inclusion and equity. If an organization’s culture is not inclusive, workers from underrepresented groups may find it difficult to obtain cybersecurity training or may have less faith in management. If procedures are not positioned equally, excluded individuals may face penalties for noncompliance. These factors emphasize how crucial it is to create equitable, accessible, and culturally sensitive cybersecurity awareness and compliance initiatives. If compliance is to be regularly attained across different workforces, trust and engagement must be extended to every employee.

Overall, from an academic view, it connects cybersecurity research and organizational behavior theory by showing how social and psychological factors influence compliance. Practically, it provides guidance on how to improve through organized culture, encouraging honesty, and staff involvement. The report shows that technology is not enough to stop cybercrime by placing cybersecurity within a socio-technical context. Building resilient organizations requires stronger cultures of awareness, engagement, and trust. At the societal level, the research helps to lower the likelihood of data breaches and cyberattacks, safeguarding resources, public involvement in digital systems, and individual privacy.

Article Review #2:

Article Review #2: Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study

Rudaina Quorishi

School of Cybersecurity, Old Dominion University 

Professor Yalpi

November 14, 2025

The article Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study  by Ruhul Amin which was published in the International Journal of Information Security & Cybercrime in 2024 is about how women in particular face cyberbullying. It’s also mentioned in the article what other factors play a part in this issue such as social factors. explores the societal, historical, and digital variables that influence cyberbullying targeting women. Furthermore, measuring the benefits and drawbacks of Bangladesh’s existing laws on cybercrime, the research looks at the way internet abuse damages women’s mental wellness, social status, and their sense of protection. It presents an interdisciplinary view that brings together social science concepts like sexual orientation, authority, tradition, and poverty with inquiries into cybercrime.

As it reveals how digital behavior portrays fundamental society frameworks, gender roles, and a lack of power, this subject matter is built on a solid sociological scientific foundation. Cyberbullying against women cannot be considered a single occurrence. It is an aspect of greater cultural norms that reduce women’s independence, preserve inequality based on gender, and justify harm done to women. The socialization of disordered interaction with others and social authority represent a few of the ideas that provide insight into how women face discrimination occasionally and the reason why such individuals tend to feel strong in online environments where there is less oversight. 

Two main research topics are at the center of this study. What technical as well as societal factors lead to cyberbullying towards women in Bangladesh as a whole? What are some of the affected people’s ethical, societal, and emotional effects? The research shows that cyberbullying threats are made worse by gender inequality, online platform overuse, and lack of regulation, even if it lacks structure under specific ideas. Mentally, societal judgment, and restricted involvement with the internet are the contributing factors. Although cultural standards, mistreatment of social media sites, and flaws in privacy regulations are the independent variables at play. The author utilizes a method of inquiry that is reinforced by policy assessments, research, and case studies. Records of cyberbullying occurrences, meetings, official documents, and primary educational resources make up the information being collected. The research reveals repeated trends in individual events, community opinions, and legal vulnerabilities by themes. The emotional and social components of cyberbullying, which scientific methods may ignore, can be examined by the investigator using a subjective process.

By spreading knowledge of gender inequality and encouraging stricter governmental safeguards, education efforts, and training, the research enhances the community. It highlights how important it is for developing secure digital environments and support groups. The article pushes authorities, social groups, and the public to make efforts to reduce cyber injustice and improve equal rights for women by highlighting rule and execution differences. By merging cybercrime studies with social science ideas, the author’s work offers significant understanding into the reasons and outcomes of cyberbullying towards women in Bangladesh. It shows how fundamental prejudice against women, improvements in technology, and social standards promote such behavior related to cyberbullying. 

References:

Amin Ruhul, Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study, International Journal of Information Security & Cybercrime. Accessed November 14, 2025

Cybersecurity Professional Career Paper:

Cybersecurity Professional Career Paper

Cybersecurity Analyst: Applications of Social Science

Rudaina Quorishi 

School of Cybersecurity, Old Dominion University

Professor Yalpi

November 14, 2025 

Safeguarding a firm’s infrastructure, systems, and information from online attacks is the responsibility of a cybersecurity analyst. Cybersecurity analysts mainly depend on social science studies and ideas in their everyday job, despite the fact that their position is frequently seen through a strictly technological viewpoint. Analysts can better analyze attackers, present danger, and react to cyberspace events using methods that are respectful to the varied communities they serve by utilizing ideas from the fields of psychology, sociology, law, and morals. This study examines how social science concepts inspire cybersecurity analysts everyday behaviors and how their job affects the community, particularly those with disadvantaged backgrounds that are most affected by cyberthreats. 

Criminological theories are used by cybersecurity analysts for understanding the reasons for cyberattacks and the techniques used by criminals. Analysts can better understand trends like fake credentials breaches, security breaches, and phishing attempts by using the theories of rational choice and the theory of routine activity (Carley). Analysts may anticipate malicious activity and create safety measures that intervene with unlawful choices through understanding the social contexts and reasons that motivate cybercrime, such as financial stress, trade frameworks, or social factors. These findings suggest that cybersecurity is a social and behavioural conflict in addition to a technological issue.

A key element of cybersecurity is how people act, and psychological concepts are frequently used by cybersecurity analysts. Humans errors of cognitive prejudice, or social media influence, are the fundamental causes of many cyber disasters. Analysts can create personalized education, analyze unusual behaviors, and recognize warning signs of phishing or internal exploitation by having a solid grasp of how feelings, anxiety, and confidence affect decision making. When doing follow-up meetings, analysts also use psychological concepts because they are aware that employees may experience feelings of humiliation, regret, or fear. A psychologically educated technique enhances the collection of proof, lessens anxiety, and enhances trust. (Security et al.)

According to a sociological study, excluded groups, those who have lower incomes, and those with a lack of electronic knowledge, are more likely to be victims of cyberattacks and have a lower level of self-defense. When creating accessible rules, highlighting danger, or establishing security education efforts, cybersecurity analysts need to be aware of these gaps. Analysts could support procedures that safeguard workers who lacks complex technological abilities or customize safety suggestions for local organizations with restricted availability of technology. This shows a broader awareness of how cybersecurity works throughout social structures influenced by resources available, society, and injustice. (CCU)

Analysts study behaviors while maintaining a watch on web traffic to figure out whether irregularities are suggestive of malicious intention or normal user behavior. This involves knowledge regarding the social surroundings, company culture, and standards at work. An attempt at logging in from another place can be a sign of identity breach, however, it could just be a reflection of a mobile worker’s traveling plan. Social science aids researchers in eliminating stereotypes, which minimizes error rates and ensures fairness for all individuals, even those whose employment practices change because of socioeconomic or cultural differences.

Solid communication qualities based on social science are essential for responding to incidents. Analysts frequently deal with concerned CEOs, staff members, and outside organizations. For people with little to no technical expertise or members of underprivileged communities who might be skeptical of establishments, direct interaction is key. Behavioral concepts like sympathy, attentive listening, and stereotyping recognition are applied by researchers to guarantee that counsel is clear, polite, and helpful. This strengthens the company’s sense of security and lowers fear during events.

Cybersecurity Analysts frequently supervise or take part in education courses that teach people about credentials, phishing attacks, and secure conduct on the internet. Studies on audience participation, approaches to learning, and intercultural interactions from education psychology and sociology are an essential source of ideas for productive instruction. Communication challenges, different kinds of online involvement, and variations in how people use technology have to be taken into consideration by analysts when producing their goods. This is particularly crucial when firms work with or provide services to minorities whose safety needs could be distinct from those of people in general.

Cybersecurity analysts depend on much more than just skills in technology. Social science ideas like criminology, sociology, psychology, and morality have an important effect on what they do every day. Researchers can deal with attacks more successfully when they have a greater awareness of the way people act, attack motives, unfair practices, and social patterns. Every aspect of the public are influenced by cybersecurity, but those with disadvantages have the greatest impact. Therefore, cybersecurity analysts are essential to advancing digital safety, equality, and trust. In the long run, including social science in cybersecurity activity enhances community health and corporate resiliency.

References: 

  • Carley, Kathleen M. “Social Cybersecurity: An Emerging Science.” Computational and Mathematical Organization Theory, vol. 26, no. 4, Nov. 2020, pp. 365–81. https://doi.org/10.1007/s10588-020-09322-9. Accessed Nov. 16, 2025
  • Security, Committee on a Decadal Survey of Social and Behavioral Sciences for Applications to National, et al. “A Decadal Survey of the Social and Behavioral Sciences.” National Academies Press eBooks, 2019, https://doi.org/10.17226/25335. Accessed Nov. 16, 2025
  • “The Growing Importance of a Career in Cyber Security.” CCU Online, www.ccu.edu/blogs/cags/category/business/the-growing-importance-of-a-career-in-cyber-security. Accessed Nov. 16, 2025

Cybersecurity Presentation Link:

 CYBERSECURITY IN HEALTHCARE

https://docs.google.com/presentation/d/1KRGuoRT0a5RZ8JPzzS_fJnQRZqsAgSQOcBqFh6zjAu8/edit?usp=drive_link