Article Review: Exploring the Intersection of AI and Cybercrime

Rythem Anderson-Seawell Old Dominion University Exploring the Intersection of AI and Cybercrime One of the critical points of the International Journal of Cybersecurity Intelligence & Cybercrime is bringing forth several essential insights into the cybercrime arena. As Choi, Dearden, and Parti (2024) argued, artificial intelligence is one of the new inventions offenders employ to serve…

A Review of Literature on Broadening Diversity in Cybersecurity Education

Rythem Anderson-Seawell Old Dominion University Securing the Human: A Review of Literature on Broadening Diversity in Cybersecurity Education             The article “Securing the Human: A Review of Literature on Broadening Diversity in Cybersecurity Education” is scholarly. It is published in the Innovation and Technology in Computer Science Education (ITiCSE) journal. How Topic Relates to Social…

Career Paper: Cybersecurity Analyst

Career Paper: Cyber Security Analyst Rythem Anderson-Seawell Cybersecurity and Social Science Old Dominion University Career paper- Cyber Security Analyst Cybercrime Investigators and Social Science Principles Cybercrime investigators are vital in safeguarding people, organizations, and governments from cyber threats as the world moves to increasingly digitized options. Their role may seem purely technical, but their work…

Opportunities for Workplace Deviance

New technology has opened up new opportunities for workplace deviance, and it is the ease of access to certain resources that poses the greatest threat. When it comes to all things digital, access is everything. And for companies and their employees, digital access is not only easy—it is expected. From smart devices to cloud-based solutions to…

The “Short Arm” of Predictive Knowledge

Given the limitations of predictive knowledge in cybersecurity, we should concentrate on developing flexible policies and infrastructure that put resilience and prompt response first. Policies must prioritize ongoing monitoring, strong incident response, and adaptable defenses above attempting to foresee every possible threat. Employee training is crucial since human mistakes frequently cause breaches. Despite the difficulty…

Write Up – The Human Factor in Cybersecurity

If my budget were limited, I would retain a balanced approach as CISO, paying equal attention to employee training and necessary, core cybersecurity technology. I have said before and will likely say again that human error plays too large a role in our cyber incidents. Phishing, social engineering, and just plain human origin (i.e., when…