{"id":287,"date":"2025-01-24T02:48:01","date_gmt":"2025-01-24T02:48:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/?page_id=287"},"modified":"2025-04-30T03:51:03","modified_gmt":"2025-04-30T03:51:03","slug":"cyes-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/cyes-201s\/","title":{"rendered":"CYES 201s"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-095cea4db7e0224ee1e2205a056bcb4b\">NICE Framework<\/h2>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">The two roles that sounded interesting to me on the NICE website are Secure Project Management and Systems Security Management. Secure Project Management sounded interesting to me because you get to build cybersecurity into every project and see how differently it&#8217;s implemented, not only that but you are also kind of the voice of the project to the organization. Systems Security Management also sounded interesting to me because you get to be in charge of cybersecurity as a whole over certain entities while also conveying the importance of cybersecurity to the organization. However Cybersecurity Legal Advice did not interest me because I don&#8217;t want to get into the legal side of it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-c9ed5d3825c8628205399c4f8ad49d31\">Principals of Sciences Relating to Cybersecurity<\/h2>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(47deg,rgba(130,255,245,0.25) 0%,rgba(151,119,209,0.47) 20%,rgba(246,110,227,0.52) 37%,rgba(237,43,130,0.71) 60%,rgba(250,105,97,0.73) 77%,rgba(255,249,77,0.62) 100%)\">There are seven different principles of science that all relate to cybersecurity in different ways. Parsimony, Empiricism, Objectivity, Relativism, Skepticism, Determinism and Ethical Neutrality are the seven different principles of science each being important to implement in their own way. Implementing Parsimony in cybersecurity by first checking the simplest route and making sure the reasoning is in the simplest form. Empiricism is relying on the senses and experience to come to a final conclusion, in cybersecurity we want to implement empiricism because learning from past experiences i.e. different vulnerabilities and threats can help you know how to better handle and avoid those mistakes in the future. We want to always aim to maintain Objectivity in cybersecurity by not letting our personal feelings about a matter affect our research and conclusion. It is very crucial to implement skepticism in cybersecurity, skepticism means to not just believe something without follow up questioning and investigation. This is really important when being in charge of the security of systems and also just a normal user, by questioning you could avoid a major breach.&nbsp; Determinism means that everything is connected and directly affects each other, meaning in cybersecurity that if you know your system and past events well enough you can use that to mitigate future events. Maintaining Ethical Neutrality is crucial in cybersecurity, by not letting your personal opinions and ethics sway your conclusions. When practicing cybersecurity you should be implementing a mix of these different principals, rarely will you be in a position that you find yourself only using one of these principles of cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-8123bb981bce5f5e05c0cb0118dd4e38\">Privacyrights.org <\/h2>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">Privacyrights.org or \u201cPrivacy Rights Clearinghouse\u201d is an organization aiming to make data privacy more accessible by providing tools accessible to the public. Privacy Rights Clearinghouse has several tools researches can utilize. Some of these tools include allowing more access to information on data breaches with their \u201cData Breach Chronology 2.0\u201d this is a database that draws information from government sources and shows the different aspects of things affected by data breaches such as the location, history and companies that have been affected. Privacy Rights Clearinghouse also makes policies readily accessible on their site making it easy for researchers and the public to stay informed on policies, laws and rights pertaining to data breaches. Through advocating and educating, Privacyrights.org offers many beneficial tools for researchers to use to study data breaches.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-c1440dd5617797bbbdab036051d4d3d4\">Maslow&#8217;s<\/h2>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgb(255,203,112) 0%,rgba(199,82,191,0.68) 50%,rgba(65,89,209,0.63) 100%)\">Maslow\u2019s Hierarchy of Needs is a psychological theory designed like a pyramid. There are five needs of Masons Hierarchy of Needs they are Physiological Needs, Safety Needs, Love and belonging needs, Esteem needs and self actuation needs. Each need corresponds to basic human needs i.e. Physiological Needs are things like basic human needs: oxygen, rest, reproduction. Safety Needs are\u00a0 basic security needs: self security, financial security, health security. Love and belonging needs are: emotional connections, friendships, partnerships, acceptance. Esteem needs are things like: self worth and worth from others. And the last need is self actuation needs, They are things like: becoming the best you by personal growth, achievements etc. If we take these needs and relate them to technology we can see that there are many ways they are intertwined. Physiological needs can relate to technology with the development of grocery orders, apps that can track your sleep and food delivery apps. Safety needs can relate to technology with things like: strong passwords, authentication apps and Family tracking apps. Love and belonging needs relate to technology by connecting people virtually ie Social media and dating apps. Esteem needs correlate to technology with a few examples like: online leaderboards, fitness apps and diet apps, online working and learning just to name a few. Lastly, at the bottom of the pyramid we can relate Self Actuation Needs to technology with: things like zoom for being able to connect with people worldwide, Online learning, content creation, digital art and so much more. As we can see, each need in Maslow\u2019s Hierarchy of Needs relates to technology in the modern day.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-147d80ada8fe464cb6105eba45e3ebe6\">Fake Websites<\/h2>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">Hackers use fake websites to deceit people into clicking on them thinking they are the original<br>site. Many hackers will create dupes of popular sites like banking sites, email sites, AI sites,<br>retail sites and more. In the article cited, author Zach Lakovics gives several examples of recent<br>fake websites such as Nike, Chat GPT and paypal that were gaining popularity for tricking a lot<br>of people. A few ways to check that a website is legitimate is by checking the url, oftentimes<br>hackers will simply change the original website address ever so slightly so it&#8217;s hard to notice.<br>Checking things like the domain name, spelling and special characters in a url can help prevent<br>accessing a fake site. Having a firewall installed and the firewall settings adjusted can also help<br>mitigate harm from fake websites by blocking access. Another way you can make sure the site is<br>real is by checking that the certificate is up to date and legitimate. You can also check that it is a<br>secure https site which makes it significantly more likely to be real. Aside from the big things<br>you can look for you can also keep an eye out for things like grammar and spelling mistakes,<br>suspicious emails and wording and generally just keep your eyes open for suspicious hints while<br>surfing the internet<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-01ff0c4b2da95f1895f0c18f9f9706fb\">How Real Is It<\/h2>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgb(74,234,220) 0%,rgba(151,119,209,0.49) 20%,rgba(207,41,185,0.47) 37%,rgba(237,43,130,0.65) 61%,rgb(251,105,98) 80%,rgb(254,248,76) 100%)\">After watching the video about how movies and TV show hacking, it\u2019s obvious that media totally exaggerates what cybersecurity actually is. They make it seem super dramatic, like you just type really fast and boom, you&#8217;re in. But in reality, it\u2019s way more methodical and time-consuming. Watching the expert break down the scenes really showed how much Hollywood gets wrong. I think this kind of portrayal gives people the wrong idea about what hackers do and makes it harder to take real cyber threats seriously. It also makes cybersecurity work look like a solo genius thing, when in real life it\u2019s a mix of teamwork, strategy, and understanding human behavior, stuff we\u2019ve talked about a lot in this class.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-60ac6ef288310954a95ee72aa69bbe80\">Meme&#8217;s<\/h2>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">POV: You just accessed everyone&#8217;s data off the coffee shops unsecured wifi.<br> <a href=\"https:\/\/unsplash.com\/photos\/man-in-black-and-white-striped-polo-shirt-sitting-on-chair-in-front-of-silver-macbook-ICTKcvnXx_8\">https:\/\/unsplash.com\/photos\/man-in-black-and-white-striped-polo-shirt-sitting-on-chair-in-front-of-silver-macbook-ICTKcvnXx_8<\/a><\/p>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">When the boss found out someone opened a suspicious email and now you have to go over<br>basic cybersecurity measures again.<a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Summer_school_GLAM_giorno_1_1.jpg\">https:\/\/commons.wikimedia.org\/wiki\/File:Summer_school_GLAM_giorno_1_1.jpg<\/a><\/p>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">That moment when they post a \u201cget to know me\u201d trend and you screenshot their personal data \ud83d\ude42 <a href=\"https:\/\/unsplash.com\/photos\/programmers-and-developer-teams-are-coding-and-developing-software-Ns_11CZWnYo\">https:\/\/unsplash.com\/photos\/programmers-and-developer-teams-are-coding-and-developing-software-Ns_11CZWnYo<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-6ea79fb2638ee55c7536a4839b2429b3\">Social Media Disorder<\/h2>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgb(74,234,220) 0%,rgba(151,119,209,0.39) 22%,rgba(207,41,185,0.66) 40%,rgb(238,44,130) 60%,rgba(250,105,97,0.63) 80%,rgb(254,248,76) 100%)\">I scored a 3 on the social media disorder scale. I thought that the test was straightforward and to the point and accurately depicted social media disorders\/addictions. I think that there are different social media trends around the world because there are so many different people, places and cultures that influence day to day social factors. There are places that don&#8217;t have as good of internet connection or none at all and that definitely plays a role in people&#8217;s social media trends. I also think that the cultures who have more traits like pride and gloating have a higher chance of having social media disorders.<\/p>\n\n\n\n<p> <\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-22dc0cb8f4c7d676ce9e7a4582115619\">Social Cybersecurity<\/h2>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">Reading the article on social cybersecurity really opened my eyes to how cybersecurity isn\u2019t just about protecting data or networks, it\u2019s also about protecting people\u2019s beliefs and trust. The authors explain that social cybersecurity focuses on how information is used to influence behavior and decision-making, especially through social media and online platforms. This connects directly to what we\u2019ve discussed in class about human factors and how attackers often exploit people, not just systems.<\/p>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">What stood out to me is how misinformation campaigns can weaken national security by creating confusion and division. It\u2019s not just about hacking computers, it\u2019s about hacking minds. This article made me realize that defending against cyber threats means understanding psychology, sociology, and communication, not just technology. It\u2019s a reminder that cybersecurity is a truly interdisciplinary field.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-6c6161ecf62e1fe632a4bd04a4ed9cbe\">Cybersecurity Analyst<\/h2>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgb(74,234,220) 0%,rgba(151,119,209,0.61) 20%,rgba(207,41,185,0.72) 40%,rgba(237,43,130,0.73) 58%,rgba(250,105,97,0.86) 80%,rgb(254,248,76) 100%)\">This video talks about many of the aspects of the cybersecurity analyst job. From security<br>clearance and government jobs to graveyard shifts this video covers a variety of topics.<br>Cybersecurity analysts need to be very trustworthy to handle backing a business and protecting<br>it and its customers. If a company doesn&#8217;t have a good cybersecurity analyst they will lose trust<br>from their customers by being more susceptible to vulnerabilities. Another aspect this video talks<br>about is networking, cybersecurity analysts need to be good at working in teams as well as<br>networking with people in their field to learn more and get into a company. Cybersecurity<br>analysts need to also be everlearning, cybersecurity is an ever growing field with constantly<br>evolving threats if you are not willing to be constantly educating yourself you will not be a good<br>fit.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-c97d26f2288ce54b68aec1856ab0c0a8\">Bug Bounty<\/h2>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">After reading the article on bug bounty policies, it\u2019s clear these programs are a great example of how cybersecurity and social science connect, especially through economics. The literature review explained how companies use cost-benefit analysis to decide it\u2019s more efficient to pay ethical hackers\u00a0<em>only<\/em>\u00a0when they find real vulnerabilities. That ties directly into what we\u2019ve talked about in CYSE 201S: using human behavior (motivation, reward systems) to improve digital security.<\/p>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">The discussion section pointed out that while bug bounties are useful, they aren\u2019t perfect. Too many low-quality reports or vague program rules can make them hard to manage. But overall, they work because they use the skills of outsiders to catch what internal teams might miss. This shows how policies can be shaped not just by tech, but by understanding people, something we\u2019ve seen over and over in this course.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-3ea2ce4177eb020ba536d001318da60a\">Illegal<\/h2>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgba(75,235,221,0.61) 0%,rgba(151,119,209,0.6) 20%,rgba(207,41,185,0.7) 38%,rgba(237,43,130,0.65) 60%,rgba(250,105,97,0.71) 80%,rgba(255,249,77,0.72) 100%)\">There are alot of things people do in their day to day life on the internet that could be illegal and they don&#8217;t even know but there are many people who know that they are not legal. The top 5 offenses that people commit are bullying and trolling because it effects the mental health of individuals and could lead to self harm or suicide. The next is Collecting information about children. People are usually doing this for a negative gain such as sexual or financial. It&#8217;s also a serious problem on the adverse end of oversharing your children on social media. Next is Faking your identity. When people fake their identity it&#8217;s most likely for some kind of personal gain whether that be conning someone out of money or creating a fake personality and making someone else fall in love with someone who doesn&#8217;t actually exist. The next is illegal online searching this is bad because people are trying to go around the laws of what&#8217;s allowed on the internet and access potentially vulnerable or hurtful information and lastly extracting audio from youtube s harmful to the original creator of the audio because people will not credit them or give them the streams earning the artist money. No matter the type of illegal action done on the internet it almost always leads you to being in a more vulnerable situation and at more risk for data leaks or threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-6d680704d016c7a7343fa48650c3a493\">Digital Forensics<\/h2>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">After watching Davin Teo\u2019s TEDx talk on digital forensics, I realized just how much this career is about people, not just computers. I liked how honest he was about not having a straight path into cybersecurity. He mentioned wanting to be a chef at one point, and I think a lot of us can relate to not knowing exactly what we want to do right away. But what really stuck with me was how he talked about telling the \u201cstory behind the data.\u201d That\u2019s what digital forensics is, looking at what happened, how, and why. It\u2019s way more than just pulling files off a hard drive.<\/p>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">This connects a lot to what we\u2019ve been learning in class, especially about how cybersecurity ties into human behavior. Teo\u2019s job uses a mix of psychology, criminology, and even sociology. He\u2019s basically piecing together a puzzle made up of digital actions, but the end goal is to understand the person behind them. That really shows how important social sciences are in cybersecurity, especially when it comes to figuring out motives or patterns in someone\u2019s behavior.<\/p>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">It made me think more about how most cyber issues don\u2019t just happen from technical mistakes, they usually start with people. Whether it\u2019s an insider threat, a phishing attack, or someone covering their tracks, there\u2019s always a human side. Teo\u2019s talk made that super clear. I think this field would be really interesting for anyone who\u2019s curious about both tech and the reasons why people do what they do.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-5f102cffc24e35352b599cf91522d6d4\">Article Review #1: Integrated Model of Cybercrime Dynamics: A<br>ComprehensiveFramework for Understanding Offending and<br>Victimization in the Digital Realm<\/h2>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgba(255,203,112,0.63) 0%,rgba(199,82,191,0.61) 50%,rgba(65,89,209,0.74) 100%)\"><br>Author: Troy Smith 9\/16\/24<br>Article Review: Sage Skaggs<br>February 20, 2025<br>Summary<br>This Article \u201cIntegrated Model of Cybercrime Dynamics: A Comprehensive Framework for<br>Understanding Offending and Victimization in the Digital Realm\u201d by Troy Smith dives deep into<br>the interconnectedness of how behaviors and personality traits correlate to cybercrime both on<br>the offending and victim side. Mr.Smith&#8217;s framework is theoretical. Mr. Smith proposes multiple<br>theories to back up his framework such as the Routine Activity Theory (RAT) which is a<br>well-known theory Mr.Smith describes the concept as \u201cspatiotemporal convergence of likely<br>offenders, suitable targets and the absence of capable guardianship can create criminal<br>opportunities\u201d.and Social Learning Theory (SLT) which is a theory that suggests cybercrime is<br>based on Social environment and online communications. The author says both frameworks lay a<br>good foundation \u201cbut insufficient alone to constitute a comprehensive cybercrime framework\u201d.<br>This is why he presents his theoretical Framework the \u201cIntegrated Model of Cybercrime<br>Dynamics (IMCD)\u201d which dives into the \u201cindividual characteristics, online behavior,<br>environmental factors, and outcomes related to cybercrime offending and victimization\u201d This<br>theory directly relates different personality traits to cybercrimes.<br>How this article relates to social sciences<br>The Author examines how behaviors and personality traits are directly linked to cybercrime. As<br>we have seen in class the psychological theories can relate directly to this study. Cognitive theory<br>corresponds to the author&#8217;s proposed framework. Cognitive theory suggests that offenders&#8217;<br>actions correlate directly to their emotions, offenders will separate themselves from a crime and<br>minimize the responsibility of their actions. The author states \u201cCertain personality traits may<br>predispose individuals to engage in deviant behaviors or seek gratification through illegal<br>activities in cyberspace\u201d We can see here that social studies apply directly. This is just one of the<br>many behavioral theories we can link to the author&#8217;s framework.<br>In week 5 we learned that psychological theories directly link to victimization. We can see that<br>the author proposed the idea that the Impulsivity trait and the Narcissism trait can directly link to<br>victimization with \u201clow self-esteem\u201d a narcissistic trait and impulsive tendencies being more<br>likely to \u201cintimate photos, disclosing sensitive information, or downloading unknown files\u201d,<br>proving behavioral and psychological theories.<br>The proposed framework shows a direct correlation to marginalized groups. People with<br>different behavior traits show different weaknesses that could lead them to be victims of cybercrime as well as people who had a rough childhood, are low income, and can&#8217;t protect<br>themselves in the cyber world.<br>Conclusion<br>Although the author&#8217;s framework is only theoretical, \u201cmore theoretical refinement is needed\u201d.<br>The author gives several examples of ways his research and framework could benefit multiple<br>different sectors going forward and be the basis of something such as \u201cPolicy Application\u201d,<br>\u201cResearch Applications\u201d, \u201cVictim interventions\u201d and \u201coffender management\u201d.This article<br>directly relates to the social sciences and provides great examples of how behavior traits can<br>affect different cyber crimes and victims. The article used a lot of sources and theories that are<br>established but many were from a long time ago. I would have liked to see some more current<br>references.<br>REFERENCES<br>Smith, T. (2024). Integrated Model of Cybercrime Dynamics: A Comprehensive<br>Framework for Understanding Offending and Victimization in the Digital Realm.<br>International Journal of Cybersecurity Intelligence &amp; Cybercrime, 7(2).<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-40b33caa7d9234ff05b1339d5bfa7926\">Article Review #2 \u201cDigital Human Rights in Jordanian<br>Legislation and International Agreement\u201d<\/h2>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">04\/11\/25<br>Article<br>Definitions<br>Digital Rights &#8211; \u201cthe rights that enable individuals to connect to the Internet<br>and ensure their protection while engaging with it, whether through sharing, creating,<br>or receiving data\u201d<br>Human Rights &#8211; \u201cintrinsic entitlements that allow individuals to fully realize their<br>qualities, intelligence, talents, and self awareness while addressing their spiritual<br>needs\u201d<br>Summary<br>The Article \u201cDigital Human Rights in Jordanian Legislation and International<br>Agreement\u201d by Fahad Yousef Al-Kasassbeh, Sadam Mohammad Awaisheh,<br>Mohammad Atef Odeiba, Salah Mohammad Aboudi Awaesheh, Lana Al-Khalaileh,<br>and Manal Al-Braiza, Is about how digital rights have become a fundamental human<br>right in this modern society (officially in 2016), specifically focusing on the laws in<br>Jordan. The authors believe that having laws both on an international and a local<br>level can help protect everyone&#8217;s digital rights. The authors look at how these laws<br>infringe on people&#8217;s digital rights and how \u201cIt is incumbent upon governments to<br>acknowledge, protect, and ensure these rights impartially\u201d<br>Social Principals<br>One of the Social Principles that this article relates to is relativism. Relativism<br>means that \u201call things are related. From a systems perspective\u201d. The authors state<br>\u201cconcerns about online security and hacking underscore the urgent need for an<br>effective legal framework to address these threat\u201d showing Relativism relates to this<br>article because of the ever-changing digital world societies are having to shift and<br>adapt their laws\/regulations to change to protect their citizens, this is a perfect<br>example of all things being interconnected. The authors did a good job of remaining<br>Objectivity, Skepticism, and Parsimony throughout the article. The authors provided<br>both the pros and cons of digital rights internationally and locally in Jordanian law<a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/318\/97\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">providing the reader with both the positive things that Jordanian lawmakers are<br>accomplishing as well ashighlighting the areas that need improvement, maintaining<br>objective and free of bias. The authors applied skepticism when questioning what<br>lawmakers can do to make digital rights widespread and why certain countries like \u201c<br>Russia, China, Saudi Arabia, India, and South Africa\u201d opposed certain clauses about<br>digital rights. The authors made sure that the article was laid out with headings and<br>many different studies showing the argument from different perspectives to make<br>sure that everyone could understand the points they were sharing.<br>Research Methods Used<br>From the five different research methods we have been over, Surveys<br>Experiments, Archival Research, Field Studies, and Multimethod research, the<br>research method used in this article is Archival Research. From international and<br>local laws and treaties from sources like the United Nations to reports, legal studies<br>and sources archival research is the research method. The main analysis method used<br>is qualitative legal. To improve further research I believe this article would greatly<br>benefit field studies in different cultures on how infringement or lack thereof affects<br>their digital rights.<br>Class Concepts<br>This article relates to the module on sociological perspectives. The three<br>sociological perspectives we went over in class were Structural functionalism, Conflict<br>Theory, and Symbolic interactionism. Structural functionalism refers to \u201cHow<br>cybersecurity at the societal level meets important societal functions\u201d; this relates<br>directly to the article, the article shows how international and local Jordanian law<br>protect their citizens from infringement on free speech and protection from<br>cybercrimes and personal data loss. Conflict Theory refers to \u201cHow people in power<br>can use that power to create inequality through the use of digital technology\u201d The<br>article speaks directly on how different laws about digital rights create inequality.<br>Symbolic Interactionism refers to \u201chow individuals interact in the digital world.\u201d This<br>article talks about how different laws about digital rights affect people and their<br>safety. If there are no solid laws about digital rights then things like \u201cencryption<br>protection\u201d and \u201cInformational loss prevention\u201d are useless because without them it<br>will change the way people interact in the digital world, with weaker laws leading to<br>increased risk of vulnerabilities.<br>Conclusion<\/p>\n\n\n\n<p class=\"has-pale-pink-background-color has-background\">As the digital world is growing every day this article is great at bringing<br>awareness to digital rights as a fundamental human right, it also brings awareness to<br>the infringement, lack of access, and inequality on some face about their digital rights.<br>Some marginalized groups such as minorities, women, and the elderly may be more<br>likely to face unjust digital rights. This article encourages equal digital rights and<br>digital access for all people stating \u201cMany countries have implemented legal<br>frameworks to guarantee internet accessibility\u201d and put responsibility in the hands of<br>both local Jordanian law as well as International lawmakers saying \u201cStates and<br>governments are not obligated to compensate individuals if these rights are<br>restricted without proper justification.\u201d Implying that states and governments need to<br>be held accountable.<br>Resources<br>(n.d.).<br>Digital Human Rights in Jordanian Legislation and International Agreement<br>[Review of<br>Digital Human Rights in Jordanian Legislation and International<br>Agreement]. International Journal of Cyber Criminology; K. Jaishankar. Retrieved<br>April 10, 2025, from<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/318<br>\/97<br>CYSE201S Module 8 Diwakar Yalpi<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-pale-pink-color has-text-color has-link-color wp-elements-e0d18b2937b980b2e2c2196f384d6dab\">Career Paper<\/h2>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgba(75,235,221,0.57) 0%,rgba(151,119,209,0.52) 20%,rgba(207,41,185,0.55) 40%,rgba(237,43,130,0.6) 58%,rgba(250,105,97,0.7) 80%,rgba(255,249,77,0.73) 100%)\">The Role of Privacy Officers: Applying Social Science<br>Principles in Cybersecurity and Data Ethics<br>Sage Skaggs<br>CYSE 201S<br>04\/17\/2025<br>Career Paper<br>Introduction<br>In today&#8217;s world where technology is so prevalent data protection has become<br>a huge concern. Data Protection Officers (DPOs) are at the forefront of protecting<br>personal data within organizations and corporations by enforcing laws and ethics<br>about data and technology. Many people do not receive the same access to data<br>protection as others because of many different factors creating a vast Data Protection<br>Divide (DPD) within marginalized groups. The social science principles are<br>intertwined into the role of a DPO and help with everything from enforcing policies<br>to protecting everyone&#8217;s data equally.<br>DPO Job Description<br>DPO is a critical job considering according to a study done by Pew Research<br>\u201c79%\u201d of Americans are concerned with what&#8217;s being done with their data outside of<br>government data and \u201c64%\u201d are concerned about governmental data. The same study<br>also says that \u201c70%\u201d of Americans feel that their data was safer 5 years prior. A<\/p>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgb(74,234,220) 0%,rgba(151,119,209,0.48) 20%,rgba(207,41,185,0.58) 40%,rgba(237,43,130,0.66) 60%,rgb(251,105,98) 80%,rgba(255,249,77,0.73) 100%)\">DPO\u2019s role is to protect the personal data within an organization complying with data<br>protection laws and regulations of any state\/country that the organization has data<br>from. A few of the laws that DPOs have to comply with are the Health Insurance<br>Portability and Accountability Act (HIPAA), General Data Protection Regulation<br>(GDPR), and California Consumer Privacy Act (CCPT). A DPO role is filled by<br>someone who has a good knowledge and experience of information technology and<br>data regulations, a DPO needs at least five years of experience as well as needing to<br>be well versed in awareness training so they can effectively spread awareness and<br>train employees on data protection. A DPO is not monitored by the organization they<br>are enforcing compliance on and DPOs only report to the highest management as<br>GDPR emphasized: \u201cThe controller and the processor shall ensure that the data<br>protection officer is involved, properly and in a timely manner, in all issues which<br>relate to the protection of personal data.\u201d Their responsibilities include monitoring<br>compliance andcreating data policies that adhere to as well as teaching those policies.<br>They also conduct and \u201cprovide advice regarding Data Protection Impact Assessments<br>(DPIAs)\u201d. Many of these duties of a DPO require social science principles.<br>Social Science Application<br>The social science principles are Relativism, Objectivity, Parsimony, Empiricism,<br>Skepticism, Ethical Neutrality, and Determinism each one of these principles relates to<br>the DPO role. To talk about a few starting with objectivity which is to study in a<br>biased way free of preconceived emotions. DPOs have to protect every stakeholder&#8217;s<\/p>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgba(75,235,221,0.69) 0%,rgba(151,119,209,0.59) 20%,rgba(207,41,185,0.6) 40%,rgba(237,43,130,0.72) 60%,rgba(250,105,97,0.7) 80%,rgb(254,248,76) 100%)\">data and make sure it is being stored and handled in a compliant manner no matter<br>their race, background, or any factor about them. Parsimony is to explain things most<br>simply so that everyone can understand them, a DPO has to take all the compliance<br>regulations and laws and make sure that all the stakeholders agree and adhere to<br>them DPOs also have to make policies about data protection and they need to do that<br>in a way that every staff and patron can understand. Empiricism means doing the<br>research and not relying on opinions or hunches. DPOs have to maintain empiricism<br>constantly and rely on data streams and DPIAs to produce their policies and ensure<br>they are maintaining compliance. Arguably the most important principle of the role<br>of a DPO is ethical neutrality meaning they must adhere to ethical standards. A DPOs<br>job is to make sure that all stakeholder&#8217;s data is being handled and upheld to the<br>highest ethical standards.<br>Marginalized Groups and Society<br>Access to data protection is not all created equally, many factors contribute to<br>vulnerable data privacy marginalized groups are affected the most whether it&#8217;s<br>because of the lack of funds for devices with privacy regulations already implemented<br>or from lower intellect and understanding of how to safeguard their data on the<br>internet. \u201cdifferent levels of privacy are afforded to different sections of society. This<br>further promotes social inequalities and impedes access to fundamental rights\u201d For<br>example the American Civil Liberties Union sued 7 agencies over social media<\/p>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgba(75,235,221,0.53) 0%,rgba(151,119,209,0.61) 20%,rgb(207,42,186) 40%,rgba(237,43,130,0.64) 60%,rgba(250,105,97,0.58) 80%,rgba(255,249,77,0.59) 100%)\">surveillance stating &#8220;risks chilling expressive activity and can lead to the<br>disproportionate targeting of racial and religious minority communities, and those<br>who dissent against government policies.&#8221; As highlighted in Module 10, fake news<br>and disinformation disproportionately harm vulnerable communities impacting<br>health, safety, and public trust. Privacy Officers play a key role in limiting the<br>collection and misuse of personal data that enables such targeted manipulation,<br>especially through social media. DPOs also play a key role in protecting everyone&#8217;s<br>data, not discriminating against marginalized groups, and maintaining ethical<br>neutrality.<br>Conclusion<br>DPOs are far more than legal regulation enforcers. They are ethical guardians<br>and social advocates within the digital world. By embedding social science principles<br>like objectivity, empiricism, parsimony, and ethical neutrality into their work, DPOs<br>navigate the complexities of data governance with a balanced, people-centered<br>approach. Their role is especially vital in addressing systemic gaps in data protection<br>that disproportionately affect marginalized groups. As digital technologies and<br>surveillance capabilities evolve, the importance of socially aware and ethically<br>grounded Privacy Officers will only grow. Their commitment to fairness, transparency,<br>and justice ensures that data rights are preserved for all equally and ethically.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background:linear-gradient(135deg,rgba(75,235,221,0.47) 0%,rgba(151,119,209,0.52) 18%,rgba(207,41,185,0.46) 37%,rgba(237,43,130,0.58) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%)\">References<br>GDPR. (2018).<br>GDPR Archives &#8211; GDPR.eu. GDPR.eu. https:\/\/gdpr.eu\/tag\/gdpr\/<br>ENISA. (n.d.). Www.enisa.europa.eu. https:\/\/www.enisa.europa.eu<br>Britzky, H. (2019, January 17).<br>ACLU sues 7 government agencies over social<br>media surveillance. Axios.<br>https:\/\/www.axios.com\/2019\/01\/17\/aclu-sues-7-government-agencies-social-medi<br>a-surveillance?utm_source=chatgpt.com<br>Kedmey, D. (2014, November 12).<br>9 in 10 Americans Feel They\u2019ve Lost<br>Control of Their Personal Data. TIME; Time.<br>https:\/\/time.com\/3581166\/privacy-personal-data-report\/?utm_source=chatgpt.co<br>m<br>Dubal, V. (2019, May 30).<br>San Francisco was right to ban facial recognition.<br>Surveillance is a real danger. The Guardian; The Guardian.<br>https:\/\/www.theguardian.com\/commentisfree\/2019\/may\/30\/san-francisco-ban-fac<br>ial-recognition-surveillance?utm_source=chatgpt.com<br>Addressing the Digital Privacy Divide: The Need to Redefine Digital Equity.<br>(2022). Cyberpeace.org.<br>https:\/\/www.cyberpeace.org\/resources\/blogs\/addressing-the-digital-privacy-divid<br>e-the-need-to-redefine-digital-equity<br>Degeling, M., Lentzsch, C., Nolte, A., Herrmann, T., &amp; Loser, K.-U. (2016).<br>Privacy by Socio-Technical Design: A Collaborative Approach for Privacy<br>Friendly System Design. 502\u2013505. https:\/\/doi.org\/10.1109\/cic.2016.077<br>Auxier, B., Rainie, L., Anderson, M., Perrin, A., Kumar, M., &amp; Turner, E. (2019,<br>November 15).<br>Americans and Privacy: Concerned, Confused and Feeling Lack<br>of Control over Their Personal Information. Pew Research Center.<br>https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concer<br>ned-confused-and-feeling-lack-of-control-over-their-personal-information\/<br>ICO. (2023, July 27).<br>Data protection officers. Ico.org.uk.<br>https:\/\/ico.org.uk\/for-organisations\/law-enforcement\/guide-to-le-processing\/acco<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>NICE Framework The two roles that sounded interesting to me on the NICE website are Secure Project Management and Systems Security Management. Secure Project Management sounded interesting to me because you get to build cybersecurity into every project and see how differently it&#8217;s implemented, not only that but you are also kind of the voice&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sagesportfolio\/cyes-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":30420,"featured_media":312,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/wp-json\/wp\/v2\/pages\/287"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/wp-json\/wp\/v2\/users\/30420"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/wp-json\/wp\/v2\/pages\/287\/revisions"}],"predecessor-version":[{"id":330,"href":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/wp-json\/wp\/v2\/pages\/287\/revisions\/330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/wp-json\/wp\/v2\/media\/312"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sagesportfolio\/wp-json\/wp\/v2\/media?parent=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}