{"id":302,"date":"2025-12-07T05:22:53","date_gmt":"2025-12-07T05:22:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/salahadin06\/?p=302"},"modified":"2025-12-07T06:36:19","modified_gmt":"2025-12-07T06:36:19","slug":"cyse-201s-cybersecurity-and-the-social-sciences-page","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/salahadin06\/2025\/12\/07\/cyse-201s-cybersecurity-and-the-social-sciences-page\/","title":{"rendered":"CYSE 201S \/ Cybersecurity and the Social Sciences Page"},"content":{"rendered":"\n<p>Welcome to the&nbsp;CYSE 201S: Cybersecurity and the Social Sciences&nbsp;page. This section brings together all course-related materials, key concepts, and reflections that demonstrate how cybersecurity connects with human behavior, society, and social science research.<\/p>\n\n\n\n<p>Cybersecurity is more than technology\u2014it is shaped by people, culture, psychology, communication, and the spread of information. This page highlights what I have learned about these human-centered dimensions and how they influence digital safety.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Course Topics Covered<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. A Reverse Digital Divide: Information Security Behaviors in Generation Y &amp; Generation Z<\/strong><\/h3>\n\n\n\n<p>This topic explored how different age groups approach online security.<\/p>\n\n\n\n<ul>\n<li>Generation Y&nbsp;tends to be more cautious and experienced with digital risks.<\/li>\n\n\n\n<li>Generation Z&nbsp;is highly tech-savvy but sometimes more relaxed about cybersecurity practices.<\/li>\n<\/ul>\n\n\n\n<p>Studying these behavioral differences helped me understand how age, experience, and digital upbringing shape security habits\u2014and how cybersecurity solutions must adapt to diverse users.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Social Science Research: Principles, Methods, and Practices<\/strong><\/h3>\n\n\n\n<p>This section introduced the foundations of social science research, including:<\/p>\n\n\n\n<ul>\n<li>Research methods (qualitative, quantitative, mixed)<\/li>\n\n\n\n<li>Ethics in studying human behavior<\/li>\n\n\n\n<li>How data is collected and interpreted<\/li>\n<\/ul>\n\n\n\n<p>Understanding research principles allowed me to analyze cybersecurity issues more effectively. It showed how human factors\u2014motivation, behavior, perception, and social structure\u2014directly influence cyber risks and responses.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Cybersecurity and Its Discontents: AI, IoT, and Digital Misinformation<\/strong><\/h3>\n\n\n\n<p>This topic examined modern cybersecurity challenges caused by emerging technologies, such as:<\/p>\n\n\n\n<ul>\n<li>Artificial Intelligence&nbsp;and its dual-use capabilities<\/li>\n\n\n\n<li>The Internet of Things (IoT)&nbsp;and the risks of hyper-connected devices<\/li>\n\n\n\n<li>Digital misinformation, which influences public opinion and undermines trust<\/li>\n<\/ul>\n\n\n\n<p>This material helped me recognize how technology can both improve and complicate security, especially when misinformation spreads rapidly across social platforms.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><br>CYSE 201S Page\/ Cybersecurity and the Social Science<\/h1>\n\n\n\n<p id=\"block-ac4a591b-39cb-44e8-9154-67832df3959c\">Article Review #1: Exploring Online Deception \u2013 Fraudsters\u2019 Social Engineering Tactics on Job Platforms<br>Salahadin, Abas<br>September 30, 2025<br><br>1. Social Science Relevance<br>This article discusses internet fraud, with a particular emphasis on the strategies used by scammers on job boards. It has to do with fundamental social science ideas including social interaction, selfishness, and how technology shapes behavior. The sociology of trust, power, and vulnerability is reflected in the study&#8217;s examination of how fraud operates in a digital social setting. It presents deception as a socially formed behavior that adjusts to expectations and standards in the virtual world.<br><br>2. Research Focus (RQ, Hypotheses, IV &amp; DV)<br>Research Questions<br>How do fraudsters\u2019 social engineering (SE) tactics vary based on users\u2019 resume presentations, and does fraudster sophistication influence SE strategies?<br><br><br>Hypotheses:<br>While exploratory in nature, the authors hypothesize that resume features (such as personal detail) will influence the type of SE tactics used, and that more technologically advanced fraudsters will employ more complex strategies.<br><br><br>Independent Variables:<br>Resume features (detail, format, demographic hints); fraudster sophistication level.<br><br><br>Dependent Variables:<br>Type and frequency of SE tactics used; effectiveness or engagement outcome.<br><br><br><br>3. Research Methods<br>The study used a mixed-methods approach. It first conducted qualitative coding of fraudster messages to identify patterns in SE tactics. Then, it used quantitative analysis to test relationships between resume attributes and the types of tactics used. The design was cross-sectional, analyzing a single data collection period.<br>4. Data &amp; Analysis<br>Types of Data:<br>Collected digital communication data from fraudulent accounts on employment databases, and metadata related to user resumes.<br><br><br>Analysis Techniques:<br>The authors conducted qualitative thematic coding of the text data, followed by statistical correlation and frequency analysis to assess patterns in the use of SE strategies across varying conditions.<br><br><br><br>5. Connection to Course Concepts<br>This article strongly connects to concepts from our course lectures and PowerPoint presentations, especially the social construction of deviance, routine activity theory, and cyber victimization. Fraudsters exploit digital trust and social norms to craft believable personas, aligning with how deviant behavior is socially contextualized. Routine activity theory is applicable, as fraudsters target users in low-guardianship environments\u2014online job platforms lacking protective filters.<br><br>6. Marginalized Groups: Challenges, Concerns, Contributions<br>While the article does not center explicitly on marginalized populations, it implies that vulnerable users\u2014such as economically disadvantaged individuals, immigrants, or the digitally less literate\u2014may be more susceptible to fraud. These groups often face higher pressure to find employment quickly and may lack the resources or digital fluency to detect deception, exacerbating inequality in online spaces.<br><br>7. Contributions to Society<br>The study offers critical insights into how online fraud evolves and adapts. By identifying patterns in social engineering tactics, it enables platforms, cybersecurity experts, and policymakers to develop targeted prevention strategies. The findings support the need for user education, platform design enhancements, and fraud detection systems grounded in behavioral patterns. This contribution helps bridge the gap between academic theory and practical application.<br>Conclusion<br>This article is a valuable contribution to both the field of cyber criminology and broader social science. It blends qualitative and quantitative methods to offer a deep understanding of online fraud tactics. The study&#8217;s insights inform real-world interventions and policy. While limited by its narrow data source and lack of cultural diversity, it provides a strong foundation for further research on digital deception and social vulnerability.<br><br>Reference<br>Cole, T. (2023). Exploring fraudsters\u2019 strategies to defraud users on online employment databases. International Journal of Cyber Criminology. https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/90<\/p>\n\n\n\n<p>Article Review #2: Understanding University Student Vulnerability to Phishing Attacks<\/p>\n\n\n\n<p>Student Name: Salahadin Abas<\/p>\n\n\n\n<p>School of Cybersecurity, Old Dominion University<\/p>\n\n\n\n<p>CYSE 201S: Cybersecurity and the Social Sciences<\/p>\n\n\n\n<p>Instructor Name: Diwakar Yalpi<\/p>\n\n\n\n<p>Date: 11\/13\/2025<\/p>\n\n\n\n<p><strong>INTRODUCTION\/BLUF<\/strong><\/p>\n\n\n\n<p>This study by Broadhurst, Skinner, Sifniotis, Matamoros-Macias, and Ipsen in 2019&nbsp; investigates the vulnerability of college students to phishing scams. To gauge real world vulnerability, the researchers used a quasi experimental approach to send 138 students different kinds of phishing emails, including spear-phishing, customized, and generic. The study discovered that while cybercrime awareness, gender, IT proficiency, and perceived online safety did not significantly affect susceptibility, individualized scams were more successful than generic ones. Significantly, international and first-year students were more susceptible to phishing scams, underscoring the necessity of focused cyber-education initiatives.&nbsp;<\/p>\n\n\n\n<p><strong>Relation\/Connection to Social Science Principles<\/strong><\/p>\n\n\n\n<p>Important social science concepts, especially those pertaining to human behavior, social institutions, and decision-making, are closely related to the subject of phishing vulnerability. This study demonstrates how social elements including experience level, cultural background, and integration into institutional settings influence people&#8217;s behavior in digital environments in addition to technology. First-year and international students are more vulnerable, which is consistent with larger social science concerns of socialization, adaptation, and unequal access to networks of support or knowledge. The paper emphasizes how social context shapes risk perception and online behavior by looking at how various groups interpret and react to phishing attempts. Overall, the <\/p>\n\n\n\n<p>study supports the social science theory that socialization, identity, group membership, and structural injustices all have an impact on behavior, including in cyberspace.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Research Question \/ Hypothesis \/ Independent Variable \/ Dependent Variable<\/strong><\/h2>\n\n\n\n<p>.<\/p>\n\n\n\n<p>The study looks into the characteristics that affect university students&#8217; vulnerability to phishing attacks. The authors make a number of predictions, like&nbsp; students who receive cybercrime awareness training (the &#8220;Hunter&#8221; group) would be less likely than untrained students to fall for phishing attempts; that spear-phishing or tailored phishing emails would be more successful than generic ones; and that vulnerability would be predicted by factors like gender, IT proficiency, and perceived online safety. The type of phishing email received, the awareness condition (primed vs. unprimed), and a number of student characteristics, including year level, domestic or international status, gender, IT skill level, and perceived Internet safety, are among the study&#8217;s primary independent variables.The main dependent variable is students&#8217; sensitivity to phishing, which is determined by whether or not they engaged with the scam content or clicked links in the phishing emails.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Types of Data Analysis Used<\/strong><\/h2>\n\n\n\n<p>The authors tested students&#8217; vulnerability to phishing using statistical techniques that were both descriptive and inferential. Initially, they summarized fundamental patterns of student reactions using descriptive statistics, such as the quantity of clicks or interactions with each form of phishing email. The characteristics that strongly predicted phishing susceptibility were then tested using a Generalized Linear Model (GLM). These factors included awareness condition, phishing email type, gender, IT competence, perceived Internet safety, year level, and international versus domestic status. The researchers were able to identify the factors that significantly affected students&#8217; propensity to respond to the phishing emails thanks to this inferential study. Identifying group differences and assessing the strength of several predictors of phishing sensitivity were the main goals of the investigation.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Overall Contributions of the Study to Society<\/strong><\/h2>\n\n\n\n<p>This study contributes important insights to society by showing that phishing susceptibility is not solely a technical issue but a social one shaped by experience, identity, and access to information. By identifying which groups are most vulnerable like the&nbsp; international and first-year students, the research provides evidence that can guide universities and policymakers in developing targeted cybersecurity training and support programs. The findings also encourage institutions to adopt proactive measures that strengthen digital awareness and reduce victimization across diverse populations. Really&nbsp; the study boosts our understanding of how social factors influence cybersecurity risks and underscores the societal importance of improving digital safety through inclusive education and awareness initiatives.&nbsp;<\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Reference<\/strong>&nbsp;<\/p>\n\n\n\n<p>Broadhurst, R., Skinner, K., Sifniotis, N., Matamoros\u2011Macias, B., &amp; Ipsen, Y. (2019). <em>Phishing and Cybercrime Risks in a University Student Community<\/em>. <em>International Journal of Cybersecurity Intelligence &amp; Cybercrime, 2<\/em>(1), 4\u201323 <a href=\"https:\/\/vc.bridgew.edu\/ijcic\/vol2\/iss1\/2\/\">https:\/\/vc.bridgew.edu\/ijcic\/vol2\/iss1\/2\/<\/a>&nbsp;<\/p>\n\n\n\n<p><strong><strong>Professional career paper<\/strong><\/strong> <\/p>\n\n\n\n<p>Your Name: Salahadin Abas<\/p>\n\n\n\n<p>Date 11\/13\/2025<\/p>\n\n\n\n<p>Security Operations Center (SOC) Analyst<\/p>\n\n\n\n<p>BLUF: By keeping an eye on systems, spotting threats, and handling incidents, SOC analysts safeguard businesses. Social science research is a major component of their work, particularly when it comes to comprehending human behavior, the reasons behind cyberattacks, and how users engage with technology.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Introduction<\/strong><\/h1>\n\n\n\n<p>An organization&#8217;s networks and systems must be continuously monitored by a Security Operations Center (SOC) analyst in order to identify, evaluate, and address cybersecurity threats. SOC analysts are essential to data protection, business continuity, and upholding public confidence in today&#8217;s digital world. This essay describes how SOC analysts apply social science concepts, how the SOC environment relates to class ideas, and how the profession engages with society and marginalized groups.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Social Science Principles in the SOC Career<\/strong><\/h1>\n\n\n\n<p>SOC analysts rely on research in social science to understand user decision-making, insider threat motivations, and cybercriminal conduct. Human-computer interaction HCI&nbsp; research helps analysts anticipate typical user mistakes, like falling for phishing efforts due to cognitive overload or social engineering approaches (Workman, 2008). If analysts are well-versed in psychological motivators such financial hardship, retaliation, or ideology, they can assess insider-threat risk levels more successfully (Furnell &amp; Clarke, 2012). Social science concepts also serve as a guide for communication tactics. In order to successfully communicate dangers to non-technical staff, SOC analysts must have a thorough understanding of how people perceive risk and respond to alerts. These insights support more successful cybersecurity awareness initiatives and lessen dangerous organizational practices.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Application of Key Class Concepts<\/strong><\/h1>\n\n\n\n<p>SOC analysts&#8217; daily responsibilities are directly related to class concepts like risk assessment, social engineering, user behavior, and trust. By analyzing human behavior patterns, spotting weaknesses, and making sure policies adhere to moral and legal requirements, analysts routinely assess organizational risk. Understanding social factors is essential for methods like behavior-based analytics, incident response documentation, and phishing analysis. For instance, when analysts notice a suspicious login, they use a behavioral science-based approach to determine whether the behavior matches the user&#8217;s usual patterns. Additionally, analysts employ mitigation techniques that take into account how users actually use systems rather than just how they ought to.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Marginalization and Cybersecurity<\/strong><\/h1>\n\n\n\n<p>Cybersecurity incidents disproportionately impact marginalized groups, including individuals with limited digital literacy or communities with reduced access to secure technologies. SOC Analysts contribute to reducing these disparities by implementing secure authentication methods, improving accessibility, and monitoring for cyber threats that target vulnerable populations (Henry, 2020).Additionally, SOC teams support efforts that promote equitable digital protection\u2014such as creating simpler security tools and ensuring security alerts are understandable for all users, regardless of background or education level.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Career Connection to Society<\/strong><\/h1>\n\n\n\n<p>The stability of society is directly impacted by the work of SOC analysts. Analysts contribute to preserving public safety and trust by stopping breaches in industries like government, healthcare, and finance. supporting law enforcement and reacting to significant cyber incidents, their work also contributes to national security. The SOC role is further shaped by public policy, including data protection laws and breach reporting requirements. To maintain compliance and safeguard organizations and the communities they serve, analysts need to stay up to date on legal requirements.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h1>\n\n\n\n<p>Protecting businesses and society from cyber threats is an important function of a Security Operations Center Analyst. Social science ideas, such as behavioral research, human-computer interaction, and communication techniques, play a major role in their work. In this line of work, class ideas like risk assessment, social engineering, and user behavior analysis are used on a daily basis. In addition to identifying and addressing threats, SOC analysts contribute to the development of safer, more welcoming online environments for all users.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>References (APA Format)<\/strong><\/h1>\n\n\n\n<p>Furnell, S., &amp; Clarke, N. (2012). Power to the people? The evolving recognition of human aspects of security. Computers &amp; Security, 31(8), 983\u2013988.<\/p>\n\n\n\n<p>Henry, C. (2020). Digital inequality and cybersecurity risks in marginalized communities. Journal of Cyber Policy, 5(2), 123\u2013139.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats. Journal of the American Society for Information Science and Technology, 59(4), 662\u2013674 .<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the&nbsp;CYSE 201S: Cybersecurity and the Social Sciences&nbsp;page. This section brings together all course-related materials, key concepts, and reflections that demonstrate how cybersecurity connects with human behavior, society, and social science research. Cybersecurity is more than technology\u2014it is shaped by people, culture, psychology, communication, and the spread of information. This page highlights what I&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/salahadin06\/2025\/12\/07\/cyse-201s-cybersecurity-and-the-social-sciences-page\/\">Read More<\/a><\/div>\n","protected":false},"author":31536,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/posts\/302"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/users\/31536"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/comments?post=302"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/posts\/302\/revisions"}],"predecessor-version":[{"id":312,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/posts\/302\/revisions\/312"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/media?parent=302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/categories?post=302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadin06\/wp-json\/wp\/v2\/tags?post=302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}