The Social Impact of Cybercrime Risk Among University Students

Relation to the Principles of the Social Sciences:              Firstly, this study requires the principle of ethical neutrality to be recognized and kept in mind when performing the study. The article states that the study was “approved by a government ethics board as well as by each participating organization” (Sommestad, T., Karlzén, H., 2024). Each…

A Study in Ransomware Severity and the Effect on Organizations

Relation to the Principles of Social Science:             The study reviewed discusses a study in vulnerability, specifically concerning ransomware that affects organizations. The article itself states that this was an empirical study of these topics, which indicates that this study was completed without relying on assumptions or personal opinions. Performing a study while applying this…

The Role of the Social Sciences in Penetration Testing

Introduction:             Penetration testing is defined by Cloudflare, a prominent company in the cybersecurity sphere, as “a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.” These tests are often done by pen testing experts by simulating a cybersecurity attack to evaluate and strengthen a company’s security protocols…

Digital Forensics as A Career

            I found Davin Teo’s TED talk in Hong Kong on his career in digital forensics very interesting. I, admittedly, did not know much about digital forensics as a career, and hearing about a few of the many things he does in his career was highly informative. Digital forensics as a whole can relate back…

The Severity of Potentially Unknown Internet Uses

            Out of a provided list, I believe the top five most serious items are as follows (in no particular order): Bullying and Trolling, Collecting Information About Children, Illegal Searches on the Internet, Using Other People’s Internet Networks, and Faking Your Identity Online. The first, bullying and trolling, seems pretty self-explanatory. Any kind of bullying…

Analyzing Bug Bounties

               In a given article, data is collected from a database from HackerOne, a program management platform. Information was collected from bug bounty programs that met certain criteria. This criterion was that the program started out as private, started no later than May 2019, subscribe to HackerOne program management, and offer cash bounties to hackers….

Data Breaches and Economic Theories

            Given a sample data breach notification letter, two economic theories that relate back to the letter would be the classical economic theory and information asymmetry. A principle behind the classical theory is self-regulation. This letter shows an example of an effort to retain customers and maintain, or self-regulate, the company’s reputation. Information asymmetry is…

The Cybersecurity Analyst Career

            In the YouTube video What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook, the first relation I noticed between the description of the job title “Cybersecurity Analyst” and social behaviors is they have the potential to be responsible for training and cybersecurity awareness for a company. Providing this training requires at least…

The Increasing Need for Social Cybersecurity

               The article Social Cybersecurity – An Emerging National Security Requirement identifies some very valid points on the evolution of the cybersecurity field and the flow of information, specifically pertaining to the national level. It points out that the information that is shared and transferred has become both decentralized and removes the need for a…

The Social Media Disorder Scale

               I find it incredibly interesting that the DSM-5 defines, and has criteria for, a disordered social media user. This diagnosis addition really emphasizes how important social media has become to modern everyday life. I think the criteria questions are very thorough and cover different areas of where social media could be interfering with one’s…