CYSE 201S

Cybersecurity & Social Science

Course Material

Article 1 “Employing Forensic Techniques in Proving and Prosecuting Cross-border Cyber-financial Crimes”

According to multiple research studies, it has been observed that Indonesia is currently facing various significant hurdles in its battle against cybercrime. These obstacles primarily pertain to digital forensic investigations and include a lack of adequate resources and knowledge within law enforcement agencies, inconsistent procedures, and limited collaboration between public and private organizations. This has ultimately resulted in challenges in prosecuting cyber financial crimes that extend beyond Indonesia’s borders. In order to tackle these challenges and effectively combat cybercrime, experts emphasize the crucial role of digital forensics. By properly utilizing these techniques, law enforcement can successfully identify culprits, capture hackers, and retrieve stolen assets. However, to truly overcome cybercrime, there must be an increased investment in forensic tools and methods, improved legislation, and stronger global partnerships.

•  The current subject matter at hand involves delving into the intersection of law, technology, and society, specifically focused on the principles of the social sciences. This subject acknowledges the impact of cybercrimes on individuals and society, emphasizing the vital need for effective measures to combat these unlawful offenses.

•  One of the primary research inquiries is the significance of digital forensics in prosecuting cross-border cyber financial crimes in Indonesia. The study also delves into the particular forensic methods employed and the legal basis for conducting these investigations.

•  The research methods employed include legal-normative analysis, which entails studying the laws and their societal context, and hermeneutic analysis, which focuses on interpreting texts and comprehending their various meanings.

•  The data analyzed for this research includes legal documents, case studies, and statistical information. The approach to analysis is qualitative, with a focus on understanding the broader context and implications of the data.

•  The chosen topic holds significant implications for marginalized communities who may be victims of cybercrimes and lack sufficient resources and support systems. It also highlights the need for inclusive and equitable solutions to address cybercrimes targeted at vulnerable populations.

• The overall impact of these studies on society is substantial as they bring attention to the crucial role of digital forensics in fighting cybercrimes. They also stress the importance of effective collaboration and regulation in this field and suggest ways to improve digital forensic investigations to enhance law enforcement’s efficiency in combatting cybercrimes and protecting individuals and society.

Article: https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/150/55

Article 2 “Simulation for cybersecurity: state of the art and future directions”

This article was targeted around “Simulation for cybersecurity state of the art and future
directions”. It illustrates the rule of struggle hypothesis, which sets that society is in a state of
interminable struggle due to competition for restricted assets In this case, the assets are the
logical information, and the struggle emerges between the requirement for open get to and the
requirement for security. The rule of technological determinism also shows, as the article
examines how innovation (cybersecurity measures) can shape societal structures and social
esteem. The rule of the social construction of reality is also illustrated, as in the article talks
about how recognitions of cybersecurity dangers are built and how they impact activities and
approaches.

The article employs a subjective research method, in which they collected and delivered
information on the subject of cybersecurity in “open science”. It turns out that data from their
different sources supply a good understanding of this issue. Covering some of the concepts
covered in the class, including data privacy, open access to scientific research, cybersecurity, and
policy making. It provides concrete examples of these concepts and their interactions in the
context of scientific research. The article is indirectly relevant to the concerns of marginalized
groups, as widespread access to scientific research they can contribute to the democratization of
knowledge and reduce inequalities of access to information. However, cybersecurity threats can
limit this access, disproportionately affecting marginalized groups who may lack the resources to overcome these barriers. The article also shows an understanding of the complex relationship
between open science and cyber security. It gives emphasizes the need for a balanced approach
that promotes open access to scientific information while ensuring its security. In addition to this,
it provides a good amount of information on potential risks and challenges in the field, by which
they contributed to the development of effective policies and practices.

Article: https://academic.oup.com/cybersecurity/article/7/1/tyab005/6170701?searchresult=1