{"id":291,"date":"2024-04-23T03:38:36","date_gmt":"2024-04-23T03:38:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/technology\/?page_id=291"},"modified":"2024-04-23T03:38:36","modified_gmt":"2024-04-23T03:38:36","slug":"article-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/technology\/article-1\/","title":{"rendered":"Article 1"},"content":{"rendered":"\n<p>Understanding what the principles of social sciences are<br>The question is what the principles of social science is in Cyber Security. So, in cyber security<br>there is the study of social sciences. Let us identify the principles of social science. The principles of<br>social science are Relativism, Determinism, Objectivity, Ethical Neutrality, Skepticism and Parsimony.<br>Relativism can be understood to mean that all things are related to something. Objectivity means when<br>the scientists study topics in some ways. Parsimony means that scientists should keep their explanations in simple terms. Ethical Neutrality means when scientists adhere to ethical standards when they do research. Determinism is when events occur because of specific events. Skepticism is when scientists question or doubt things when doing research. So I chose the article Digital Criminal Investigations in the Era of Artificial Intelligence. In this article I think three principles that could fit into this article are Parsimony, Objectivity, and Skepticism. The research question of this article is basically about how to ultimately stop cyber crime from happening. What is cyber crime? Has this question ever came to your mind when reading articles that talk about cyber crime. Cyber Crime is basically crime that happens online on the internet or some type of device. Cyber crime is very popular now adays as technology is advancing everyday in so many different ways. A few ways that the scientists investigate the criminal activity that goes on is using AI mechanisms. These AI\u2019s are used for surveillance, to monitor crimes, and use cameras to identify the person who did the crime through face recognition. These investigations stand out as a distinct domain of computer generated data. The AI\u2019s also show a wide range of data from electronic devices, network records, data and content from social media plaVorms. This is basically done so that they can investigate the crime that happens online. Some concepts that this article relates to from the class is how researchers study breaches, how the principles of science relate to cyber security, and the principle of determinism in computer hacking. In conclusion, this article explains a lot about criminal activity and how scientists\u2019 study and investigate cyber crime that occurs. It also explains what ways cyber crime is identified and what is used to identify the cyber crime.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding what the principles of social sciences areThe question is what the principles of social science is in Cyber Security. So, in cyber securitythere is the study of social sciences. Let us identify the principles of social science. The principles&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/technology\/article-1\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27401,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/technology\/wp-json\/wp\/v2\/pages\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/technology\/wp-json\/wp\/v2\/users\/27401"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/technology\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/technology\/wp-json\/wp\/v2\/pages\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/technology\/wp-json\/wp\/v2\/pages\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/technology\/wp-json\/wp\/v2\/media?parent=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}