Journal Entry 5

Cybercrime is often financially motivated, making “For Money” the most reasonable motive for offenders. Criminals engage in hacking, fraud, ransomware, and data theft primarily for financial gain, as money serves as a strong, tangible incentive. Following closely behind, political motives rank second, as hacktivism and state-sponsored cyberattacks are prevalent today. Many individuals and groups commit…

Journal Entry 4

Maslow’s Hierarchy of Needs finds modern parallels in today’s tech landscape. The foundational physiological needs, such as food, water, and shelter are readily met through food delivery apps and smart home devices that maintain comfort. In terms of safety, technology offers robust cybersecurity measures, password protection, and GPS tracking for personal security. For belongingness and…

Journal Entry 3

Researchers can use PrivacyRights.org to study data breaches by analyzing patterns in how and why they occur. They can look at which industries are most affected, what types of data are stolen, and how attackers gain access. This helps identify common security weaknesses that organizations need to address. By tracking breaches over time, researchers can…

Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students

Introduction The article titled “Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students” by Al-Badayneh, Khelifa, and Ben Brik (2024), published in the International Journal of Cyber Criminology, presents an empirical study examining the relationship between cyberbullying and suicidal ideation among college students in Jordan. This topic directly aligns with social science principles by addressing deviance,…

Cybercrime Laws in Jordan and Freedom of Expression

Introduction The article “Cybercrime Laws in Jordan and Freedom of Expression: Critical Examination of the Electronic Crimes Act 2023” by Alaeldin Mansour Maghaireh explores the evolution of cybercrime legislation in Jordan, with a focus on the latest Electronic Crimes Act 2023. The study critically examines the impact of these legislative changes on freedom of expression…

The Social Science Behind Cybersecurity Analysts’ Work

The Social Science Behind Cybersecurity Analysts’ Work Cybersecurity analysts play a critical role in protecting digital infrastructure, and their daily work relies heavily on social science principles such as human behavior analysis, social engineering awareness, risk perception, and ethics. These professionals not only interact with diverse communities, including marginalized groups, but also face complex challenges…

Journal Entry 1

The NICE Workforce Framework for Cybersecurity (NICE Framework) is a comprehensive resource that helps employers develop their cybersecurity workforce by providing a common language to describe cybersecurity work and the knowledge and skills required to perform it. It includes seven Work Role Categories, 52 Work Roles, and over 2,200 Task, Knowledge, and Skill (TKS) statements….

ODU Majors Related to Cybersecurity

A computer science major provides a strong foundation in programming, algorithms, and data structures. This knowledge is crucial for understanding the inner workings of cybersecurity systems and developing secure software applications that are resistant to vulnerabilities and exploits. Engineers play a crucial role in cybersecurity by applying scientific and mathematical principles to develop cost-effective solutions…

Costs and Benefits of Developing Cybersecurity Programs in Business

Developing cybersecurity programs in business comes with both costs and benefits. On the cost side, businesses need to make a financial investment by acquiring and maintaining security software, hardware, and infrastructure, as well as hiring skilled professionals to manage and monitor cybersecurity systems. They also need to invest in training employees on cybersecurity best practices…