JOURNAL ENTRIES

NICE Workforce Framework (Week 1)

After reviewing the NICE Workforce Framework, I find myself particularly drawn to the Competency Areas related to cybersecurity risk management and analysis. The ability to assess and mitigate cyber risks across an organization appeals to my analytical mindset and desire to make a significant impact on organizational security. 

I’m also intrigued by the Work Roles involving threat detection and incident response. The dynamic nature of these roles, requiring quick thinking and adaptability, aligns well with my problem-solving skills. 

On the other hand, areas focused on highly technical aspects like low-level programming or hardware engineering appeal less to me. While I recognize their importance, I prefer roles that blend technical knowledge with strategic thinking and risk management. 

Overall, I’m excited about the potential to develop a career path that combines risk analysis, threat detection, and incident response within the cybersecurity field. 

Principle of Science

The principles of science are directly applicable to cybersecurity research and practice.
Empiricism emphasizes basing knowledge on observable evidence, which is crucial for
understanding cyber threats and validating security measures. Determinism suggests that events
have causes, allowing researchers to identify attack patterns and vulnerabilities. Parsimony
encourages simple explanations and solutions, which can lead to more manageable and effective
security systems. Objectivity is essential for unbiased threat analysis and policy development.
Ethical neutrality ensures responsible research practices. Relativism highlights the
interconnectedness of technology and social systems in cybersecurity. Together, these principles
provide a framework for rigorous, evidence-based approaches to cybersecurity, enabling
researchers and practitioners to develop more robust defenses against evolving threats.

How to use Privacy rights to Study Data Breaches

Researchers could use the publicly available information on data breaches from
PrivacyRights.org to conduct numerous studies on cybersecurity trends and impacts. They could
analyze the frequency, scale, and types of breaches across different sectors and time periods to
find patterns and vulnerabilities. The data could be used to assess the effectiveness of privacy
regulations and security measures by comparing breach rates before and after implementation.
Researchers might also examine the economic and reputational consequences of breaches on
affected organizations. Additionally, the information could inform studies on consumer behavior
and trust in digital services following high-profile incidents. This resource provides valuable
real-world data for developing predictive models, evaluating risk factors, and formulating
evidence-based cybersecurity strategies and policies.

ARTICLE REVIEW #1

Tryfene Scott 
February 16, 2025 

Article Review: “The Electronic Contract in Civil and Commercial Codes” https://doi.org/10.5281/zenodo.4766801 

BUF: This article review examines “The Electronic Contract in Civil and Commercial Codes”. This study explores the nature, characteristics, and applications of electronic contracts within Jordanian legislative frameworks, comparing them to traditional contracts. 

Introduction 

Al Masadeh et al. (2024) explore the evolving landscape of electronic contracts in Jordan, focusing on their characteristics, formation methods, and applications in civil and commercial contexts. The study emphasizes the importance of adapting legal systems to accommodate technological advancements in contract formation. 

Social Science Principles: The topic relates to the principles of social sciences by examining how technology and law intersect to shape social interactions and economic activities. It touches on aspects of sociology, economics, and political science by analyzing the impact of electronic contracts on society, commerce, and legal systems. 

Research Questions/Hypotheses: The study seeks to answer questions about the fundamental nature of electronic contracts, their formation methodologies, and their applications in civil and commercial contexts within Jordanian law. It also aims to identify limitations within Jordan’s legal frameworks that impede their alignment with the digital realm. 

Research Methods: The study employs a descriptive and analytical approach. It relies on secondary sources such as books, websites, articles, and official documents to gather data. The data is then evaluated using simple content analysis. 

Data Types and Analysis: The data consists of legal texts, scholarly articles, and other secondary sources related to electronic contracts and Jordanian law. The analysis involves examining the content of these sources to identify key themes, definitions, and legal implications. 

Connections to PowerPoint Concepts: The PowerPoint presentations could relate to the article by discussing legal frameworks, contract law, and the impact of technology on legal systems. Concepts such as legal modernization, regulatory adaptation, and consumer protection in the digital age would be relevant The PowerPoint might focus on the need for legal frameworks to evolve in response to technological advancements, which is a central theme in the article. 

Marginalized Groups: The topic relates to the challenges, concerns, and contributions of marginalized groups by highlighting the need for consumer protection in electronic transactions. The study notes deficiencies in Jordan’s civil laws pertaining to consumer rights in electronic contracts. Marginalized groups may be more vulnerable to fraud or deception in online transactions, making consumer protection measures particularly important for these populations. 

Overall Contributions to Society: The study contributes to society by providing a concise and descriptive overview of electronic contracts within the context of Jordanian laws. It offers insights into the advantages, disadvantages, and associated nuances of electronic contracts for legal entities and stakeholders. The research also identifies limitations within Jordanian law that need to be addressed to ensure effective regulation of electronic transactions and protection of consumer rights. This can inform policy formulation, foster innovation, and promote economic prosperity within the nation. It emphasizes the need for Jordan to modernize its legal system and adapt to the digital age. 

Reference 

Al-Fawair, A. M. (2014). Electronic contracts: Consent and expression of will, a comparative study. Dar Al-Thaqafa for Publishing and Distribution. 

Al Masadeh, A. M., Khawaldeh, A. M., & Al-salamat, M. A. (2024). The Electronic Contract in Civil and Commercial Codes. International Journal of Cyber Criminology, 18(1), 1–14. https://doi.org/10.5281/zenodo.4766801 

PRIVACY RIGHTS WEEK 3

Researchers could use the publicly available information on data breaches from PrivacyRights.org to conduct numerous studies on cybersecurity trends and impacts. They could analyze the frequency, scale, and types of breaches across different sectors and time periods to find patterns and vulnerabilities. The data could be used to assess the effectiveness of privacy regulations and security measures by comparing breach rates before and after implementation. Researchers might also examine the economic and reputational consequences of breaches on affected organizations. Additionally, the information could inform studies on consumer behavior and trust in digital services following high-profile incidents. This resource provides valuable real-world data for developing predictive models, evaluating risk factors, and formulating evidence-based cybersecurity strategies and policies. 

MASLOW’S HIERARCHY of NEEDS WEEK 4

Maslow’s Hierarchy of Needs can be applied to our digital experiences in various ways. At the physiological level, technology provides access to basic information like weather forecasts. For safety needs, we use security software and privacy settings to protect our digital identities. Our social needs are met through social media platforms which allow us to connect with friends and family. Our esteem needs are fulfilled through likes, shares, and followers online. Self-actualization is achieved through online learning platforms. For instance, I use weather apps to plan my day (physiological), two-factor authentication for online school (safety), Instagram to stay connected with friends (social), LinkedIn for professional achievements (esteem), and Microtek Learning for personal growth (self-actualization). Technology has become integral to satisfying needs at every level of Maslow’s hierarchy. 

WEEK 5

Based on the articles I reviewed, I would rank the motives for cybercrime as follows: 1) For money, 2) Multiple reasons, 3) Political, 4) Revenge, 5) Recognition, 6) Entertainment and 7) Boredom. Here are my reasons: For money financial gain is the most logical motive, as cybercrime can be highly lucrative with the least risk. Multiple reasons acknowledge the complexity of human behavior. Political motivations are increasingly common with the rise of 
hacktivism. Revenge is a strong emotional driver. Recognition appeals to those seeking fame or acknowledgment. Entertainment, while less justifiable, can be understood as thrill-seeking behavior. Boredom makes the least sense as it trivializes the serious nature of cybercrime, although it may explain some minor incidents as to why younger individuals are so vulnerable. 

WEEK 6

Three fake websites found from recent sources are:

  1. Sheingivesback.com – A phishing scam posing as Shein’s official site.
  2. VolcomLifeStyle.com – A fraudulent site selling counterfeit Volcom products.
  3. Trendcraftleather.com – A scam website offering leather goods at suspiciously low prices.

Comparing these to legitimate sites like Amazon.com, Walmart.com, and Etsy.com, key differences include:

– Suspicious URLs with misspellings or unusual domains

– Lack of HTTPS security

– Absence of legitimate contact information

– Unrealistic discounts or promotions

Specific red flags include fake gift card offers, malware-laden redirects, and pressure tactics to rush decisions. Legitimate sites have secure payment systems, clear policies, and proven online presences.

Reference:

Identity Guard. (2024). How To Tell If a Website Is Fake: 12 Warning Signs.

WEEK 7

Photo #9: Meme Text: “When you think a 4-digit passcode is enough, but hackers are 
laughing in binary.” 
The person in this scenario might be thinking, “This is quick and easy to remember,” but they 
may not realize how vulnerable a simple passcode can be to brute-force attacks. 
Photo #17: Meme Text: “Public Wi-Fi: Where your private data becomes public. The 
individual might be thinking, “I’ll just quickly check my email,” unaware that their data could be 
intercepted by malicious actors. 
Photo #1: Meme Text: “Typing your heart out… forgetting the auto-save feature exists.” 
The individual might be thinking, “I’m being productive,” while neglecting basic precautions 
like enabling auto-saving. 
Relation to Human-Centered Cybersecurity 
These memes highlight common scenarios where human behavior intersects with cybersecurity 
risks. 

WEEK 8

These videos on hacking scenes in these movies and TV shows exemplified how media can shape our understanding of cybersecurity. Often, these depictions are dramatized, leading to misconceptions about hacking speed and complexity. Keren Elazari breakdown on realistic portrayals, like in “Mr. Robot,” can educate viewers about actual cybersecurity practices. She subtracted half a point out of ten because real hackers do not wear gloves. However, most scenes are exaggerated for entertainment value, potentially creating unrealistic expectations. This mix of realism and fiction can both inform and mislead audiences, influencing public perceptions of cybersecurity threats and solutions. Overall, media plays a significant role in shaping our cybersecurity awareness, emphasizing the need for accurate representation to foster a more informed public. 

WEEK 9

My score of 0 indicates normative social media usage. The item in the scale covers behaviors associated with potentially disordered social media use, such as those used for substance use disorders. The different patterns found across the world may be attributed to several factors such as Cultural differences: Some cultures may place more emphasis on face-to-face interactions. Technological infrastructure: Varying levels of internet access and smartphone usage. Socioeconomic factors: Differences in work-life balance, leisure time, and economic conditions. Regulatory environment: Some countries have stricter regulations on social media platforms. Age demographics: Countries with younger populations vs those with older demographics and social norms: Societal expectations and norms regarding online behavior. These factors can contribute to the diverse patterns of social media use observed globally. 

WEEK 10

My score of 0 indicates normative social media usage. The item in the scale covers behaviors associated with potentially disordered social media use, such as those used for substance use disorders. The different patterns found across the world may be attributed to several factors such as Cultural differences: Some cultures may place more emphasis on face-to-face interactions. Technological infrastructure: Varying levels of internet access and smartphone usage. Socioeconomic factors: Differences in work-life balance, leisure time, and economic conditions. Regulatory environment: Some countries have stricter regulations on social media platforms. Age demographics: Countries with younger populations vs those with older demographics and social norms: Societal expectations and norms regarding online behavior. These factors can contribute to the diverse patterns of social media use observed globally. 

WEEK 11

The presentation about the cybersecurity analyst job highlights several social themes. Communication is important as analysts may need to train users. Networking and community involvement are presented as valuable for meeting people and gaining experience. The presenter’s discussion about choosing cities based on cost of living and personal preferences shows how social and lifestyle factors influence career choices. The varying levels of job competition in different cities, influenced by the presence of tech companies and universities, illustrate the social dynamics of the job market. The presenter’s call for audience engagement through comments, likes, and subscriptions aims to build community. Finally, the presenter’s honesty about their own challenges with networking acknowledges the social difficulties some individuals might encounter in their professional growth.   

WEEK 12

The presentation about the cybersecurity analyst job highlights several social themes. Communication is important as analysts may need to train users. Networking and community involvement are presented as valuable for meeting people and gaining experience. The presenter’s discussion about choosing cities based on cost of living and personal preferences shows how social and lifestyle factors influence career choices. The varying levels of job competition in different cities, influenced by the presence of tech companies and universities, illustrate the social dynamics of the job market. The presenter’s call for audience engagement through comments, likes, and subscriptions aims to build community. Finally, the presenter’s honesty about their own challenges with networking acknowledges the social difficulties some individuals might encounter in their professional growth.   

WEEK 13

Journal Entry: Bug Bounty Policies as Economic Cybersecurity Tools 
Bug bounty policies, which incentivize ethical hackers to identify vulnerabilities for monetary 
rewards, exemplify a cost-effective cybersecurity strategy rooted in economic principles. The 
literature highlights their efficiency: crowdsourcing vulnerability detection reduces costs 
compared to traditional audits while leveraging global talent. However, success depends on 
program design—underfunded rewards or ambiguous disclosure policies can deter participation 
or lead to ethical conflicts. Studies note that skilled hunters often dominate submissions, raising 
scalability concerns, while common vulnerabilities may not justify payouts if rediscovery rates 
are high. Societally, these programs democratize cybersecurity by enabling global participation 
but risk exploiting low-income hackers without standardized compensation frameworks. The 
discussion underscores the need for hybrid models that integrate bug bounties with internal 
audits, balancing economic efficiency with equitable practices to maximize security outcomes 
and foster collaborative innovation. 

WEEK 14

Based on the authors, Andriy and Slynchuk, several common online activities carry significant risks. Using unofficial streaming or torrent services to access copyrighted content for free is illegal due to copyright violation and can lead to lawsuits. Similarly, downloading copyrighted material like images without permission is against the law unless it is in the public domain. Sharing personal information of others, such as addresses, on public forums without their consent, especially with harmful intent, is also illegal. Furthermore, collecting data from children under 13 without parental consent violates the Children’s Online Protection Act. Finally, conducting illegal searches related to child pornography or bomb-making can be monitored by authorities and may lead to severe penalties. These actions can result in legal trouble and highlight the importance of understanding online laws. 

WEEK 15

Digital forensics involves the collection, analysis, and reporting of electronic data for legal presentation. Using tools, data integrity is preserved via hashing. Though technical, it strongly relates to social sciences by investigating human behavior in digital spaces, including corporate breaches, internal group activities, crime, and fraud. This supports the legal system and connects to criminology, organizational behavior, and privacy. Speaker Davin Teo’s path was unexpected; he was an accountant, fell into IT, and joined digital forensics after seeing an email about a new practice, finding his “niche” by chance. Overall, the talk shows that digital forensics is not just about technology but also about understanding people, making it essential for solving crimes and addressing societal issues effectively. 

WEEK 3

Researchers could use the publicly available information on data breaches from PrivacyRights.org to conduct numerous studies on cybersecurity trends and impacts. They could analyze the frequency, scale, and types of breaches across different sectors and time periods to find patterns and vulnerabilities. The data could be used to assess the effectiveness of privacy regulations and security measures by comparing breach rates before and after implementation. Researchers might also examine the economic and reputational consequences of breaches on affected organizations. Additionally, the information could inform studies on consumer behavior and trust in digital services following high-profile incidents. This resource provides valuable real-world data for developing predictive models, evaluating risk factors, and formulating evidence-based cybersecurity strategies and policies. 

WEEK 4

Maslow’s Hierarchy of Needs can be applied to our digital experiences in various ways. At the physiological level, technology provides access to basic information like weather forecasts. For safety needs, we use security software and privacy settings to protect our digital identities. Our social needs are met through social media platforms which allow us to connect with friends and family. Our esteem needs are fulfilled through likes, shares, and followers online. Self-actualization is achieved through online learning platforms. For instance, I use weather apps to plan my day (physiological), two-factor authentication for online school (safety), Instagram to stay connected with friends (social), LinkedIn for professional achievements (esteem), and Microtek Learning for personal growth (self-actualization). Technology has become integral to satisfying needs at every level of Maslow’s hierarchy. 

WEEK 5

Based on the articles I reviewed, I would rank the motives for cybercrime as follows: 1) For money, 2) Multiple reasons, 3) Political, 4) Revenge, 5) Recognition, 6) Entertainment and 7) Boredom. Here are my reasons: For money financial gain is the most logical motive, as cybercrime can be highly lucrative with the least risk. Multiple reasons acknowledge the complexity of human behavior. Political motivations are increasingly common with the rise of 
hacktivism. Revenge is a strong emotional driver. Recognition appeals to those seeking fame or acknowledgment. Entertainment, while less justifiable, can be understood as thrill-seeking behavior. Boredom makes the least sense as it trivializes the serious nature of cybercrime, although it may explain some minor incidents as to why younger individuals are so vulnerable. 

WEEK 6

Three fake websites found from recent sources are:

  1. Sheingivesback.com – A phishing scam posing as Shein’s official site.
  2. VolcomLifeStyle.com – A fraudulent site selling counterfeit Volcom products.
  3. Trendcraftleather.com – A scam website offering leather goods at suspiciously low prices.

Comparing these to legitimate sites like Amazon.com, Walmart.com, and Etsy.com, key differences include:

– Suspicious URLs with misspellings or unusual domains

– Lack of HTTPS security

– Absence of legitimate contact information

– Unrealistic discounts or promotions

Specific red flags include fake gift card offers, malware-laden redirects, and pressure tactics to rush decisions. Legitimate sites have secure payment systems, clear policies, and proven online presences.

Reference:

Identity Guard. (2024). How To Tell If a Website Is Fake: 12 Warning Signs.

WEEK 7

Photo #9: Meme Text: “When you think a 4-digit passcode is enough, but hackers are 
laughing in binary.” 
The person in this scenario might be thinking, “This is quick and easy to remember,” but they 
may not realize how vulnerable a simple passcode can be to brute-force attacks. 
Photo #17: Meme Text: “Public Wi-Fi: Where your private data becomes public. The 
individual might be thinking, “I’ll just quickly check my email,” unaware that their data could be 
intercepted by malicious actors. 
Photo #1: Meme Text: “Typing your heart out… forgetting the auto-save feature exists.” 
The individual might be thinking, “I’m being productive,” while neglecting basic precautions 
like enabling auto-saving. 
Relation to Human-Centered Cybersecurity 
These memes highlight common scenarios where human behavior intersects with cybersecurity 
risks. 

WEEK 8

These videos on hacking scenes in these movies and TV shows exemplified how media can shape our understanding of cybersecurity. Often, these depictions are dramatized, leading to misconceptions about hacking speed and complexity. Keren Elazari breakdown on realistic portrayals, like in “Mr. Robot,” can educate viewers about actual cybersecurity practices. She subtracted half a point out of ten because real hackers do not wear gloves. However, most scenes are exaggerated for entertainment value, potentially creating unrealistic expectations. This mix of realism and fiction can both inform and mislead audiences, influencing public perceptions of cybersecurity threats and solutions. Overall, media plays a significant role in shaping our cybersecurity awareness, emphasizing the need for accurate representation to foster a more informed public. 

WEEK 9

My score of 0 indicates normative social media usage. The item in the scale covers behaviors associated with potentially disordered social media use, such as those used for substance use disorders. The different patterns found across the world may be attributed to several factors such as Cultural differences: Some cultures may place more emphasis on face-to-face interactions. Technological infrastructure: Varying levels of internet access and smartphone usage. Socioeconomic factors: Differences in work-life balance, leisure time, and economic conditions. Regulatory environment: Some countries have stricter regulations on social media platforms. Age demographics: Countries with younger populations vs those with older demographics and social norms: Societal expectations and norms regarding online behavior. These factors can contribute to the diverse patterns of social media use observed globally. 

WEEK 10

My score of 0 indicates normative social media usage. The item in the scale covers behaviors associated with potentially disordered social media use, such as those used for substance use disorders. The different patterns found across the world may be attributed to several factors such as Cultural differences: Some cultures may place more emphasis on face-to-face interactions. Technological infrastructure: Varying levels of internet access and smartphone usage. Socioeconomic factors: Differences in work-life balance, leisure time, and economic conditions. Regulatory environment: Some countries have stricter regulations on social media platforms. Age demographics: Countries with younger populations vs those with older demographics and social norms: Societal expectations and norms regarding online behavior. These factors can contribute to the diverse patterns of social media use observed globally. 

WEEK 11

The presentation about the cybersecurity analyst job highlights several social themes. Communication is important as analysts may need to train users. Networking and community involvement are presented as valuable for meeting people and gaining experience. The presenter’s discussion about choosing cities based on cost of living and personal preferences shows how social and lifestyle factors influence career choices. The varying levels of job competition in different cities, influenced by the presence of tech companies and universities, illustrate the social dynamics of the job market. The presenter’s call for audience engagement through comments, likes, and subscriptions aims to build community. Finally, the presenter’s honesty about their own challenges with networking acknowledges the social difficulties some individuals might encounter in their professional growth.   

WEEK 12

The presentation about the cybersecurity analyst job highlights several social themes. Communication is important as analysts may need to train users. Networking and community involvement are presented as valuable for meeting people and gaining experience. The presenter’s discussion about choosing cities based on cost of living and personal preferences shows how social and lifestyle factors influence career choices. The varying levels of job competition in different cities, influenced by the presence of tech companies and universities, illustrate the social dynamics of the job market. The presenter’s call for audience engagement through comments, likes, and subscriptions aims to build community. Finally, the presenter’s honesty about their own challenges with networking acknowledges the social difficulties some individuals might encounter in their professional growth.   

WEEK 13

Journal Entry: Bug Bounty Policies as Economic Cybersecurity Tools 
Bug bounty policies, which incentivize ethical hackers to identify vulnerabilities for monetary 
rewards, exemplify a cost-effective cybersecurity strategy rooted in economic principles. The 
literature highlights their efficiency: crowdsourcing vulnerability detection reduces costs 
compared to traditional audits while leveraging global talent. However, success depends on 
program design—underfunded rewards or ambiguous disclosure policies can deter participation 
or lead to ethical conflicts. Studies note that skilled hunters often dominate submissions, raising 
scalability concerns, while common vulnerabilities may not justify payouts if rediscovery rates 
are high. Societally, these programs democratize cybersecurity by enabling global participation 
but risk exploiting low-income hackers without standardized compensation frameworks. The 
discussion underscores the need for hybrid models that integrate bug bounties with internal 
audits, balancing economic efficiency with equitable practices to maximize security outcomes 
and foster collaborative innovation. 

WEEK 14

Based on the authors, Andriy and Slynchuk, several common online activities carry significant risks. Using unofficial streaming or torrent services to access copyrighted content for free is illegal due to copyright violation and can lead to lawsuits. Similarly, downloading copyrighted material like images without permission is against the law unless it is in the public domain. Sharing personal information of others, such as addresses, on public forums without their consent, especially with harmful intent, is also illegal. Furthermore, collecting data from children under 13 without parental consent violates the Children’s Online Protection Act. Finally, conducting illegal searches related to child pornography or bomb-making can be monitored by authorities and may lead to severe penalties. These actions can result in legal trouble and highlight the importance of understanding online laws. 

WEEK 15

Digital forensics involves the collection, analysis, and reporting of electronic data for legal presentation. Using tools, data integrity is preserved via hashing. Though technical, it strongly relates to social sciences by investigating human behavior in digital spaces, including corporate breaches, internal group activities, crime, and fraud. This supports the legal system and connects to criminology, organizational behavior, and privacy. Speaker Davin Teo’s path was unexpected; he was an accountant, fell into IT, and joined digital forensics after seeing an email about a new practice, finding his “niche” by chance. Overall, the talk shows that digital forensics is not just about technology but also about understanding people, making it essential for solving crimes and addressing societal issues effectively. 

WEEK 3

Researchers could use the publicly available information on data breaches from PrivacyRights.org to conduct numerous studies on cybersecurity trends and impacts. They could analyze the frequency, scale, and types of breaches across different sectors and time periods to find patterns and vulnerabilities. The data could be used to assess the effectiveness of privacy regulations and security measures by comparing breach rates before and after implementation. Researchers might also examine the economic and reputational consequences of breaches on affected organizations. Additionally, the information could inform studies on consumer behavior and trust in digital services following high-profile incidents. This resource provides valuable real-world data for developing predictive models, evaluating risk factors, and formulating evidence-based cybersecurity strategies and policies. 

WEEK 4

Maslow’s Hierarchy of Needs can be applied to our digital experiences in various ways. At the physiological level, technology provides access to basic information like weather forecasts. For safety needs, we use security software and privacy settings to protect our digital identities. Our social needs are met through social media platforms which allow us to connect with friends and family. Our esteem needs are fulfilled through likes, shares, and followers online. Self-actualization is achieved through online learning platforms. For instance, I use weather apps to plan my day (physiological), two-factor authentication for online school (safety), Instagram to stay connected with friends (social), LinkedIn for professional achievements (esteem), and Microtek Learning for personal growth (self-actualization). Technology has become integral to satisfying needs at every level of Maslow’s hierarchy. 

WEEK 5

Based on the articles I reviewed, I would rank the motives for cybercrime as follows: 1) For money, 2) Multiple reasons, 3) Political, 4) Revenge, 5) Recognition, 6) Entertainment and 7) Boredom. Here are my reasons: For money financial gain is the most logical motive, as cybercrime can be highly lucrative with the least risk. Multiple reasons acknowledge the complexity of human behavior. Political motivations are increasingly common with the rise of 
hacktivism. Revenge is a strong emotional driver. Recognition appeals to those seeking fame or acknowledgment. Entertainment, while less justifiable, can be understood as thrill-seeking behavior. Boredom makes the least sense as it trivializes the serious nature of cybercrime, although it may explain some minor incidents as to why younger individuals are so vulnerable. 

WEEK 6

Three fake websites found from recent sources are:

  1. Sheingivesback.com – A phishing scam posing as Shein’s official site.
  2. VolcomLifeStyle.com – A fraudulent site selling counterfeit Volcom products.
  3. Trendcraftleather.com – A scam website offering leather goods at suspiciously low prices.

Comparing these to legitimate sites like Amazon.com, Walmart.com, and Etsy.com, key differences include:

– Suspicious URLs with misspellings or unusual domains

– Lack of HTTPS security

– Absence of legitimate contact information

– Unrealistic discounts or promotions

Specific red flags include fake gift card offers, malware-laden redirects, and pressure tactics to rush decisions. Legitimate sites have secure payment systems, clear policies, and proven online presences.

Reference:

Identity Guard. (2024). How To Tell If a Website Is Fake: 12 Warning Signs.

WEEK 7

Photo #9: Meme Text: “When you think a 4-digit passcode is enough, but hackers are 
laughing in binary.” 
The person in this scenario might be thinking, “This is quick and easy to remember,” but they 
may not realize how vulnerable a simple passcode can be to brute-force attacks. 
Photo #17: Meme Text: “Public Wi-Fi: Where your private data becomes public. The 
individual might be thinking, “I’ll just quickly check my email,” unaware that their data could be 
intercepted by malicious actors. 
Photo #1: Meme Text: “Typing your heart out… forgetting the auto-save feature exists.” 
The individual might be thinking, “I’m being productive,” while neglecting basic precautions 
like enabling auto-saving. 
Relation to Human-Centered Cybersecurity 
These memes highlight common scenarios where human behavior intersects with cybersecurity 
risks. 

WEEK 8

These videos on hacking scenes in these movies and TV shows exemplified how media can shape our understanding of cybersecurity. Often, these depictions are dramatized, leading to misconceptions about hacking speed and complexity. Keren Elazari breakdown on realistic portrayals, like in “Mr. Robot,” can educate viewers about actual cybersecurity practices. She subtracted half a point out of ten because real hackers do not wear gloves. However, most scenes are exaggerated for entertainment value, potentially creating unrealistic expectations. This mix of realism and fiction can both inform and mislead audiences, influencing public perceptions of cybersecurity threats and solutions. Overall, media plays a significant role in shaping our cybersecurity awareness, emphasizing the need for accurate representation to foster a more informed public. 

WEEK 9

My score of 0 indicates normative social media usage. The item in the scale covers behaviors associated with potentially disordered social media use, such as those used for substance use disorders. The different patterns found across the world may be attributed to several factors such as Cultural differences: Some cultures may place more emphasis on face-to-face interactions. Technological infrastructure: Varying levels of internet access and smartphone usage. Socioeconomic factors: Differences in work-life balance, leisure time, and economic conditions. Regulatory environment: Some countries have stricter regulations on social media platforms. Age demographics: Countries with younger populations vs those with older demographics and social norms: Societal expectations and norms regarding online behavior. These factors can contribute to the diverse patterns of social media use observed globally. 

WEEK 10

My score of 0 indicates normative social media usage. The item in the scale covers behaviors associated with potentially disordered social media use, such as those used for substance use disorders. The different patterns found across the world may be attributed to several factors such as Cultural differences: Some cultures may place more emphasis on face-to-face interactions. Technological infrastructure: Varying levels of internet access and smartphone usage. Socioeconomic factors: Differences in work-life balance, leisure time, and economic conditions. Regulatory environment: Some countries have stricter regulations on social media platforms. Age demographics: Countries with younger populations vs those with older demographics and social norms: Societal expectations and norms regarding online behavior. These factors can contribute to the diverse patterns of social media use observed globally. 

WEEK 11

The presentation about the cybersecurity analyst job highlights several social themes. Communication is important as analysts may need to train users. Networking and community involvement are presented as valuable for meeting people and gaining experience. The presenter’s discussion about choosing cities based on cost of living and personal preferences shows how social and lifestyle factors influence career choices. The varying levels of job competition in different cities, influenced by the presence of tech companies and universities, illustrate the social dynamics of the job market. The presenter’s call for audience engagement through comments, likes, and subscriptions aims to build community. Finally, the presenter’s honesty about their own challenges with networking acknowledges the social difficulties some individuals might encounter in their professional growth.   

WEEK 12

The presentation about the cybersecurity analyst job highlights several social themes. Communication is important as analysts may need to train users. Networking and community involvement are presented as valuable for meeting people and gaining experience. The presenter’s discussion about choosing cities based on cost of living and personal preferences shows how social and lifestyle factors influence career choices. The varying levels of job competition in different cities, influenced by the presence of tech companies and universities, illustrate the social dynamics of the job market. The presenter’s call for audience engagement through comments, likes, and subscriptions aims to build community. Finally, the presenter’s honesty about their own challenges with networking acknowledges the social difficulties some individuals might encounter in their professional growth.   

WEEK 13

Journal Entry: Bug Bounty Policies as Economic Cybersecurity Tools 
Bug bounty policies, which incentivize ethical hackers to identify vulnerabilities for monetary 
rewards, exemplify a cost-effective cybersecurity strategy rooted in economic principles. The 
literature highlights their efficiency: crowdsourcing vulnerability detection reduces costs 
compared to traditional audits while leveraging global talent. However, success depends on 
program design—underfunded rewards or ambiguous disclosure policies can deter participation 
or lead to ethical conflicts. Studies note that skilled hunters often dominate submissions, raising 
scalability concerns, while common vulnerabilities may not justify payouts if rediscovery rates 
are high. Societally, these programs democratize cybersecurity by enabling global participation 
but risk exploiting low-income hackers without standardized compensation frameworks. The 
discussion underscores the need for hybrid models that integrate bug bounties with internal 
audits, balancing economic efficiency with equitable practices to maximize security outcomes 
and foster collaborative innovation. 

WEEK 14

Based on the authors, Andriy and Slynchuk, several common online activities carry significant risks. Using unofficial streaming or torrent services to access copyrighted content for free is illegal due to copyright violation and can lead to lawsuits. Similarly, downloading copyrighted material like images without permission is against the law unless it is in the public domain. Sharing personal information of others, such as addresses, on public forums without their consent, especially with harmful intent, is also illegal. Furthermore, collecting data from children under 13 without parental consent violates the Children’s Online Protection Act. Finally, conducting illegal searches related to child pornography or bomb-making can be monitored by authorities and may lead to severe penalties. These actions can result in legal trouble and highlight the importance of understanding online laws. 

WEEK 15

Digital forensics involves the collection, analysis, and reporting of electronic data for legal presentation. Using tools, data integrity is preserved via hashing. Though technical, it strongly relates to social sciences by investigating human behavior in digital spaces, including corporate breaches, internal group activities, crime, and fraud. This supports the legal system and connects to criminology, organizational behavior, and privacy. Speaker Davin Teo’s path was unexpected; he was an accountant, fell into IT, and joined digital forensics after seeing an email about a new practice, finding his “niche” by chance. Overall, the talk shows that digital forensics is not just about technology but also about understanding people, making it essential for solving crimes and addressing societal issues effectively.