{"id":330,"date":"2025-01-23T23:30:49","date_gmt":"2025-01-23T23:30:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tryfenescott\/?page_id=330"},"modified":"2025-04-27T19:53:03","modified_gmt":"2025-04-27T19:53:03","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/tryfenescott\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p><strong>CYBERSECURITY AWARENESS POSTERS<\/strong><\/p>\n\n\n<div class=\"wp-block-image is-style-default\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"232\" height=\"300\" src=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/01\/image.png\" alt=\"\" class=\"wp-image-334\" style=\"width:264px;height:auto\" \/><\/figure><\/div>\n\n\n<p>This cybersecurity awareness poster portrayed a classic horror movie aesthetics to convey critical email security messages. The image shows a person falling backward in terror, with an ominous shadow looming above them, while the blood-red text &#8220;THE ATTACHMENT&#8221; and warning &#8220;DON&#8217;T OPEN&#8230;THE ATTACHMENT!&#8221; create an immediate sense of danger. The design merges cybersecurity education with social psychology when it show the horror film visual language to make email attachment threats tangible and memorable. By presenting email attachments as a horror movie monster, it taps into peoples fears while educating them about real digital threats. The menacing shadow, and desperate pose of the figure create a powerful metaphor for the dangers in innocent email attachments. This approach demonstrates how security awareness materials can successfully bridge the gap between complex technical threats and human behavior by connecting to significant emotional responses and cultural references. By doing so it made the security message more impactful and memorable for the general audiences.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"232\" height=\"300\" src=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/01\/image-2.png\" alt=\"\" class=\"wp-image-336\" style=\"width:264px;height:auto\" \/><\/figure><\/div>\n\n\n<p>This cybersecurity awareness poster uses horror movie aesthetics to illustrate critical email security messages. The image captures a businessman in a moment of terror, his hands raised defensively as he viewed the green &#8220;EMAIL!!!&#8221; text looming above him, while the warning &#8220;NO INBOX IS SAFE FROM UNWANTED!!!&#8221; reinforces the threat. The post merges cybersecurity education with social psychology by showing horror film visual language to make email security threats tangible and memorable. From a cybersecurity perspective, it warns about the dangers of phishing attempts, malicious attachments, and social engineering attacks that can compromise business security. By using this approach the visual demonstrates how security awareness materials can bridge the gap between serious technical threats and human behavior. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"232\" height=\"300\" src=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/01\/image-3.png\" alt=\"\" class=\"wp-image-337\" style=\"width:276px;height:auto\" \/><\/figure><\/div>\n\n\n<p>This cybersecurity awareness poster merges technical security principles with social science insights through its design. The central message &#8220;PROTECT YOUR INFORMATION&#8221; accompanied by a laptop and mobile devices shows our modern multi-device digital lifestyle, while emphasizing the critical security principle of unique passwords for each device. From a cybersecurity perspective, it addresses the fundamental concept of making unique password &#8211; using different passwords across devices to prevent security breaches. The social science aspects are evident in how the poster leverages behavioral psychology principles by its use of clear visual hierarchy, simple iconography, and straightforward messaging to reduce cognitive load and promote behavior change. By showing familiar devices and providing actionable guidance (&#8220;KEEP SEPARATE PASSWORDS FOR EACH DEVICE YOU USE&#8221;), the poster makes abstract security concepts tangible and relatable. This integration of social science principles with cybersecurity education creates an effective awareness tool that recognize and respect how people learn and adopt new security behaviors.<\/p>\n\n\n<div class=\"wp-block-image is-style-default\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"232\" height=\"300\" src=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/01\/image-4.png\" alt=\"\" class=\"wp-image-338\" style=\"width:276px;height:auto\" \/><\/figure><\/div>\n\n\n<p>This image depicts cybersecurity awareness. The poster uses a fishing metaphor to educate about phishing attacks. The illustration shows a figure with a fishing rod casting into a smartphone screen, symbolizing how cybercriminals &#8220;fish&#8221; for victims&#8217; sensitive information. From a cybersecurity perspective, the photo communicates the deceptive nature of phishing attempts, where attackers use fraudulent emails and messages to steal personal data. The social science elements in the image depicts the use of visual metaphors and clear, accessible language. By comparing phishing to actual fishing, it makes an abstract cyber threat immediately relatable and memorable. The inclusion of both the fishing metaphor and actual phishing prevention tips demonstrates how combining familiar concepts with practical guidance can make security education more effective. This poster depicts how security awareness materials can bridge technical concepts and human behavior by leveraging social psychology principles in their design and messaging.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"232\" height=\"300\" src=\"http:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/01\/image-1.png\" alt=\"\" class=\"wp-image-335\" style=\"width:284px;height:auto\" \/><\/figure><\/div>\n\n\n<p>This depiction shows the collaborative nature of the figures climbing and working around the cloud emphasizes the social aspects of modern computing environments, while also highlighting security concerns around shared access and data protection.&nbsp;This integration of human elements with technical infrastructure illustrates how cloud computing, and by extension cybersecurity, is not just about technology but also about human behavior, social interaction, and organizational dynamics. While not explicitly focused on cybersecurity, the visualization raises important security implications through its depiction of shared resources and multiple access points.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>National Cybersecurity Awareness Month (NCSAM), Center for Development of Security Excellence (CDSE), &amp; Japan&#8217;s IT Promotion Agency (IPA). (2019, September 30). Cybersecurity awareness posters.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"421\" src=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/kenny-eliason-mgYAR7BzBk4-unsplash-1.jpg\" alt=\"\" class=\"wp-image-369\" style=\"width:565px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/kenny-eliason-mgYAR7BzBk4-unsplash-1.jpg 640w, https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/kenny-eliason-mgYAR7BzBk4-unsplash-1-300x197.jpg 300w, https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/kenny-eliason-mgYAR7BzBk4-unsplash-1-456x300.jpg 456w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure><\/div>\n\n\n<p><em>Meme Text<\/em>: &#8220;When you think a 4-digit passcode is enough, but hackers are laughing in binary.&#8221;&nbsp;<br>The person in this scenario might be thinking, &#8220;This is quick and easy to remember,&#8221; but they may not realize how vulnerable a simple passcode can be to brute-force attacks.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/brooke-cagle-ICTKcvnXx_8-unsplash-1.jpg\" alt=\"\" class=\"wp-image-370\" style=\"width:576px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/brooke-cagle-ICTKcvnXx_8-unsplash-1.jpg 640w, https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/brooke-cagle-ICTKcvnXx_8-unsplash-1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/brooke-cagle-ICTKcvnXx_8-unsplash-1-450x300.jpg 450w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure><\/div>\n\n\n<p><em>Meme Text<\/em>: &#8220;Public Wi-Fi: Where your private data becomes public. The individual might be thinking, &#8220;I\u2019ll just quickly check my email,&#8221; unaware that their data could be intercepted by malicious actors.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/christin-hume-mfB1B1s4sMc-unsplash.jpg\" alt=\"\" class=\"wp-image-371\" style=\"width:593px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/christin-hume-mfB1B1s4sMc-unsplash.jpg 640w, https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/christin-hume-mfB1B1s4sMc-unsplash-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-content\/uploads\/sites\/36826\/2025\/03\/christin-hume-mfB1B1s4sMc-unsplash-450x300.jpg 450w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure><\/div>\n\n\n<p><em>Meme Text<\/em>: &#8220;Typing your heart out&#8230; forgetting the auto-save feature exists.&#8221;&nbsp;<br>&nbsp; The individual might be thinking, &#8220;I\u2019m being productive,&#8221; while neglecting basic precautions like enabling auto-saving.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>These memes highlight common scenarios where human behavior intersects with cybersecurity risks.&nbsp;&nbsp;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">JOURNAL ENTRIES<\/h2>\n\n\n\n<p><em>WEEK 1<\/em>&#8211; <strong>NICE WORKFORCE FRAMEWORK<\/strong><\/p>\n\n\n\n<p>After reviewing the NICE Workforce Framework, I find myself particularly drawn to the Competency Areas related to cybersecurity risk management and analysis. The ability to assess and mitigate cyber risks across an organization appeals to my analytical mindset and desire to make a significant impact on organizational security.&nbsp;<\/p>\n\n\n\n<p>I&#8217;m also intrigued by the Work Roles involving threat detection and incident response. The dynamic nature of these roles, requiring quick thinking and adaptability, aligns well with my problem-solving skills.&nbsp;<\/p>\n\n\n\n<p>On the other hand, areas focused on highly technical aspects like low-level programming or hardware engineering appeal less to me. While I recognize their importance, I prefer roles that blend technical knowledge with strategic thinking and risk management.&nbsp;<\/p>\n\n\n\n<p>Overall, I&#8217;m excited about the potential to develop a career path that combines risk analysis, threat detection, and incident response within the cybersecurity field.\u00a0<\/p>\n\n\n\n<p><em>WEEK 2<\/em> &#8211; <strong>Is the principles of Science applicable to Cybersecurity?<\/strong> <\/p>\n\n\n\n<p>The principles of science are directly applicable to cybersecurity research and practice.<br>Empiricism emphasizes basing knowledge on observable evidence, which is crucial for<br>understanding cyber threats and validating security measures. Determinism suggests that events<br>have causes, allowing researchers to identify attack patterns and vulnerabilities. Parsimony<br>encourages simple explanations and solutions, which can lead to more manageable and effective<br>security systems. Objectivity is essential for unbiased threat analysis and policy development.<br>Ethical neutrality ensures responsible research practices. Relativism highlights the<br>interconnectedness of technology and social systems in cybersecurity. Together, these principles<br>provide a framework for rigorous, evidence-based approaches to cybersecurity, enabling<br>researchers and practitioners to develop more robust defenses against evolving threats.<\/p>\n\n\n\n<p><em>WEEK 3<\/em> &#8211; <strong>Privacy Rights<\/strong><\/p>\n\n\n\n<p>Researchers could use the publicly available information on data breaches from PrivacyRights.org to conduct numerous studies on cybersecurity trends and impacts. They could analyze the frequency, scale, and types of breaches across different sectors and time periods to find patterns and vulnerabilities. The data could be used to assess the effectiveness of privacy regulations and security measures by comparing breach rates before and after implementation. Researchers might also examine the economic and reputational consequences of breaches on affected organizations. Additionally, the information could inform studies on consumer behavior and trust in digital services following high-profile incidents. This resource provides valuable real-world data for developing predictive models, evaluating risk factors, and formulating evidence-based cybersecurity strategies and policies.\u00a0<\/p>\n\n\n\n<p><strong>ARTICLE REVIEW #1<\/strong><\/p>\n\n\n\n<p>Tryfene Scott&nbsp;<br>February 16, 2025&nbsp;<\/p>\n\n\n\n<p><strong>Article Review: &#8220;The Electronic Contract in Civil and Commercial Codes&#8221;<\/strong> <a href=\"https:\/\/doi.org\/10.5281\/zenodo.4766801\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.5281\/zenodo.4766801<\/a>&nbsp;<\/p>\n\n\n\n<p>BUF: This article review examines &#8220;The Electronic Contract in Civil and Commercial Codes&#8221;. This study explores the nature, characteristics, and applications of electronic contracts within Jordanian legislative frameworks, comparing them to traditional contracts.&nbsp;<\/p>\n\n\n\n<p><strong>Introduction<\/strong>&nbsp;<\/p>\n\n\n\n<p>Al Masadeh et al. (2024) explore the evolving landscape of electronic contracts in Jordan, focusing on their characteristics, formation methods, and applications in civil and commercial contexts. The study emphasizes the importance of adapting legal systems to accommodate technological advancements in contract formation.&nbsp;<\/p>\n\n\n\n<p><strong>Social Science Principles:<\/strong> The topic relates to the principles of social sciences by examining how technology and law intersect to shape social interactions and economic activities. It touches on aspects of sociology, economics, and political science by analyzing the impact of electronic contracts on society, commerce, and legal systems.&nbsp;<\/p>\n\n\n\n<p><strong>Research Questions\/Hypotheses:<\/strong> The study seeks to answer questions about the fundamental nature of electronic contracts, their formation methodologies, and their applications in civil and commercial contexts within Jordanian law. It also aims to identify limitations within Jordan&#8217;s legal frameworks that impede their alignment with the digital realm.&nbsp;<\/p>\n\n\n\n<p><strong>Research Methods:<\/strong> The study employs a descriptive and analytical approach. It relies on secondary sources such as books, websites, articles, and official documents to gather data. The data is then evaluated using simple content analysis.&nbsp;<\/p>\n\n\n\n<p><strong>Data Types and Analysis:<\/strong> The data consists of legal texts, scholarly articles, and other secondary sources related to electronic contracts and Jordanian law. The analysis involves examining the content of these sources to identify key themes, definitions, and legal implications.&nbsp;<\/p>\n\n\n\n<p><strong>Connections to PowerPoint Concepts:<\/strong> The PowerPoint presentations could relate to the article by discussing legal frameworks, contract law, and the impact of technology on legal systems. Concepts such as legal modernization, regulatory adaptation, and consumer protection in the digital age would be relevant The PowerPoint might focus on the need for legal frameworks to evolve in response to technological advancements, which is a central theme in the article.&nbsp;<\/p>\n\n\n\n<p><strong>Marginalized Groups:<\/strong> The topic relates to the challenges, concerns, and contributions of marginalized groups by highlighting the need for consumer protection in electronic transactions. The study notes deficiencies in Jordan&#8217;s civil laws pertaining to consumer rights in electronic contracts. Marginalized groups may be more vulnerable to fraud or deception in online transactions, making consumer protection measures particularly important for these populations.&nbsp;<\/p>\n\n\n\n<p><strong>Overall Contributions to Society:<\/strong> The study contributes to society by providing a concise and descriptive overview of electronic contracts within the context of Jordanian laws. It offers insights into the advantages, disadvantages, and associated nuances of electronic contracts for legal entities and stakeholders. The research also identifies limitations within Jordanian law that need to be addressed to ensure effective regulation of electronic transactions and protection of consumer rights. This can inform policy formulation, foster innovation, and promote economic prosperity within the nation. It emphasizes the need for Jordan to modernize its legal system and adapt to the digital age.&nbsp;<\/p>\n\n\n\n<p><strong>Reference<\/strong>&nbsp;<\/p>\n\n\n\n<p>Al-Fawair, A. M. (2014). Electronic contracts: Consent and expression of will, a comparative study. Dar Al-Thaqafa for Publishing and Distribution.&nbsp;<\/p>\n\n\n\n<p>Al Masadeh, A. M., Khawaldeh, A. M., &amp; Al-salamat, M. A. (2024). The Electronic Contract in Civil and Commercial Codes. <em>International Journal of Cyber Criminology<\/em>, <em>18<\/em>(1), 1\u201314. <a href=\"https:\/\/doi.org\/10.5281\/zenodo.4766801\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.5281\/zenodo.4766801<\/a>&nbsp;<\/p>\n\n\n\n<p><em>WEEK 4<\/em> &#8211;<strong> Maslow Hierachy of Needs and Cybersecurity<\/strong><\/p>\n\n\n\n<p>Maslow&#8217;s <em>Hierarchy of Needs<\/em> can be applied to our digital experiences in various ways. At the <em>physiological level<\/em>, technology provides access to basic information like weather forecasts. For <em>safety needs<\/em>, we use security software and privacy settings to protect our digital identities. Our <em>social needs<\/em> are met through social media platforms which allow us to connect with friends and family. Our <em>esteem needs<\/em> are fulfilled through likes, shares, and followers online. <em>Self-actualization<\/em> is achieved through online learning platforms. For instance, I use weather apps to plan my day (physiological), two-factor authentication for online school (safety), Instagram to stay connected with friends (social), LinkedIn for professional achievements (esteem), and Microtek Learning for personal growth (self-actualization). Technology has become integral to satisfying needs at every level of Maslow&#8217;s hierarchy.&nbsp;<\/p>\n\n\n\n<p><em>WEEK 5<\/em> &#8211; <strong>RANKS OF ARTICLES REVIEWED<\/strong><\/p>\n\n\n\n<p>Based on the articles I reviewed, I would rank the motives for cybercrime as follows: 1) For money, 2) Multiple reasons, 3) Political, 4) Revenge, 5) Recognition, 6) Entertainment and 7) Boredom. Here are my reasons: For money financial gain is the most logical motive, as cybercrime can be highly lucrative with the least risk. Multiple reasons acknowledge the complexity of human behavior. Political motivations are increasingly common with the rise of&nbsp;<br>hacktivism. Revenge is a strong emotional driver. Recognition appeals to those seeking fame or acknowledgment. Entertainment, while less justifiable, can be understood as thrill-seeking behavior. Boredom makes the least sense as it trivializes the serious nature of cybercrime, although it may explain some minor incidents as to why younger individuals are so vulnerable.&nbsp;<\/p>\n\n\n\n<p><em>WEEK 6<\/em> &#8211; <strong>COMPARING FAKE AND LIGITIMATE WEBSITES <\/strong><\/p>\n\n\n\n<p>Three fake websites found from recent sources are:<\/p>\n\n\n\n<ol>\n<li>Sheingivesback.com &#8211; A phishing scam posing as Shein&#8217;s official site.<\/li>\n\n\n\n<li>VolcomLifeStyle.com &#8211; A fraudulent site selling counterfeit Volcom products.<\/li>\n\n\n\n<li>Trendcraftleather.com &#8211; A scam website offering leather goods at suspiciously low prices.<\/li>\n<\/ol>\n\n\n\n<p>Comparing these to legitimate sites like Amazon.com, Walmart.com, and Etsy.com, key differences include:<\/p>\n\n\n\n<p>&#8211; Suspicious URLs with misspellings or unusual domains<\/p>\n\n\n\n<p>&#8211; Lack of HTTPS security<\/p>\n\n\n\n<p>&#8211; Absence of legitimate contact information<\/p>\n\n\n\n<p>&#8211; Unrealistic discounts or promotions<\/p>\n\n\n\n<p>Specific red flags include&nbsp;<strong>fake gift card offers, malware-laden redirects, and pressure tactics to rush decisions. Legitimate sites have secure payment systems, clear policies, and proven online presences.<\/strong><\/p>\n\n\n\n<p><strong>Reference:<\/strong><\/p>\n\n\n\n<p>Identity Guard. (2024). How To Tell If a Website Is Fake: 12 Warning Signs.<\/p>\n\n\n\n<p><em>WEEK 7<\/em> &#8211;<strong> PHOTOS DEPICTING PEOPLE ON SOCIAL MEDIA<\/strong><\/p>\n\n\n\n<p>Photo #9: Meme Text: &#8220;When you think a 4-digit passcode is enough, but hackers are&nbsp;<br>laughing in binary.&#8221;&nbsp;<br>The person in this scenario might be thinking, &#8220;This is quick and easy to remember,&#8221; but they&nbsp;<br>may not realize how vulnerable a simple passcode can be to brute-force attacks.&nbsp;<br>Photo #17: Meme Text: &#8220;Public Wi-Fi: Where your private data becomes public. The&nbsp;<br>individual might be thinking, &#8220;I\u2019ll just quickly check my email,&#8221; unaware that their data could be&nbsp;<br>intercepted by malicious actors.&nbsp;<br>Photo #1: Meme Text: &#8220;Typing your heart out&#8230; forgetting the auto-save feature exists.&#8221;&nbsp;<br>The individual might be thinking, &#8220;I\u2019m being productive,&#8221; while neglecting basic precautions&nbsp;<br>like enabling auto-saving.&nbsp;<br>Relation to Human-Centered Cybersecurity&nbsp;<br>These memes highlight common scenarios where human behavior intersects with cybersecurity&nbsp;<br>risks.&nbsp;<\/p>\n\n\n\n<p><em>WEEK 8 <\/em>&#8211; <strong>VIDEOS ON HACKING SCENES<\/strong><\/p>\n\n\n\n<p>These videos on hacking scenes in these movies and TV shows exemplified how media can shape our understanding of cybersecurity. Often, these depictions are dramatized, leading to misconceptions about hacking speed and complexity. Keren Elazari breakdown on realistic portrayals, like in &#8220;Mr. Robot,&#8221; can educate viewers about actual cybersecurity practices. She subtracted half a point out of ten because real hackers do not wear gloves. However, most scenes are exaggerated for entertainment value, potentially creating unrealistic expectations. This mix of realism and fiction can both inform and mislead audiences, influencing public perceptions of cybersecurity threats and solutions. Overall, media plays a significant role in shaping our cybersecurity awareness, emphasizing the need for accurate representation to foster a more informed public.\u00a0<\/p>\n\n\n\n<p><strong>ARTICLE REVIEW #2<\/strong><\/p>\n\n\n\n<p>Tryfene Scott&nbsp;<br>April 6, 2025&nbsp;<\/p>\n\n\n\n<p><strong>Article Review #2: Unveiling the Sociological Facets of Cybersecurity<\/strong><\/p>\n\n\n\n<p>https:\/\/canvas.odu.edu\/courses\/177759\/modules\/items\/7600831\u00a0<\/p>\n\n\n\n<p>BLUF: This review analyzes &#8220;Social Dynamics, Social Structures, and Cybersecurity,&#8221; highlighting its exploration of sociological paradigms and their impact on cybersecurity practices, relevance to marginalized groups, and contributions to a more holistic understanding of cybersecurity challenges.&nbsp;<\/p>\n\n\n\n<p><strong>Introduction<\/strong>&nbsp;<\/p>\n\n\n\n<p>The article &#8220;<em>Social Dynamics, Social Structures, and Cybersecurity<\/em>&#8221; highlights the critical intersection between sociology and cybersecurity, emphasizing the often-overlooked social dimensions of technological advancements and their associated vulnerabilities. By exploring sociological paradigms such as structural functionalism, conflict theory, and symbolic interactionism, the article elucidates how broader societal structures and mechanisms shape\u2014and are shaped by\u2014cybersecurity practices (CYSE201S Module 8). This review evaluates the article\u2019s core questions, research methodologies, data analysis strategies, societal contributions, relevance to marginalized groups, and alignment with social science principles.&nbsp;<\/p>\n\n\n\n<p><strong>Relation to Social Science Principles<\/strong>&nbsp;<\/p>\n\n\n\n<p>The article effectively connects cybersecurity with sociology by examining how external social forces\u2014economic conditions, educational opportunities, geographic locations, wealth distribution\u2014influence individual and group behaviors within cyberspace (American Sociological Association, 2014). Sociology studies social structures, inequalities, and interactions within communities\u2014concepts that are crucial for understanding the multifaceted dimensions of cyber threats. These paradigms demonstrate that cybersecurity challenges are intrinsically interwoven with broader social systems.&nbsp;<\/p>\n\n\n\n<p><strong>Research Questions &amp; Methods<\/strong>&nbsp;<\/p>\n\n\n\n<p>The study examines how sociological paradigms can be applied to cybersecurity practices and how technological changes impact social systems. It also hypothesizes that advancements like IoT and AI create potential for improved societal functions and novel risks. The study employs primarily qualitative research methods by analyzing case studies spanning smart cities, healthcare systems, and religious organizations.&nbsp;<\/p>\n\n\n\n<p><strong>Data Collection and Analysis<\/strong>&nbsp;<\/p>\n\n\n\n<p>The data analyzed comprises reports on smart city initiatives, studies on healthcare data breaches during the COVID-19 pandemic, and sociological research on cybercrime victimization. This analysis synthesizes findings to identify vulnerability patterns linked to socioeconomic status, geographic location, and institutional capacity. Illustratively, the rise in telework exposed workers to cyber threats and revealed disparities in access to secure remote work technologies (Payne, 2020; Turner &amp; Turner, 2020).&nbsp;<\/p>\n\n\n\n<p><strong>Connections to Course Concepts<\/strong>&nbsp;<\/p>\n\n\n\n<p>The study aligns with course materials by highlighting sociology&#8217;s role in understanding cybersecurity vulnerabilities. The application of structural functionalism, conflict theory, and symbolic interactionism facilitates a comprehensive analysis. For instance, structural functionalism frames cybersecurity as essential for maintaining societal stability. Conflict theory elucidates how the unequal distribution of secure technologies exacerbates systemic inequalities, and symbolic interactionism scrutinizes how individuals&#8217; perceptions of privacy shape their interactions with technology (CYSE201S Module 8).&nbsp;<\/p>\n\n\n\n<p><strong>Relevance to Marginalized Groups<\/strong>&nbsp;<\/p>\n\n\n\n<p>The study underscores that marginalized groups face unique cybersecurity challenges stemming from systemic inequalities in wealth, education, and access to technology. Healthcare systems serving low-income populations are often underfunded, resulting in weaker cybersecurity measures and increased risk of data breaches (Payne, 2020). Addressing these disparities requires targeted resource allocation and cybersecurity awareness initiatives.&nbsp;<\/p>\n\n\n\n<p><strong>Contributions to Society<\/strong>&nbsp;<\/p>\n\n\n\n<p>This article significantly contributes to society by emphasizing the importance of understanding cybersecurity as a sociological problem\u2014one embedded within societal structures\u2014rather than as a purely technical challenge (American Sociological Association, 2014). By applying sociological paradigms, it illuminates how factors such as education, wealth disparities, and geographic location influence cyber risks (CYSE201S Module 8).&nbsp;<\/p>\n\n\n\n<p><strong>Conclusion<\/strong>&nbsp;<\/p>\n\n\n\n<p>In conclusion, &#8220;Social Dynamics, Social Structures, and Cybersecurity&#8221; highlights the sociological dimensions of cybersecurity. By addressing systemic inequalities in access to secure technologies and advocating for equitable resource distribution, it contributes to informed cybersecurity practices and policymaking. The study emphasizes the necessity of interdisciplinary approaches that merge social science principles with technological expertise to navigate the intricate challenges of cybersecurity for a more equitable digital future.&nbsp;<\/p>\n\n\n\n<p><strong>References<\/strong>&nbsp;<\/p>\n\n\n\n<p>American Sociological Association. (2014).<em> 21st century careers with an undergraduate degree in sociology.<\/em> Retrieved from https:\/\/asanet.org\/about\/what-sociology&nbsp;<\/p>\n\n\n\n<p>CYSE201S Module 8.<em> Social dynamics, social structures, and cybersecurity.<\/em>&nbsp;<\/p>\n\n\n\n<p>Payne, S. (2020).<em> Cybercrime victimization during the pandemic: A sociological perspective on health-related vulnerabilities.<\/em> Journal of Sociology, 56(4), 345\u2013360.&nbsp;<\/p>\n\n\n\n<p>Traina, J. (2019). <em>Hacktivism targeting religious organizations: Risks and recommendations for enhanced security protocols.<\/em> Cybersecurity Review, 12(2), 89\u2013102.&nbsp;<\/p>\n\n\n\n<p>Turner &amp; Turner (2020). <em>Telework efficiency during COVID-19: Implications for organizational security protocols<\/em>. Workplace Sociology Journal, 45(3), 210\u2013225.&nbsp;<\/p>\n\n\n\n<p><em>WEEK 9 <\/em>&#8211; <strong>SOCIAL MEDIA USAGE<\/strong><\/p>\n\n\n\n<p>My score of 0 indicates normative social media usage. The item in the scale covers behaviors associated with potentially disordered social media use, such as those used for substance use disorders. The different patterns found across the world may be attributed to several factors such as <strong>Cultural differences<\/strong>: Some cultures may place more emphasis on face-to-face interactions. <strong>Technological infrastructure<\/strong>: Varying levels of internet access and smartphone usage. <strong>Socioeconomic factors<\/strong>: Differences in work-life balance, leisure time, and economic conditions. <strong>Regulatory environment<\/strong>: Some countries have stricter regulations on social media platforms. <strong>Age demographics<\/strong>: Countries with younger populations vs those with older demographics and <strong>social norms<\/strong>: Societal expectations and norms regarding online behavior. These factors can contribute to the diverse patterns of social media use observed globally.&nbsp;<\/p>\n\n\n\n<p><em>WEEK 10<\/em> &#8211; <strong>SOCIAL CYBERSECURITY AND HUMAN BEHAVIOR<\/strong><\/p>\n\n\n\n<p>Social cybersecurity is a critical emerging field that addresses the manipulation of human&nbsp;<br>behavior and societal outcomes within the cyber-mediated information environment. The article emphasizes the increasing significance of information warfare, where nations like Russia employ sophisticated &#8220;information blitzkriegs&#8221; to undermine trust and sow division. Technological advancements enable actors to conduct these operations at a vast scale, overcoming traditional geographical barriers and shifting the focus of conflict towards the human domain. The authors introduce the BEND model as a framework for understanding various social-cyber maneuvers targeting both information and social networks, with bots acting as powerful force multipliers in these campaigns. The article underscores the necessity for military leaders and society to understand and address social cybersecurity as a fundamental national security imperative to protect against external manipulation.&nbsp;<\/p>\n\n\n\n<p><em>WEEK 11<\/em>&#8211; <strong>CYBERSECURITY JOB HIGHLIGHTS<\/strong><\/p>\n\n\n\n<p>The presentation about the cybersecurity analyst job highlights several social themes. Communication is important as analysts may need to train users. Networking and community involvement are presented as valuable for meeting people and gaining experience. The presenter&#8217;s discussion about choosing cities based on cost of living and personal preferences shows how social and lifestyle factors influence career choices. The varying levels of job competition in different cities, influenced by the presence of tech companies and universities, illustrate the social dynamics of the job market. The presenter&#8217;s call for audience engagement through comments, likes, and subscriptions aims to build community. Finally, the presenter&#8217;s honesty about their own challenges with networking acknowledges the social difficulties some individuals might encounter in their professional growth.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><em>WEEK 12<\/em> &#8211;<strong> INVISIBLE INTRUSIONS: The Glasswasherparts.com data breach<\/strong><\/p>\n\n\n\n<p>Invisible Intrusions: The Ethics and Economics Behind Data Security Failures<br>The Glasswasherparts.com data breach highlights key economic and social science concerns.<br>Economically, cost-benefit analysis influenced the company\u2019s prior cybersecurity choices,<br>revealing how short-term savings can lead to long-term consequences. Information asymmetry is<br>also evident, as customers were unaware of the breach for months, leaving them vulnerable.<br>From a social science perspective, trust theory shows how data breaches damage consumer trust,<br>something the company attempts to rebuild through transparency and support. Additionally,<br>social contract theory reveals an ethical failure; customers provide personal data with the<br>expectation of protection. When that trust is broken, it violates this unspoken agreement, raising<br>questions about accountability and the responsibilities of digital businesses.<\/p>\n\n\n\n<p><em>WEEK 13<\/em> &#8211;<strong> BUG BOUNTY POLICIES<\/strong><\/p>\n\n\n\n<p>Bug bounty policies, which incentivize ethical hackers to identify vulnerabilities for monetary\u00a0<br>rewards, exemplify a cost-effective cybersecurity strategy rooted in economic principles. The\u00a0<br>literature highlights their efficiency: crowdsourcing vulnerability detection reduces costs\u00a0<br>compared to traditional audits while leveraging global talent. However, success depends on\u00a0<br>program design\u2014underfunded rewards or ambiguous disclosure policies can deter participation\u00a0<br>or lead to ethical conflicts. Studies note that skilled hunters often dominate submissions, raising\u00a0<br>scalability concerns, while common vulnerabilities may not justify payouts if rediscovery rates\u00a0<br>are high. Societally, these programs democratize cybersecurity by enabling global participation\u00a0<br>but risk exploiting low-income hackers without standardized compensation frameworks. The\u00a0<br>discussion underscores the need for hybrid models that integrate bug bounties with internal\u00a0<br>audits, balancing economic efficiency with equitable practices to maximize security outcomes\u00a0<br>and foster collaborative innovation.\u00a0<\/p>\n\n\n\n<p><em>WEEK 14<\/em> &#8211; <strong>Andriy and Slynchuk<\/strong><\/p>\n\n\n\n<p>Based on the authors, Andriy and Slynchuk, several common online activities carry significant risks. Using unofficial streaming or torrent services to access copyrighted content for free is illegal due to copyright violation and can lead to lawsuits. Similarly, downloading copyrighted material like images without permission is against the law unless it is in the public domain. Sharing personal information of others, such as addresses, on public forums without their consent, especially with harmful intent, is also illegal. Furthermore, collecting data from children under 13 without parental consent violates the Children\u2019s Online Protection Act. Finally, conducting illegal searches related to child pornography or bomb-making can be monitored by authorities and may lead to severe penalties. These actions can result in legal trouble and highlight the importance of understanding online laws.&nbsp;<\/p>\n\n\n\n<p><em>WEEK 15 <\/em>&#8211;<strong> DIGITAL FORENSICS<\/strong><\/p>\n\n\n\n<p>Digital forensics involves the collection, analysis, and reporting of electronic data for legal presentation. Using tools, data integrity is preserved via hashing. Though technical, it strongly relates to social sciences by investigating human behavior in digital spaces, including corporate breaches, internal group activities, crime, and fraud. This supports the legal system and connects to criminology, organizational behavior, and privacy. Speaker Davin Teo&#8217;s path was unexpected; he was an accountant, fell into IT, and joined digital forensics after seeing an email about a new practice, finding his &#8220;niche&#8221; by chance. Overall, the talk shows that digital forensics is not just about technology but also about understanding people, making it essential for solving crimes and addressing societal issues effectively.&nbsp;<\/p>\n\n\n\n<p><strong>CAREER PAPER<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>The Role of Social Science in the Career of Cybersecurity Engineers\u00a0<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Tryfene Scott&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\">Old Dominion University&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\">CYSE201S&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\">Professor Diwakar Yalpi&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\">April 8, 2025&nbsp;<\/p>\n\n\n\n<p><strong>Introduction<\/strong>&nbsp;<\/p>\n\n\n\n<p>Cybersecurity engineers depend heavily on social science to do their jobs effectively. Their work involves not just technical defense mechanisms, but also understanding human behavior, organizational systems, and societal impacts. Cybersecurity engineering is a dynamic field at the intersection of technology, risk management, and human behavior. This paper explores how cybersecurity engineers integrate social science into their work, with a focus on interactions with society at large and marginalized communities.&nbsp;<\/p>\n\n\n\n<p><strong>Understanding the Human Element in Cybersecurity<\/strong>&nbsp;<\/p>\n\n\n\n<p>One of the most significant applications of social science in cybersecurity engineering is the focus on the human element in security systems. According to Hadnagy (2018), social engineering attacks exploit human psychology rather than technical vulnerabilities. Cybersecurity engineers use psychological and sociological research to predict and mitigate these threats. For instance, engineers analyze phishing attack trends, which often rely on fear, urgency, or curiosity to trick users into compromising systems. The development of training programs, security awareness campaigns, and user-friendly security interfaces stems directly from social science principles aimed at shaping behavior and improving compliance.&nbsp;<br>&nbsp;<br>Furthermore, cybersecurity engineers apply concepts from behavioral economics and decision theory when designing authentication systems or intrusion detection alerts. The way security features are arranged influences user choices, a strategy supported by the concept of \u2018choice architecture\u2019 (Thaler &amp; Sunstein, 2008). These approaches demonstrate that understanding how people make decisions under stress or uncertainty is as vital as understanding encryption algorithms.&nbsp;<\/p>\n\n\n\n<p><strong>Cybersecurity in Organizational and Social Contexts<\/strong>&nbsp;<\/p>\n\n\n\n<p>Cybersecurity engineers operate within organizational structures and broader societal systems. The concept of &#8216;organizational culture,&#8217; a staple in sociology and anthropology, directly impacts how security protocols are adopted within companies. Engineers must navigate internal politics, leadership priorities, and staff attitudes toward compliance. For example, if a workplace culture values speed over procedure, engineers must tailor their solutions to ensure minimal disruption while maximizing security.&nbsp;<br>&nbsp;<br>On a larger scale, cybersecurity engineers must be aware of how their work interacts with societal values like privacy, freedom of expression, and public safety. Surveillance tools, though developed for protection, can unintentionally harm civil liberties\u2014especially those of marginalized communities who face greater systemic scrutiny (Nissenbaum, 2010). Thus, engineers must not only understand technical risk but also ethical and social ramifications.&nbsp;<\/p>\n\n\n\n<p><strong>Engaging with Marginalized Groups and Promoting Equity<\/strong>&nbsp;<\/p>\n\n\n\n<p>Because cybersecurity engineers serve a broad range of users, they must consider how marginalized populations experience distinct security vulnerabilities. For example, low-income individuals may rely on older devices or public Wi-Fi, increasing their vulnerability to cyberattacks. Similarly, members of the LGBTQ+ community or political dissidents may be targets of online harassment or surveillance.&nbsp;<br>&nbsp;<br>Social science research helps engineers understand these dynamics and design inclusive, equitable systems. Disciplines like anthropology and psychology inform human-centered design, which helps engineers integrate underrepresented user needs into their risk assessments and interface evaluations (Costanza-Chock, 2020). Engineers who engage with these perspectives can advocate for inclusive policies, such as default encryption, access to digital literacy training, or protection for vulnerable populations.&nbsp;<\/p>\n\n\n\n<p><strong>Daily Application of Key Social Science Concepts<\/strong>&nbsp;<\/p>\n\n\n\n<p>In their day-to-day work, cybersecurity engineers apply several core social science concepts. &#8216;Risk perception,&#8217; for example, helps them prioritize threats based on how users and stakeholders perceive various dangers\u2014not just statistical likelihood. &#8216;Social norms&#8217; guide their understanding of user behavior and adherence to security protocols. Additionally, &#8216;communication theory&#8217; supports engineers in crafting effective messaging to influence secure user behavior, whether through emails, alerts, or training sessions.To model threats and evaluate insider risks, engineers frequently apply social science insights and behavioral data. These practices bridge the gap between technical infrastructure and human behavior, emphasizing the interdisciplinary nature of the profession.&nbsp;<\/p>\n\n\n\n<p><strong>Conclusion<\/strong>&nbsp;<\/p>\n\n\n\n<p>Cybersecurity engineers are not solely technicians; they are behavioral strategists, ethical advisors, and cultural translators. Their work depends heavily on insights from social science disciplines to create secure, usable, and ethical systems. From understanding user behavior to navigating the broader social implications of surveillance and privacy, social science is deeply embedded in the fabric of cybersecurity engineering. As digital infrastructure becomes more integral to society, the integration of social science principles into cybersecurity will only grow in importance, especially in addressing the needs of marginalized groups and ensuring equitable protection for all.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>References<\/strong>&nbsp;<\/p>\n\n\n\n<p>Costanza-Chock, S. (2020). *Design justice: Community-led practices to build the worlds we need*. MIT Press.&nbsp;<br>Hadnagy, C. (2018). *Social engineering: The science of human hacking*. Wiley.&nbsp;<br>Thaler, R. H., &amp; Sunstein, C. R. (2008). *Nudge: Improving decisions about health, wealth, and happiness*. Yale University Press.&nbsp;<br>Nissenbaum, H. (2010). *Privacy in context: Technology, policy, and the integrity of social life*. Stanford University Press.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>PRESENTATION<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/olddominion-my.sharepoint.com\/:p:\/r\/personal\/tscot047_odu_edu\/Documents\/FINALfinal%20presentation.pptx?d=w7f27fa83fca34c31a8cd7e1315baf317&amp;csf=1&amp;web=1&amp;e=48mZxd\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/olddominion-my.sharepoint.com\/:p:\/r\/personal\/tscot047_odu_edu\/Documents\/FINALfinal%20presentation.pptx?d=w7f27fa83fca34c31a8cd7e1315baf317&amp;csf=1&amp;web=1&amp;e=48mZxd<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYBERSECURITY AWARENESS POSTERS This cybersecurity awareness poster portrayed a classic horror movie aesthetics to convey critical email security messages. The image shows a person falling backward in terror, with an ominous shadow looming above them, while the blood-red text &#8220;THE ATTACHMENT&#8221; and warning &#8220;DON&#8217;T OPEN&#8230;THE ATTACHMENT!&#8221; create an immediate sense of danger. The design merges&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tryfenescott\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":29558,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-json\/wp\/v2\/pages\/330"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-json\/wp\/v2\/users\/29558"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-json\/wp\/v2\/pages\/330\/revisions"}],"predecessor-version":[{"id":406,"href":"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-json\/wp\/v2\/pages\/330\/revisions\/406"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tryfenescott\/wp-json\/wp\/v2\/media?parent=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}