Journal 15

Posted by on 1:17 am in Journals | 0 comments

When it came to watching the video on digital forensics investigators have a challenging job that requires them to solve puzzles that fit snugly with social sciences. While their primary responsibility is to investigate digital clues to catch cyber criminals, their discoveries have far-reaching consequences in our social world. To get to the root of cyber crimes, these investigators must deeply understand what motivates people – their behaviors, thoughts, and the overall role of society. It’s crucial to realize that cyber crimes...

read more

Career Paper

Posted by on 1:00 am in Papers | 0 comments

Victoria Sanderson 4/4/2024 Career Paper There are many jobs in the cyber security field that work with social sciences, but cybersecurity incident responders play a major role in safeguarding digital assets and mitigating the impact of cyber threats on organizations. But what do incident responders have to do with social science? These responders have technical skills crucial for incorporating principles and research that cooperate with social science. This paper will examine the critical concepts learned in class and how they apply to...

read more

Article Review 2

Posted by on 12:57 am in Article Reviews CYSE201S | 0 comments

Victoria Sanderson3/21/2024 Article review #2. Chosen Article:  Understanding the Relationship between Digital Literacy, Privacy Concerns, and Cybersecurity Behavior Intro The chosen article, titled “Impact of Digital Literacy and Online Privacy Concerns on Cybersecurity Behavior,” has been published in the International Journal of Cyber Criminology. While reading over, the relationship between digital literacy, concerns regarding online privacy, and the resultant behaviors in the world of cybersecurity are thoroughly...

read more

Journal 14

Posted by on 1:11 am in Journals | 0 comments

In my opinion out of the eleven choices given it contained five severe violations that breach legal boundaries and potentially endanger individuals, compromising their privacy and security. Firstly, sharing personal data, such as passwords, addresses, or photos of others without consent, constitutes a severe breach of privacy. Secondly, using unofficial streaming services to access copyrighted material without authorization undermines content creators’ rights and exposes users to legal liabilities. Thirdly, recording calls without...

read more

Journal 13

Posted by on 6:36 am in Journals | 0 comments

In this journal article, it will delve deeper into the article given and show the role played by VDPs and Bug Bounty Programs in improving cybersecurity. Despite some controversy at their introduction, both initiatives have seen a significant uptake in recent years due to their success in uncovering previously unknown cybersecurity vulnerabilities. The empirical contribution consists of analyzing the determinants of the effectiveness of Bug Bounty Programs, using inquiry-driven econometric methods such as robust regression models and...

read more

Journal 12

Posted by on 6:13 am in Journals | 0 comments

Market Failure theory is a framework that examines situations where markets cannot allocate resources efficiently. Data breaches can be seen as a form of market failure. The failure to adequately secure customer data can lead to negative externalities such as potential identity theft or fraud. This means that customers may incur costs due to the breach not accounted for in the market transactions. Cost-benefit analysis is a theory that customers apply when purchasing online platforms. A data breach introduces new costs that customers did not...

read more

Journal 10

Posted by on 12:41 am in Journals | 0 comments

When it comes to social cybersecurity, is a critical aspect of modern warfare, as it focuses on understanding how human behavior intersects with technology. It involves manipulating human behavior through technology to achieve strategic goals, this manipulation then affects the protection of information systems. An example of this is the Russian propaganda machine as it serves as a notable example of leveraging information warfare tactics to weaken nations. Another thing is about bots which are powered by artificial intelligence. Bots play a...

read more

Journal 11

Posted by on 12:11 am in Journals | 0 comments

With this journal it goes into a video that reviews information into what acyber security analyst is. Analysts branch off into many different thingsbecause they are the first responders to any cyber related incident. When itcomes to social attacks on the network, they will be the first to deal with it.Some of the social attacks mentioned are ones I have brought up earlier and it’scalled Phishing. Phishing is a main attack that needs to be responded toquickly and it occurs in mostly emails. Another thing about analyst jobs is you need to be...

read more

Journal 9

Posted by on 1:48 am in Journals | 0 comments

I read Tobi-Goldfus-Social-Media-Disorder-Scale and watched the videocorrelated with it. Now going through it I scored 2 out of 9, only because Ilook at social media when I’m upset or bored and to help clear the mind. I knowthere are times where there is work and play, and taking pictures of obviouslydata sensitive things is bad. There are places in companies that allow you totake phone calls or breaks such as break rooms, bathrooms, outside areas, andprivate meeting rooms. Wait till you’re able to enter these places before you...

read more

Journal 8

Posted by on 11:46 pm in Journals | 0 comments

When it comes to social media and it’s impact on us as humans when it comes to cyber security its actually quite prominente. Media is everywhere no matter if you are trying to avoid it or not, its all around us while were driving, in stores, or even going into nature. The main form of media that was talked about in the video we were presented to watch, focused on movies with scenes that focused on hackers or cyber security related things. More people watch movies and shows over actually looking up how to help when you are attacked by a...

read more