Journal 15

When it came to watching the video on digital forensics investigators have a challenging job that requires them to solve puzzles that fit snugly with social sciences. While their primary responsibility is to investigate digital clues to catch cyber criminals, their discoveries have far-reaching consequences in our social world. To get to the root of cyber crimes, these investigators must deeply understand what motivates people – their behaviors, thoughts, and the overall role of society. It’s crucial to realize that cyber crimes don’t just affect technology; they devastate...

Read More

Career Paper

Victoria Sanderson 4/4/2024 Career Paper There are many jobs in the cyber security field that work with social sciences, but cybersecurity incident responders play a major role in safeguarding digital assets and mitigating the impact of cyber threats on organizations. But what do incident responders have to do with social science? These responders have technical skills crucial for incorporating principles and research that cooperate with social science. This paper will examine the critical concepts learned in class and how they apply to addressing cyber threats. By exploring the integration...

Read More

Article Review 2

Victoria Sanderson3/21/2024 Article review #2. Chosen Article:  Understanding the Relationship between Digital Literacy, Privacy Concerns, and Cybersecurity Behavior Intro The chosen article, titled “Impact of Digital Literacy and Online Privacy Concerns on Cybersecurity Behavior,” has been published in the International Journal of Cyber Criminology. While reading over, the relationship between digital literacy, concerns regarding online privacy, and the resultant behaviors in the world of cybersecurity are thoroughly examined (Elrayah & Jamil, 2023). So, in this article...

Read More

Journal 14

In my opinion out of the eleven choices given it contained five severe violations that breach legal boundaries and potentially endanger individuals, compromising their privacy and security. Firstly, sharing personal data, such as passwords, addresses, or photos of others without consent, constitutes a severe breach of privacy. Secondly, using unofficial streaming services to access copyrighted material without authorization undermines content creators’ rights and exposes users to legal liabilities. Thirdly, recording calls without consent violates individuals’ privacy rights and...

Read More

Journal 13

In this journal article, it will delve deeper into the article given and show the role played by VDPs and Bug Bounty Programs in improving cybersecurity. Despite some controversy at their introduction, both initiatives have seen a significant uptake in recent years due to their success in uncovering previously unknown cybersecurity vulnerabilities. The empirical contribution consists of analyzing the determinants of the effectiveness of Bug Bounty Programs, using inquiry-driven econometric methods such as robust regression models and instrumental variable strategies to establish causality...

Read More

Journal 12

Market Failure theory is a framework that examines situations where markets cannot allocate resources efficiently. Data breaches can be seen as a form of market failure. The failure to adequately secure customer data can lead to negative externalities such as potential identity theft or fraud. This means that customers may incur costs due to the breach not accounted for in the market transactions. Cost-benefit analysis is a theory that customers apply when purchasing online platforms. A data breach introduces new costs that customers did not initially consider. This theory highlights how...

Read More

Journal 10

When it comes to social cybersecurity, is a critical aspect of modern warfare, as it focuses on understanding how human behavior intersects with technology. It involves manipulating human behavior through technology to achieve strategic goals, this manipulation then affects the protection of information systems. An example of this is the Russian propaganda machine as it serves as a notable example of leveraging information warfare tactics to weaken nations. Another thing is about bots which are powered by artificial intelligence. Bots play a significant role in these operations by spreading...

Read More

Journal 11

With this journal it goes into a video that reviews information into what acyber security analyst is. Analysts branch off into many different thingsbecause they are the first responders to any cyber related incident. When itcomes to social attacks on the network, they will be the first to deal with it.Some of the social attacks mentioned are ones I have brought up earlier and it’scalled Phishing. Phishing is a main attack that needs to be responded toquickly and it occurs in mostly emails. Another thing about analyst jobs is you need to be updated with all thenewest cyber security trends and...

Read More

Journal 9

I read Tobi-Goldfus-Social-Media-Disorder-Scale and watched the videocorrelated with it. Now going through it I scored 2 out of 9, only because Ilook at social media when I’m upset or bored and to help clear the mind. I knowthere are times where there is work and play, and taking pictures of obviouslydata sensitive things is bad. There are places in companies that allow you totake phone calls or breaks such as break rooms, bathrooms, outside areas, andprivate meeting rooms. Wait till you’re able to enter these places before you startgiving out data that may or may not be sensitive. The...

Read More

Journal 8

When it comes to social media and it’s impact on us as humans when it comes to cyber security its actually quite prominente. Media is everywhere no matter if you are trying to avoid it or not, its all around us while were driving, in stores, or even going into nature. The main form of media that was talked about in the video we were presented to watch, focused on movies with scenes that focused on hackers or cyber security related things. More people watch movies and shows over actually looking up how to help when you are attacked by a virus or hacker. This of course makes people...

Read More