Journal #12:  

With Digital Forensics, and the career of a Digital Forensics Investigator, there is relation to that of the social sciences, given, as the video points out, there is a need for integrity, as well as transparency to a certain degree, which ae values reminiscent to that of the social sciences. In addition to this, with Teo’s pathway to his career, I personally find it appealing that he  was able to use  his skills to help society, and too that his career initially may have gone a different way, but through skill and perseverance, he was able to establish his career in digital forensics. 

Journal #11: 

When considering two different economic theories that relate to this sample breach letter, since the intrusion was done by individuals using malware for personal gain.  I’d say the theories that fit in this regard are the economic theory, being as it suggests that individuals may make choice in their best interest, which may also involve malware, and the Classical economic theory, as it suggests that the government should not interfere with individuals, which in the case could be applicable. With the two Social Science theories that additionally show relation to this letter, the cognitive theory can show relation, as this theory focuses on how individuals think and process information, which can help to determine their actions, as well as too, the personality theory, given it explores the personal aspects of an individual, and how this can be responsible for their behavior, which in the case was intrusion.

Journal #10: 

In this video, as it describes the cybersecurity analyst job, there is relation to social behavior, given, what is said about the involvement of social skills. With this,  emphasis is put toward the importance of certain social aspects such as collaboration, communication, teamwork, as these behaviors can often be imperative for success. Also too in this, social themes such as accountability, and trustworthiness, can arise and be present, as with this, analysts can show account for the responsibility of themselves, and of others.

Journal #9: 

As this article on social cybersecurity defines it, and accounts for its history as well as its current relevance within the world today, after having read this, I can say that my understanding of this concept as a whole, has in turn been furthered. In this, the article explained how social cybersecurity aims to build the type of cyber infrastructure needed, in order to maintain the very essence and character of society. With this, through the use of analysis, psychology, and persuasion, those working within this field  are helping to restore, and account for security.

Journal #8:

With the Social Media Disorder Scale, when considering the relationship between the usage of social media, and myself, I found that I did not really relate to some of the more common instances of social media use, that could maybe be experienced by most. In my case, I haven’t found myself regularly using social media, or feeling a need to use social media for an extremely long period of time, or at least if I have, it has not been so much so to the point to where in which it could cause conflict with my parents, and or friends. With this, I can maybe say that I have gone on social media when having negative feelings to maybe clear my mind, but aside from this, I did not see much relation, as it pertains to my usage of social media, to that of most. And beyond this, as for why the patterns that some may follow may be different, I think part of this, can lie in the fact that everyone has different experiences to some degree within life, and different interests as well, which can cause people to gravitate toward things one way or another, whether that is more so toward social media and away from other people, or not.

Journal #7: 

With this photo: https://unsplash.com/photos/5QgIuuBxKwM , being as the person in it, is facing toward a computer with their hands wavering toward themselves, their direction and others around, I think a good meme to make regarding Human System Integration, would be to put a thought bubble coming from the direction of the peron’s mouth saying: “We better make sure that the system’s technical, organizational, and human elements are addressed for success.”. With this, I think this would be funny considering for one, Human Systems Integration is meant to ensure that those elements are addressed, and for two, this meme would also play on the phrase: “dress for success”.

Journal #6:

With the fake websites: https://identity.my.vccs.edu/, https://www.ebay.org, and https://PayPal.net/purchase, when compared to real websites such as: https://itentity.my.vccs.edu, https://www.ebay.com, https://paypal.com/us/home, there can be certain distinguishable features to note regarding these sites that can serve to prove that they are in fact fake. For example, with the Domain name of a website, if it is not spelled correctly, or if the site type is not correct, in this regard, this can cause concern, and give cause for pause, given the name of an organization website, and the type of site in which they use, should be correct. Moreover, beyond this, another indicator that the website could in fact be fake, could be seen within the website design, as a poorly designed website may not have the same attention to detail, as the aforementioned real website examples. 

Journal #5: 

In the Political motive, given the motive here was to “prove a political point”, I can see this as making sense, given the need for access to information from other countries within recent memory. In this regard, I would rank this at 1.

Beyond this, when considering the Multiple reasons as to what may serve as potential motive for individuals, research has shown that cybercriminals hack for various reasons such as for reasons that are passion, and skill related, for these individuals. In that, I think I would have to rank this at 2, as with it, this does make sense, given people tend to do things they are good at, and do love.

Following this, with Money being a motive, I can understand this as well, and it does make sense, since money in this regard may be easier to obtain, especially for those who are very skilled, and too, may even be very profitable for individuals. On the contrary, given there are more safer ways to make money, I would rank this at 3.

Moreover, with the motive of Recognition being there, given an individual may have felt the need to act out for the sake of potentially garner recognition and or attention, I would rank this at 4, because although on one end, it could show ones capabilities, on the other hand, it also is not necessarily the most logical reason to have motive.

Next with the article on Revenge, and Revenge Porn Victims, being as with this, the motive of some exposing the images of others was to in effect, get back at them, though wrong, this does make sense to some degree assuming those exposing the images were hurt, and had even further motive. With this, I would rank this at 5.

With the Entertainment motive, when examining this purely based on the motive of the man behind it, as he claims he did it “for fun”, I would rank this at 6. With this, my placement is like this as such, given, though the motive did not necessarily make lots of sense, at the very least, there may be some upside, considering with his actions and exposing of so many user’s data (700 million), this may have pointed out potential vulnerabilities within LinkedIn, and in turn, maybe can provided some more awareness toward security. 

With Boredom, as it is suggested that this may be a motive for some to potentially cyber-bully, and or make a presence online, though this can maybe make sense to some degree, ultimately I would argue that this motive is not one that is very understandable, considering the very social outlets that could cause users to act out, could also in turn, alleviate boredom. With this, I would have to rank this at 7, given there are lots of things that could potentially disrupt one’s boredom, beyond this.

Journal #4: 

Within each level of Maslow’s Hierarchy of Needs – Physiological needs, Safety needs, Belongingness and love needs, Esteem needs, and Self-actualization, there can be relation, and different parallels seen within these as such, and some of the experiences I have had in a technological sense. For instance, through the use of technology, in my case, I have been able to tend to lots of Physiological needs so to speak in that, by having a cell-phone, I’ve been able to have access to things that are very essential to my personal livelihood, such as my family, and or my finances. Moreover, with safety needs, technology has provided me with this as well, considering again, through the use of a cell-phone, I have been able to ensure personal safety, and security at times, given all of what having access to a cellular device can provide. As far as Belongingness and love needs go, through the use of social media, and the want/need to fit in, this could be representative of experiences I’ve had with technology, that have appealed to my relationships and need for them, whether more intimate, or friendly. In this, social media could also be applicable to my Esteem needs as well, being as perhaps through the use of social media, a boost in my own personal feelings could be the case, with some feelings of self-accomplishment being related to my own peer involvement, and presence within social media. And alas, with Self-Actualization, as this refers one achieving their full potential, for myself, in a technological space, I think the best example of this can prove true, once I complete my studies as a Cybersecurity major, graduate, get a job, and thus perform well at my job.

Journal #3:

Within the Privacy Rights link, researchers may utilize this information to study data breaches and to gain insight, into the history of data breaches ,in terms of what they have shown thus far, as well as what the history may show moving forward. In this, given the link provides and accounts for certain aspects of data breaches, such as: the different types of breaches that occur, the organizations with the largest number of breaches, and the number of breaches reported, and records impacted within the U.S.  over the course of time, throughout the past seventeen years, (2005-2022), this information can prove to be invaluable for researchers alike, since by using it, they can gain a better overall understanding of breaches as a whole.