When a person thinks about cybersecurity as a profession and social science, they likely imagine those to be two very distinctly different fields. They’re actually very interdisciplinary though. According to the career website, Indeed, an IT Security Specialist’s job is… Continue Reading →
Cybersecurity is ne of the most important factors in organizations as the presence of cyber incidents presents major vulnerabilities to the confidentiality of important information and data. Mitigating these common threats is necessary for organizations to be able to thrive… Continue Reading →
The impact of digital literacy and online privacy concerns continue to rise as technology continues to grow. The social sciences play a key role in cyber security by moderating the actions taken by individuals that do these harmful acts to… Continue Reading →
There are around 11 illegal things that a common technology user unknowingly does. The user uses unofficial streaming services, using torrent services, using copyrighted images, sharing passwords and addresses, bullying, recording a VoIP call without consent, faking your identity, using… Continue Reading →
A bug bounty is a reward offered to a person who is able to identify vulnerabilities and errors in a computer program. This is a great way to get more systems checked for vulnerabilities they have is they don’t have… Continue Reading →
In the article Glasswasherparts.com_.pdf (dojmt.gov), the economic side of the report suggest that there were peoples bank accounts stolen and the attacker was able to access the first name, last name, address, phone number, and debit card information with expiration… Continue Reading →
Social cybersecurity bridges computational social science with practical applications. It helps us look through and navigate the challenges of our connected world, safeguarding open discourse and societal well-being. In order to maintain a peaceful world on the internet we have… Continue Reading →
Social themes in the cybersecurity analyst field include gaining experience, networking, and gaining certifications. Gaining experience is a crucial role in getting a job with cybersecurity, it allows the ability to gain the skills necessary to accomplish the job that… Continue Reading →
Through the social media disorder scale, I found out that I scored a 4 out of 9. I found that there tends to be a procrastination problem with me and a lot of other people, sometimes we will use social… Continue Reading →
The media’s influence on our perception of cybersecurity has a major impact on how we view the field of study. The biggest influence in the media has been movies that show somebody hacking. Seeing the computer screen in the movies… Continue Reading →
© 2025 Jacob Butler — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑