These are 5 photos and a video attempting to depict my thoughts on cybersecurity and social science
The speaker discusses his pathway into his career as a winding road in my opinion. As he stated that during his time there was no development into the field either threw into it or put into it. I think this… Continue Reading →
Introduction Cybersecurity analysts are responsible for the monitoring and responding to security incidents in networks, or other realms. They can analyze current security protocols, investigate potential threats, and can effectively mitigate risks. This paper will be dedicated to the… Continue Reading →
https://clario.co/blog/illegal-things-you-do-online/ In this article Slynchuk describes eleven actions that are illegal that users may unknowingly partaking in. Out of these eleven the five violations that in my opinion are the most serious and heinous are bullying and trolling, collection of… Continue Reading →
https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true Firstly, the article dives into the shortage of cybersecurity professionals, secondly, it addresses how businesses that suffer from a data breaches can lead to their downfall. Therefore, the employment of freelancers by enterprises to find bugs that highlight vulnerabilities… Continue Reading →
The data breach notification letter can be correlated with social science and economic theories. One economic theory that relates to the letter is the rational choice theory, this theory explains that individuals or businesses make choices in their best interest…. Continue Reading →
Introduction Artificial Intelligence (AI) is becoming a more enveloped aspect of the technological society that is flourishing in the 21st century. The beginning of this technology in practices can be seen in the implementation of AI in digital criminal… Continue Reading →
Social themes and behaviors that arise within the presentation are discussed when on the topic “What is a Cybersecurity Analyst?”, in this she discusses some tasks or jobs within the field and these can be correlated with the social behaviors…. Continue Reading →
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. The global climate is evolving towards a world where it will be dominated on the cyber level controlled by the seeking and gathering of information and in turn the suppression of your opponents, on a… Continue Reading →
https://www.brieftherapyconference.com/download/handouts/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf For the Social Media Disorder Scale it states that out of the nine questions 5 of the criteria must be met to have a formal diagnosis for disordered social media user. The nine questions all have associated criteria, the… Continue Reading →
© 2025 Cameron Mclaurin — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑