All About me

My name is Gabriella Hampton. This is my Sophomore year at Old Dominion University, and I am a Cybersecurity major. I came to school to major in Civil Engineering and then ended up being in Electrical Engineering and I loved it. I did engineering all through high school so, it was hard to decide to which majors. However, I still love cyber and I might stay with this major. Because I’m in college now I don’t do anything but stay in my room. Don’t have any hobbies anymore, but I love to read and watch YouTube to keep my peace to be happy.

Journal Entries 1-15

1.) I want to be either a Digital forensic examiner or a Special Agent for my career. As a digital forensic examiner, I’ll use software and advanced technology to analyze and preserve digital evidence from FBI investigations. A work area I’ll need is Digital Evidence Analysis which is responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques. Special agents often are FBI employees who fight all types of crime and acts of terrorism, including cyber threats and crimes. Some duties might include tracking a criminal’s online activity and investigating potential cyber instructions. The work area I will need is Cybercrime Investigation which is responsible for investigating incidents and crimes. I’ll need to know the tactics, techniques, and procedures for all the investigative tools and processes. However, I believe the least work area I’ll need is Cyberspace effects or Cyberspace Operations which are responsible for gathering evidence on criminal or foreign intelligence entities to mitigate and protect against possible or real-time threats. Conducts collection, processing, and geolocation of systems to exploit, locate, and track targets. I believe that no work area would appeal the least in the fields because just the basic knowledge in all work areas could still be valuable as you progress in either career. 

2.)The Old Dominion website states that ‘In studying cybersecurity as a social science, we must always adhere to the scientific principles of relativism, objectivity, parsimony, ethical neutrality, and determinism.’ Therefore, science principles are observing, experimenting, and hypothesizing tests, that contain cybersecurity. In cybersecurity, professionals use scientific methods to analyze and minimize threats. Observation is when they monitor network traffic and identify anomalies. The hypothesis is investigating the cause of cyber incidents along with experimenting through simulations or testing security measures. Then, data analysis and pattern recognition came with scientific methodology in helping to understand unstable behaviors and predict future attacks. However, by applying these principles, cybersecurity professionals create an effective, evidence-based defense and adapt quickly to solving threats.

3.)Researchers use data on breaches to analyze patterns and trends in cyberattacks, that help them identify vulnerabilities in systems and common methods used by attackers. By studying breach reports, including the type of data compromised, attack vectors, and the industries targeted, researchers can uncover weaknesses or technological gaps that need improvement. This information allows researchers to develop more effective prevention techniques and strategies, such as improving encryption protocols or enhancing cybersecurity policies. Additionally, studying the timeline of breaches, including detection and response times, helps in refining incident response strategies and minimizing damage from future attacks. By compiling and analyzing breach data, researchers contribute to developing a more resilient cybersecurity infrastructure across various sectors.

4.)Maslow’s Hierarchy needs to connect with technology in various ways in my life. For physiological needs, I use technology for basics like online grocery shopping with having to put my card information on the app and using my health apps with my medical records. Security needs are met through cybersecurity tools like two-factor authentication. Social media platforms like Instagram and messaging apps belong by keeping me connected with friends. Respect is shown by professional achievements shared on platforms like LinkedIn. Finally, self-actualization is facilitated through online learning tools, coding platforms, and creativity apps, where I seek personal growth and my abilities in the programming field.

5.) -Political/Ideological Motives (Hacktivism)- Reasoning: Hacktivism is driven by strong beliefs or the desire to promote social or political change. This motive makes the most sense in the context of cybercrime, as individuals or groups often feel morally justified in their actions, whether they’re protesting injustice, censorship, or corruption. 

-Financial Gain- Reasoning: Many cybercriminals are primarily motivated by monetary rewards, which is a simple and relatable incentive. Whether through scams, ransomware, or data theft, financial motives often have a clear and tangible goal. The HP research revealed that cybercriminals spend their ill-gotten gains on items ranging from luxury goods. 

-Revenge/Personal Grudges- Reasoning: Cybercrimes motivated by revenge make sense on a more emotional level, especially when personal relationships or emotional connections are involved. Revenge porn cases, where perpetrators seek to humiliate or harm their victims, reflect this personal motive. 

-Thrill/Challenge- Reasoning: Many hackers, especially younger individuals, are motivated by the thrill or challenge of hacking into systems. The intellectual stimulation of breaking into protected systems can be rewarding, as illustrated by the stories of youthful hackers joining the hacktivism movement. 

-Reputation or Notoriety- Reasoning: Gaining notoriety or establishing a name within hacker communities is another motivation that makes sense but is perhaps less practical. Hackers might target high-profile companies to gain fame or respect in underground circles. 

-Data Scraping for Professional Purposes- Reasoning: Data scraping from platforms like LinkedIn can be motivated by professional advantages, such as creating databases or leveraging personal information for business purposes. While it makes sense for data scraping to be motivated by the desire to gain business advantages, it is less emotionally driven than other forms of cybercrime, which is why it ranks lower.

-Grooming/Exploitation- Reasoning: While online grooming and exploitation of children is a severe and pressing issue, the motivation behind it is less understandable and relatable from a general perspective. It is often driven by deeply disturbed psychological conditions, making it harder to rank higher on this list of logical motives.

In conclusion, while all these motives exist within the theme of cybercrime, like political, financial, or revenge are more logical or relatable, to others like grooming may be less so due to their disturbing nature.

6.) -www.bank0famerica.com – This is a phishing website that imitates the official Bank of America site but uses a zero (“0”) instead of an “O”. It aims to steal login credentials or personal information.
   
-www.amaznshopdeals.com – This site pretends to offer Amazon deals but is not an official Amazon domain. Fake deals and suspicious links could lead to malware or data theft.

-www.tech-support-now.net – A fraudulent tech support site designed to scam users by offering fake services and asking for remote access or payment for “repairs” that aren’t needed.

These websites can be identified as fake based on suspicious domain names, spelling errors, and unusual requests for personal information or payments. Always verify the authenticity of a website before entering sensitive information.

8.)The media significantly shapes public understanding of cybersecurity, often portraying it exaggeratedly or overly simplistic. After watching the video “Hacker Rates 12 Hacking Scenes In Movies And TV,” it becomes clear that many depictions of hacking are dramatized for entertainment. Rapid typing, flashy graphics, and unrealistic timeframes create the illusion that hacking is quick and straightforward. Hacking is complex, requiring specialized knowledge, patience, and meticulous effort. These fictional portrayals can lead to misconceptions, such as underestimating the importance of cybersecurity measures or believing in the “lone genius hacker” stereotype. Such media depictions often ignore cybersecurity’s collaborative and defensive aspects, potentially giving audiences a false sense of both the ease and the threat of hacking. Ultimately, the media’s portrayal shapes perceptions, influencing how seriously people take cybersecurity in their personal and professional lives.

9.)

10.) The article on social cybersecurity for the U.S. Army, particularly discusses the idea of using social strategies to counter cyber threats, particularly how enemies exploit social networks and online influence to manipulate public opinion and destabilize societies. It explains that cybersecurity isn’t just technical; it also involves protecting social structures from cyber-driven manipulation and misinformation movements. This approach merges traditional cybersecurity with social science, stressing the need for collective resilience, awareness, and proactive measures to safeguard national security. I found it convincing, as it widens cybersecurity’s scope to include social elements, suggesting a shift toward more combined defense strategies in digital spaces. Overall, it stresses the critical nature of securing military networks and data to maintain operational readiness and effectiveness against adversaries.

11.) The role of a cybersecurity analyst, as described in the video, emphasizes social behaviors like vigilance, adaptability, and teamwork. Analysts must navigate a collaborative environment to protect sensitive information, which builds a culture of trust and shared responsibility. They also handle constant interaction with other team members and stakeholders, reinforcing the social theme of collective security efforts. Additionally, there is an underlying theme of ethical responsibility, as analysts must make decisions that prioritize both privacy and safety, showcasing how cybersecurity intertwines with social trust and moral accountability.

12.) Economic Theories

1. Agency Theory: This theory focuses on the relationship between a principal and an agent who is responsible for acting in the principal’s best interest. In this context, customers trust the company to protect their personal information. Still, the data breach shows a failure in this agency relationship, highlighting potential issues of information asymmetry and the cost of safeguarding customer data. The breach undermines trust and may lead to costs for the company as they address regulatory scrutiny, compensates affected customers, and implement better security measures.

2. Behavioral Economics: This theory can help explain customer responses and company actions post-breach. Behavioral economics suggests that people may act irrationally in the face of security threats, either by overestimating the risk or by feeling resigned to the potential risks of using digital services. The notification letter, which includes assurances about mitigating actions and monitoring, attempts to reduce customer anxiety and restore trust by appealing to these psychological responses, aiming to manage customer perceptions and mitigate future financial repercussions from the breach.

Social Science Theories

1. Social Trust Theory: Social trust theory considers how people’s trust in institutions impacts social cohesion and cooperation. Data breaches harm social trust as customers feel betrayed by companies meant to protect their sensitive data. In this breach letter, the company’s response aims to rebuild trust by demonstrating transparency, outlining specific actions, and ensuring accountability. Without such efforts, customers may lose faith in the company and, more broadly, in digital platforms.

2. Social Learning Theory: This theory suggests that individuals learn behaviors and responses from observing others. In the case of a data breach, customers observe how the company handles the incident and may learn to respond with caution or even skepticism towards similar institutions. This letter serves as a signal to customers and other businesses on how to handle breaches responsibly, potentially influencing industry standards and customer expectations around data security practices and crisis responses.

In sum, these theories highlight the complicated dynamics that play in data breaches, affecting both customer trust and company strategies for crisis management and future prevention.

13.) The article “Bug Bounty Programs as a Tool for Cybersecurity” explains the use and impact of bug bounty policies in cybersecurity, focusing on how they allow ethical hackers to identify and report system vulnerabilities. The authors discuss the development of bug bounty programs (BBPs) and their growing importance in organizational security strategies. They highlight that, from an economic perspective, BBPs align well with cost-benefit principles: companies can potentially save on the costs associated with breaches by paying ethical hackers relatively small rewards for identifying vulnerabilities before malicious actors do. BBPs also democratize security testing by enabling a wide range of skilled hackers, with different expertise levels, to participate in strengthening a company’s defenses. The study reveals a complex set of motivations among participants. While financial reward is a key factor, it is not the sole motivator; many hackers participate in BBPs for professional development, skill enhancement, and community recognition. This demonstrates the importance of non-monetary incentives in fostering engagement. The findings also address challenges in BBPs, such as the need for well-structured policies that clearly outline scope, acceptable methods, and reward structures. Poorly defined policies can lead to confusion, reduced effectiveness, and even legal issues. In reaction, the study effectively illustrates the value of BBPs as a mutually beneficial policy: organizations gain insights into their security weaknesses at a lower cost, while ethical hackers build skills and reputation. However, it also suggests that the success of such programs depends heavily on transparent communication and well-defined parameters. Without these, the risk of misunderstandings and ethical concerns rises, potentially compromising the program’s effectiveness. This approach to cybersecurity policy through an economic and social framework demonstrates the importance of considering both the financial incentives and the community dynamics involved in BBPs.

14.) Andriy Slynchuk outlines several potentially illegal online activities, highlighting serious violations that can lead to severe consequences. Among these, five stand out for their impact on individual privacy, security, and societal norms:

-Using or Distributing Pirated Content: This activity violates copyright laws and undermines creators and businesses by distributing unauthorized copies of media or software. The economic damage to industries and the potential for malware in pirated files make this a critical issue.

-Hacking or Unauthorized Access: Gaining unauthorized access to computers, networks, or accounts is a federal crime under laws like the Computer Fraud and Abuse Act. This poses risks to personal data, corporate security, and national safety.

-Spreading Malware or Spyware: Creating or distributing software designed to harm devices or steal sensitive information violates laws and can cause significant financial and personal harm to victims.

-Identity Theft: Stealing and using someone else’s identity for personal gain severely violates privacy and trust. It often results in financial loss and long-lasting impacts on the victim’s credit and reputation.

-Unauthorized Monitoring or Tracking: Installing spyware to monitor individuals without consent is illegal in many jurisdictions, especially for adults, and breaches privacy laws such as the Wiretap Act.

These violations are serious because they infringe on individual rights, cause financial damage, and contribute to a broader erosion of trust and security in the digital space. Legal frameworks exist to deter these actions, but their prevalence underscores the need for awareness and ethical online behavior.

15.) After watching Davin Teo’s TEDx talk, I was intrigued by his journey into digital forensics and how it intersects with the social sciences. Teo explains the human element in solving cyber crimes, where understanding behavior is as crucial as technical expertise. His passion for uncovering digital evidence shows the psychological and sociological aspects of the work, such as interpreting motives or piecing together actions. I found his emphasis on storytelling within investigations compelling, as it mirrors the social sciences’ focus on narratives to understand human behavior. Teo’s career pathway shows that blending technical skills with an understanding of society creates a powerful tool for justice, reinforcing my interest in this field.

Articles 1 & 2

1.) Article #1 Cyberbullying and Cyberbullicide Ideation
Among Jordanian College Students
The article investigates the intersection of technology and criminal behavior. Along with
addressing social science principles such as human behavior, law enforcement
responses, and the impact of societal shifts on criminal patterns. By examining how
digital criminal investigations are influenced by AI, it directly ties into criminology and
sociology, which study how societal factors shape and control deviance.
The central research questions revolve around understanding how AI technologies can
improve digital criminal investigations and what legal frameworks are necessary to
balance technological advancements with ethical concerns. The hypothesis suggests
that the integration of AI will lead to more efficient, accurate, and proactive criminal
investigations.
The study uses a qualitative, descriptive, and analytical approach, relying on legal
documents, case studies, and scholarly literature to provide an understanding view of
AI’s role in criminal investigations. This approach allows for an exploration of both the
technical and legal measures of the topic.
The analysis includes qualitative data drawn from legal frameworks, criminal case
studies, and AI applications in law enforcement. It also utilizes machine learning
techniques to organize and interpret case data, demonstrating how AI can streamline
case management, predict criminal behavior, and improve decision-making processes.
I don’t fully believe this matches the PowerPoint presentation because the PowerPoint
focus was the victim’s personality and psychological traits. While this article’s focus was
cybercrime, digital forensics, and the role of AI in law enforcement. This article directly
ties into themes like predictive policing and automated surveillance, which might have
been highlighted in your presentations, and are central to the article’s exploration of AI’s
potential in identifying criminal patterns and reducing recidivism.
AI’s integration into law enforcement can raise concerns about bias and the
marginalization of some groups. There is a risk that algorithmic biases could
disproportionately affect certain populations, as AI systems often reflect the biases
present in the data they are trained with. This is a major challenge to ensure that the
use of AI in criminal justice is fair and equitable.
The study Contributions to Society emphasizes the potential for AI to contribute to
more efficient, more effective criminal justice processes, such as improving identity
verification and preventing criminal activities through predictive analytics. However, it
also cautions that proper legal safeguards must be established to prevent the misuse of
AI in ways that could harm individuals’ rights or privacy.
In conclusion, the article makes a significant contribution to discussions on how AI
technologies can transform digital criminal investigations while highlighting the legal and
ethical concerns that must be addressed to ensure a balanced approach.
Recourses
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/329/
98

2.) Article #2: Factors Influencing the Formation of Intellectual
Security among University Students
The article analyzes intellectual security among university students, linking it to the
social sciences by analyzing how societal, cultural, and educational factors shape their
perceptions. “Factors Influencing the Formation of Intellectual Security among
University Students” addresses research questions on influences fostering intellectual
security and employ field studies with surveys for data collection.
The topic of educated security among university students with social science principles
examines the difference between individual behaviors and cultural influences. It
addresses how societal norms, education systems, and communication dynamics
influence educational development and critical thinking. By exploring these factors, the
study combines psychological, sociological, and historical perspectives, encouraging an
understanding of how environments shape thought decision-making, which are major
pieces in the social sciences. The study’s research questions or hypotheses likely focus
on understanding the factors that influence the development of educated security
among university students. This includes examining how societal, educational, and
technological environments shape students’ abilities to evaluate information critically,
withstand educated manipulation, and foster strength against cyber threats. The
research also explores the role of university systems and peer interactions in improving
education security.
Data collection involves surveys or interviews with university students to gather insights
into their education security. Statistical analysis is used to identify correlations between
various social, educational, and psychological factors. Quantitative and qualitative data,
including survey responses and possibly interviews with university students. The
quantitative data is analyzed to identify relationships between educational
environments, societal influences, and intellectual resilience. Qualitative data provides
deeper insights into students’ perceptions and experiences. This mixed method ensures
a complete understanding of the factors influencing intellectual security.
Concepts from PowerPoint presentations on the social sciences, such as the impact of
societal structures, individual behavior, and group dynamics, relate closely to the
article’s examination of personal security. The article addresses how education and
socialization shape critical thinking and resilience like social learning, and the influence
of cultural factors. These principles help explain the difference between the societal
environment and students’ educated security. The topic of educational security among
university students directly relates to the challenges, concerns, and contributions of
minority groups. The groups often face systemic obstacles making it limited access to educational resources and digital literacy tools, which can interfere with their ability to
develop intellectual security.
The study contributes to society by emphasizing the importance of education and
security among university students. It highlights how different educational, societal, and
technological shape students’ ability to know the information. By promoting awareness
of these influences, the study encourages strategies to strengthen educated resilience,
ensuring that students, particularly those from minority groups, are better prepared to
navigate challenges like misinformation and cyber threats. This research helps
encourage a more informed and secure society.
In conclusion, the study on education security among university students highlights the
important role of education, societal influences, and technological factors in fostering
critical thinking and resilience. By addressing the challenges of minority groups and
promoting inclusive strategies, the research provides valuable insights into improving
intellectual
Reference
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/344/
100

Facebooktwitterlinkedininstagramflickrfoursquaremail