Article 1 and 2 review – 

Per the syllabus:  

On two occasions during the semester, students will write an article review using social science cybersecurity studies and should follow the rubric closely.   

Article 1 review will be derived from a scholarly journal.

Article 2 review will be derived from a different scholarly journal than your Article 1 review.

 ‘Open’ and ‘easy to access’ journals that students might select articles from include: 

International Journal of Cyber criminology: https://www.cybercrimejournal.com/Links to an external site.

International Journal of Cybersecurity Intelligence & Cybercrime:  https://vc.bridgew.edu/ijcic/ 

and Journal of Cybersecurity:  https://academic.oup.com/cybersecurityLinks to an external site.

The reviews should focus on (1) how the topic relates to the principles of the social sciences, (2) the study’s research questions or hypotheses, (3) the types of research methods used, (4) the types of data and analysis done, (5) how concepts discussed in class relate to the article, (5) how the topic relates to the challenges, concerns, and contributions of marginalized groups, and (6) the overall contributions of the studies to society.

Well-graded papers are between 250 – 500 words.  They are constructed using the rubric provided in this syllabus.  The professor uses Turnitin for each of the student submissions.   Important notes: Do not forget to provide the link to your particular article that you have reviewed.  Don’t forget to upload into your ePortfolio.   

Please note the rubric that I will follow to grade your Article 1 Review is in the Module 5 content.   

Don’t forget to add the source of your article with the associated https:// as I will read the article that you reviewed.  

Career Paper

Cybersecurity Career Professional Paper

Select a type of cybersecurity career and write a two-page paper describing how professionals in that career require and depend on social science research and social science principles in those careers.  Pay specific attention to the key concepts learned in class and demonstrate how those concepts are applied in the career you selected.   The focus should be on demonstrating how the material from class relates to cybersecurity professionals’ daily routines.  Specific attention should be given to how the career relates to marginalized groups and society in general.  Students should use at least three reliable sources to write the paper.

 The RUBRIC for this assignment is in your syllabus.  Your submission will be graded against the rubric.  

Submit assignment here and upload to your ePortfolio. Submit in the Assignments Folder due October 28, 2024, by 11:59 PM EST.          

Using the Chai Article (Links to an external site.), along with additional research you will conduct on your own, describe the CIA Triad, and the differences between Authentication & Authorization, including examples of each.

In this write-up you will use the SCADA SystemsLinks to an external site. article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.

During this week’s reading, you’ve been exposed to different points of view regarding human contribution to cyber threats.  Now, put on your Chief Information Security Officer hat.  Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology?  That is, how would you allocate your limited funds?  Explain your reasoning.

For CA6, your topic is:

Ignoring the ongoing conflict and its basis and focusing on the cyberwarfare actions described, considered on their own, could these actions be part of a just war, or would these actions be unjust even within an otherwise just war?

For CA5, your topic is:

Did Manning act out of loyalty to the United States when she released the footage in the video? Do her actions constitute a moral or immoral case of whistleblowing?