Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Social and Behavioral Sciences

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds Apr 2024

Profiling Cybercriminals: Behavioral Analysis And Motivations Behind Cybercrime Activities, A'Shya Latrice Reynolds

Cybersecurity Undergraduate Research Showcase

The study of cybercriminal behavior and motivations is crucial for understanding and combating the evolving landscape of digital crime. This paper delves into the intricate realm of cybercrime profiling, employing a multidisciplinary approach to dissect the behavioral patterns and underlying motivations of cybercriminals. Drawing from psychology, sociology, and criminology, the research examines the intricate interplay of individual traits, social dynamics, and technological factors that shape cybercriminal activities.

Through analysis of case studies and research, this paper uncovers the diverse range of motivations driving individuals towards engaging in cybercrime. From financial gain and ideological extremism to thrill-seeking and revenge, cybercriminals exhibit …


The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy Apr 2024

The Ethical And Legal Implications Of Iot Data In Business Organizations, Kennedy Bellamy

Cybersecurity Undergraduate Research Showcase

The Internet of Things (IoT) has transformed how our day to day lives by implementing and evolving technology that allows data to be exchanged between interconnected devices without the need for human involvement. This paper investigates the implications of IoT expansion and development in corporate organizations, focusing on both the opportunities and challenges it brings. IoT encompasses a wide range of data kinds, from sensor readings to user interactions, across industries such as manufacturing, healthcare, and retail. However, greater connection raises ethical and legal challenges, especially over data privacy, ownership, and control. Potential breaches of privacy and illegal data access …


The Role Of Osint In Criminal Investigations: Leveraging Open-Source Data To Combat Cybercrime And Organized Criminal Activities, Azariah Vaughan Mar 2024

The Role Of Osint In Criminal Investigations: Leveraging Open-Source Data To Combat Cybercrime And Organized Criminal Activities, Azariah Vaughan

Cybersecurity Undergraduate Research Showcase

In today's modern age driven by digital innovations, the widespread adoption of technology has transformed criminal activities, leading to the emergence of cybercrime as a significant challenge for law enforcement agencies globally. Cybercrime acts have left a considerable dent on criminal activities and nowadays that we are halfway into the subsequent technological era stands as one of the most crucial issues for law enforcement agencies all around the globe. The aim of this work is to discuss the relationship between cybercrime and organized crime and the importance of OSINT within criminal investigations in supporting law enforcement itself. Particularly, due to …


The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby Dec 2023

The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby

Cybersecurity Undergraduate Research Showcase

The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …


The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz Dec 2023

The Analysis And Impact Of Artificial Intelligence On Job Loss, Ava Baratz

Cybersecurity Undergraduate Research Showcase

This paper illustrates the analysis and impact of Artificial Intelligence (AI) on job loss across various industries. This paper will discuss an overview of AI technology, a brief history of AI in industry, the positive impacts of AI, the negative impacts of AI on employment, AI considerations that contribute to job loss, the future outlook of AI, and employment loss mitigation strategies Various professional source articles and reputable blog posts will be used to finalize research on this topic.


Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell Dec 2023

Lip(S) Service: A Socioethical Overview Of Social Media Platforms’ Censorship Policies Regarding Consensual Sexual Content, Sage Futrell

Cybersecurity Undergraduate Research Showcase

The regulation of sexual exploitation on social media is a pressing issue that has been addressed by government legislation. However, laws such as FOSTA-SESTA has inadvertently restricted consensual expressions of sexuality as well. In four social media case studies, this paper investigates the ways in which marginalized groups have been impacted by changing censorship guidelines on social media, and how content moderation methods can be inclusive of these groups. I emphasize the qualitative perspectives of sex workers and queer creators in these case studies, in addition to my own experiences as a content moderation and social media management intern for …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston Apr 2023

Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston

Cybersecurity Undergraduate Research Showcase

Cybersecurity methods, strategies, and programs for protecting computers and electronic devices have become critically important in all aspects of the technological infrastructure. However, while this is a vastly growing field that has a large workforce, it suffers from a lack of representation, specifically for Black/African American females. This study examines the barriers that prevent Black women from having representation within the cybersecurity workforce and solutions that address them. Some barriers noted include a lack of role models and resources, historical discrimination and systemic barriers, and cultural norms. Additionally, implications created by these barriers include less diversity, a lack of career …


Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams Apr 2023

Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams

Cybersecurity Undergraduate Research Showcase

This essay serves as a proposal for new technology and mitigation against the scamming of marginalized individuals (i.e., those over the age of 65). Research supports this outline, giving background to the types of scams, and prevention strategies currently seen in the cybersecurity landscape. It is evident that the methods we currently use to combat scamming attacks are not effective, therefore, I propose a new solution. This proposed telecommunications strategy is necessary to prevent scamming of all internet users, no matter the device. This telecommunication strategy would use artificial intelligence and machine learning to constantly improve its detection over time, …


A Qualitative Analysis Of The Relationship Between Cyberthreats And Democratic Backsliding, Amy I. Browning Apr 2023

A Qualitative Analysis Of The Relationship Between Cyberthreats And Democratic Backsliding, Amy I. Browning

Cybersecurity Undergraduate Research Showcase

Interstate conflict has developed beyond conventional tactics to include the cyber realm, making cybersecurity a key component of international relations and an integral part of state defense plans. Research in international security has included the analyses of the relative success or failures of particular cyberattacks. However, the instigators behind these attacks receive comparatively little attention, leaving a gap in knowledge for when, why, and where cyberthreats are likely to emerge. Recent analysis has found that democratic institutions are likely to hinder state-sponsored cyberattack initiation. A consideration that the latest wave of global democratic backsliding could be fueling cyberthreats must be …


Cybersecurity Workforce Development In Nigeria: Transforming The Cybercrime Gangs Into Cybersecurity Specialists, Olohi Favor Anteyi Apr 2023

Cybersecurity Workforce Development In Nigeria: Transforming The Cybercrime Gangs Into Cybersecurity Specialists, Olohi Favor Anteyi

Cybersecurity Undergraduate Research Showcase

This paper addresses the issue of cybercrime in Nigeria and the possibility of creating a cybersecurity workforce development program for cyber criminals to develop their skills for the cybersecurity profession, which may facilitate Nigeria’s economic development.


Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr Apr 2023

Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr

Cybersecurity Undergraduate Research Showcase

According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).

The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …


How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson Apr 2022

How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson

Cybersecurity Undergraduate Research Showcase

As technology has evolved greatly in the twenty-first century alone, younger generations have had an opportunity to grow up with devices at their fingertips none have ever before. This accessibility has strengthened their ability of quick use, skill, and a strong feeling of comfort with using and having access to technology. There seems to be more children with access to the internet than there are without, but there is also an ongoing issue behind the screens.


Digital Forensic Investigation, Dejuan Green Jan 2022

Digital Forensic Investigation, Dejuan Green

Cybersecurity Undergraduate Research Showcase

Finding, acquiring, processing, analyzing, and reporting data on electronically stored data is the main goal of the forensic science discipline known as "digital forensics." Nearly all illegal acts include the use of electronic evidence, making digital forensics support essential for law enforcement investigations. Furthermore, digital forensics is very important to cases aiding in many cases and can lead to saving lives/ victims and locking up criminals. A wide range of devices, including laptops, cellphones, remote storage, unmanned aerial systems, shipborne equipment, and more, can be used to gather electronic evidence. [2] Digital forensics' major objective is to take data from …


Deepfakes: Ai Technology Of The Future, Hosanna Root Jan 2022

Deepfakes: Ai Technology Of The Future, Hosanna Root

Cybersecurity Undergraduate Research Showcase

Deepfakes technology’s danger stems from its ability to create realistic but fake synthesized media that people often identify as something that is real. With this powerful technology in the wrong hands, deepfakes can cause devastating havoc through information warfare, election campaign disruptions, and more, creating distrust in society. Disinformation is already rampant today, even without wide deployments of deepfakes, which is concerning given the fact that deepfakes’ nefarious full potentials are yet to be reached.


Writing Towards Radicalism: On Biased Reporting & Its Effects On U.S. Extremism, Martha Tyler Jan 2022

Writing Towards Radicalism: On Biased Reporting & Its Effects On U.S. Extremism, Martha Tyler

Cybersecurity Undergraduate Research Showcase

Perceived influxes in biased reporting, disparities in reporting versus reality, and other factors have led many Americans to question the legitimacy of their most-frequented sources. These sentiments have encouraged migration from traditional sources to alternative ones, exposing many Americans to polarizing media. This report argues that unaddressed inadequacies in reporting force Americans to contend with a distorted reality or try their luck on the path toward alternative media.


Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm Jan 2021

Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm

Cybersecurity Undergraduate Research Showcase

With computers being a standard part of life now with the evolution of the internet, many aspects of our lives have changed, and new ways of thinking must come. One of the biggest challenges in most cyber security problems is not related to the software or the hardware; it is the people that are using the computers to access the data and communicate with others, where the hackers could simply find a weak entry point that naturally exists and a weak link caused by human hands. The human factor as an “insider threat” will affect unauthorized access, credentials stealing, and …


Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson Jul 2020

Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson

Cybersecurity Undergraduate Research Showcase

Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …


The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes Jan 2020

The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes

Cybersecurity Undergraduate Research Showcase

This report examines the advantages and disadvantages associated with the growth of technology within the United States, specifically how technology, digital literacy, and cybersecurity can be used to both facilitate and combat sex trafficking and sexual exploitation on the Internet. The first part of the report addresses trafficking statistics in the United States, as well as legal intervention the country has taken against this epidemic, including an explanation of the Trafficking Victims Prevention Act and the FOSTA-SESTA bill. The second part of the report addresses the online recruitment of buyers and sellers, as well as how the use of open-source …


Accessibility Of Deepfakes, Andrew L. Collings Jan 2020

Accessibility Of Deepfakes, Andrew L. Collings

Cybersecurity Undergraduate Research Showcase

The danger posed by falsified media, commonly referred to as deepfakes, has been well researched and documented. The software Faceswap to was used to swap the faces of two politician (Joe Biden and Donald Trump). The testing was performed using an affordable consumer GPU (an AMD Radeon RX 570) over 100,000 iterations. The process and results for the two attempts with the best results (and largest differences) were recorded. The result was ultimately unconvincing, while the software was able to recreate the facial structure the lighting and skin tone did not blend at all.