Only Cite From The Given Article You Have To Complete The Fo

Only Cite From The Given Articleyou Have To Complete the Following Two

Only cite from the given article you have to complete the following two readings: [1] Scott Shakelford, Should cybersecurity be a human right? In The Conversation, February 2017. Available at: (Links to an external site.) [2] Arun Vishwanath, Cybersecurity’s weakest link: humans. In The Conversation, May 2016. Available at: and submit to Canvas, before class starts, short answers to the following questions (more than 100 words per question): 1. What is the main point of reading #1? 2. What is "social engineering" in the context of cybersecurity? (This question relates to reading #2.) 3. What is the main contribution of the SCAM model (Suspicion, Cognition, Automaticity Model) proposed by the author(s) of reading #2?

Paper For Above instruction

The primary objective of the first reading by Scott Shakelford is to argue that cybersecurity arguably should be regarded as a fundamental human right. Shakelford contends that as digital technologies increasingly permeate every aspect of daily life, protecting individuals’ digital information becomes essential to safeguarding their privacy, security, and autonomy. The article emphasizes that access to secure digital environments is crucial for individuals’ participation in modern society, provoking the notion that cybersecurity is not just a technical matter but a human rights issue. Moreover, Shakelford discusses the moral and legal imperatives for recognizing cybersecurity as a human right, especially considering how vulnerable populations are disproportionately exposed to cyber threats. Recognizing cybersecurity as a human right would obligate governments and organizations to prioritize measures that defend individuals' digital security, fostering equitable digital inclusion and reducing vulnerabilities.

In the second reading by Arun Vishwanath, "social engineering" refers to manipulative tactics employed by cybercriminals to deceive individuals into revealing confidential information or unwittingly performing actions that compromise cybersecurity. This form of manipulation exploits human psychology, often involving deceitful communication such as phishing emails, fake websites, or pretexting phone calls designed to appear trustworthy. Vishwanath emphasizes that social engineering attacks are effective because they target the weakest link in cybersecurity—humans—not necessarily the technological defenses. The article highlights that understanding the methods of social engineering is crucial to develop better defensive strategies and awareness to prevent successful breaches.

The SCAM model, proposed by Vishwanath in the second article, delineates a cognitive framework explaining why individuals fall victim to social engineering attacks. The model stands for Suspicion, Cognition, and Automaticity. The main contribution of this model is its explanation of how automatic cognitive processes often interfere with suspicion and critical assessment when individuals encounter potentially malicious stimuli. It posits that humans tend to automatically process information in a manner that favors trust, often leading to less vigilant responses in the face of social engineering tactics. The SCAM model underscores the importance of awareness and training to foster more deliberate cognitive responses, ultimately strengthening defenses against social engineering threats by reducing automatic trust responses and encouraging conscious suspicion and assessment.