Skip to content
azariahpugh
Azariah D. Pugh
Menu
About Me
Resume
Skills
Experience
Awards and Recognitions
IDS 493
Cybersecurity Foundations
CYSE 300
CYSE 301
ECE 416
ECE 419
Tech & Society
201s
Journal Entries
The Ethical and Social Dimensions of Cybersecurity Violations
Bug Bounty Policies
How different Economic and Pyschological theories relate to a scenario
Cybersecurity analyst job relations to social behaviors
My input on Social Cybersecurity
Media Influences on Cybersecurity
Explaining how my memes relate to Human-centered Cybersecurity
Spotting Differences between real and fake Websites
My Personal Ranking of Cybercrime Motivations
Maslow’s Hierarchy of Needs and Examples
How Researchers use information on Data breaches
How Principles of Science Relate to Cybersecurity
NICE Workforce Framework for Cybersecurity (NICE Framework)
Social Media Disorder Post
Digital Forensics Relating to Social Sciences
Article Reviews
Article Review #1: [“The Social Impact of Cybercrimes: Unveiling the Threats of Data Breachesand Cyberbullying”]
Article Review #2: Cybercrime and Society – A Multidisciplinary Exploration
Career Paper
The Role of Social Science in Cybersecurity Analysis
IT/CYSE 200T
Home Page
Law & Ethics
CRJS 405
CYSE 406
PHIL 355E
Internship
CYSE 368
Cybersecurity Applications
CYSE 407
CYSE 494
Contact
Azariah D. Pugh
201s
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
Accept