His pathway to a forensics career is unexpected by him. As he became an accountant, he also became fascinated with technology and managing the IT department. When he is offered a chance at a new career in a digital forensic team, he tries to get the opportunity. When he does the job for many years,…
Journal 13
The routine activities theory illustrates that everyday activities contribute to a cyberattack. In the pandemic, more people was going online to do shopping and find deals on the internet. When the social media boom increased during the pandemic, so did spending on ads. These two factors can make people easily susceptible to fraud on the…
Journal 12
I completed the survey. I am on the safe side because I hardly experience cyberbullying in my life. A lot of the questions are focused on getting specific and evaluating whether a person has encountered cyberbullying or not. With the scale, there are only four options: never, once, a few times, and many times. Some…
Journal 11
The most serious violations that can happen is using copyrighted images, using torrent services, collecting information about children, bullying and trolling, and faking your identity online. Using copyrighted images means that someone takes an image that is owned by another person and claim it as his/her own. It is very illegal because the person can…
Journal 10
The cybersecurity analyst job is one that is constantly changing and evolving with the times. As new technologies are developed, the need for people who can protect these systems from cyber-attacks grows. In this presentation, we learn about some of the social behaviors that are important for someone in this career field. One theme that…
Journal 9
While technical in nature, social cybersecurity differs from traditional cybersecurity. Traditional cybersecurity involves humans using technology to “hack” technology. The target is information systems. Social cybersecurity involves humans using technology to “hack” other humans. The targets are humans and the society that binds them. This twist on the traditional cyber paradigm is sometimes referred to…
Journal 8
I completed the social media disorder scale. The findings were not shocking because I do not use social media too much. I only had one yes on the questions and that was related to using social media to procrastinate on homework. Regarding the other items on the scale, they are more extreme and does prove…
Journal 7
These pictures can be memes that represent the Human Systems Integration. The first image represents the readability of the text. If the font is too small, the person has to look closer in order to see the details. This is bad because people should not need to zoom in to read the text. Now, the…
Journal 6
It can be hard to distinguish between fake and real websites. Most people do not notice the small details that are wrong and assume that their site is protected by HTTPS. However, some websites can use HTTPS and not be secure for other reasons. If three fake websites were created, here are some ways to…
Journal 5
Here are my ratings. First is multiple reasons. Second is money. Third is recognition. Fourth is revenge. Fifth is political. Sixth is entertainment. Seventh is boredom. I rate multiple reasons as first because many motives can be interlinked, so someone who wants recognition and money can achieve both at the same time from cyber offending….