Article Review #2
Article Review #1
Ranking of Motives – Journal Entry 5
Review the articles linked with each individual motive in the presentation page or Slide #3. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
Read more "Ranking of Motives – Journal Entry 5"Maslow’s Hierarchy of Needs – Journal Entry 4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of Needs five levels: Psychological Needs, Safety Needs, Belongingness and Love Needs, Esteem Needs, and Self-Actualization. Psychological Needs: Maslow identifies basic physical needs […]
Read more "Maslow’s Hierarchy of Needs – Journal Entry 4"Journal Entry 15
Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTubeLinks to an external site. Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. I think the speaker’s pathway was beautiful, and by […]
Read more "Journal Entry 15"Journal Entry 13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using […]
Read more "Journal Entry 13"Journal Entry 12
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter. Social Identity Theory and Social Network Theory can be applied. Social Identity Theory examines how people categorize themselves and others into social groups, influencing behavior and […]
Read more "Journal Entry 12"Journal Entry 11
Watch this videoLinks to an external site.. As you watch the videohttps://www.youtube.com/watch?v=iYtmuHbhmS0Links to an external site. Think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. The description of the cybersecurity analyst job intertwines with social behaviors, reflecting the evolving dynamics […]
Read more "Journal Entry 11"Summary of Article on Social Cybersecurity – Journal Entry 10
Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. The rise of social cybersecurity reveals a shift in warfare, where information manipulation becomes a primary battleground. Dmitry Kiselev’s assertion that “information wars” are the main type of conflict emphasizes the strategic power of […]
Read more "Summary of Article on Social Cybersecurity – Journal Entry 10"