Nicholson, J., Marcum, C., & Higgins, G. E. (2023). Prevalence and Trends of Depression among Cyberbullied Adolescents–Youth Risk Behavior Survey, United States, 2011–2019. International Journal of Cybersecurity Intelligence & Cybercrime, 6(1), 45-58.) The article “Prevalence and Trends of Depression among Cyberbullied Adolescents–Youth Risk Behavior Survey, United States, 2011-2019” looks at the connection between cyberbullying and depression in…
Article review 1
AbdulAmeer, S. A., Saleh, W. R., Hussam, R., Al-Hareeri, H., Alghazali, T., Mezaal, Y. S., & Saeed, I. N. (2022). Cyber Security Readiness in Iraq: Role of the Human Rights Activists. International Journal of Cyber Criminology, 16(2), 1-14 The article “Cyber Security Readiness in Iraq: Role of the Human Rights Activists” looks at the cybersecurity framework’s preparedness…
Career Paper
Cyber Threat Analysts To remain ahead of the curve and protect our networks and data as the subject of cybersecurity evolves, it is becoming more vital for professionals in the industry to have a solid grounding in social science research and ideas. Cyber threat analysts, one branch of cybersecurity professionals, need extensive training in social…
J6.
Fake websites are created by scammers to make you share sensitive information or buy products that really don’t exist. A lot of scammers use bank’s login pages to trick you or pop ups that want you to download things. PayPal is one scammers use, they try to get you by using the same login page….
J4.
Physiological needs is needing food, water, warmth and rest. Esteem needs deals with feeling accomplished so my situation with technology would be using instagram for my business and being comfortable posting content and trying to bring in clients. Belongingness and love needs are intimate relationships and friends, I’d say using FaceTime or zoom to interact…
J2.
Cybersecurity is a broad category, it deals with technology and other uses to protect computer networks and data from anything harmful. Everybody throughout this field, even the government use science to create and build cybersecurity knowledge. Cybersecurity calls for knowledge to explore and reason the how and why people build security controls. The principles of…