Prompt: Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. Disclaimer: This post is a response to the above journal…
Author: abowl007
Journal 4
Prompt: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. One way technology helps fulfill my physiological needs daily is through supply chain management. Technology impacts supply chain management in several ways, such as…
Journal 3
Prompt: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? One way researchers could use this information is to identify which industries cybercriminals are most interested in attacking. For instance, the data on this website shows that the medical industry has reported…
Journal 2
Prompt: Explain how the principles of science relate to cybersecurity. The six scientific principles discussed in module 2 of this course are as follows: relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. Each of these six principles can be used to impact cybersecurity meaningfully. For instance, there are several ways that relativism can be used…
Journal 1
Prompt: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. After reviewing the NICE Workforce Framework, I am most interested in a career under either the “Operate and Maintain” or “Protect…