Maslow’s Hierarchy of Needs and My Experience to Technology At the very bottom of Maslow’s Hierarchy we find physiological needs. This includes things like food, water, and warmth. I find technology involved in this due to need for technology when… Continue Reading →
How do researchers use information like PrivacyRights.org to study breaches? A scientist would you a website like this because they can view recent data breaches. Another pro to this website is that we can see registered data broker and the… Continue Reading →
Explain how the Principles of Science Relate to Cybersecurity Relativism applies to cybersecurity due to the giant impact of cyber technology in our digital age. We can see how the more technology we as a society obtain the more cybercrime… Continue Reading →
Are there certain areas of the NICE Workforce Framework that you would want to focus your career on? One thing that interested mean is cyber defense analysis. A cyber analysis uses defensive measures and information to identify, analyze, and report… Continue Reading →
Illegal Gambling and Its Operation via the Darknet and Bitcoin: an Application of Routine Activity Theory This article aims to contribute to criminology literature by applying the routine activity theory which states that crimes can occur when a suitable target,… Continue Reading →
© 2025 Alexander Gardner — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑