Category: Uncategorized

Journal Entry 14

This article identifies 11 unknowing internet activities that violate legal codes on the web. The most serious illegal activities online include content piracy of music movies and software because they violate copyright laws and might result in substantial fines or legal action. Online identity fraud constitutes a serious violation that might result in theft and fraud charges. Illegal consequences result… Read more →

Journal Entry 13

This paper analyzes bug bounty programs through data from HackerOne to build an economic model describing their operating efficiency. Research in the article traces bug bounty program historical development while demonstrating how these programs connect corporate entities to ethical hackers. The programs enable organizations to detect weaknesses through economic compensation of hackers who align their financial objectives. The article presents… Read more →

Journal Entry 12

Two economic theories explain the analysis of the data breach letter. Cost-Benefit Analysis (CBA) enables the company to make the decision to warn its customers about the breach because the possible long-term costs outweigh immediate notification costs even though misuse is unconfirmed. Providing notification to customers allows the company to prevent long-term expenses from increasing because of reputation harm and… Read more →

Journal Entry 11

The video of Nicole Enesse explains that cybersecurity analysts function within a social environment because human behaviors remain essential factors. The video main focus explores security analyst relationships with non-technical staff members because adequate training and communication remain vital for stopping breaches due to personnel mistakes. These attacks target people who trust others leading to phishing incidents because user awareness… Read more →

Journal Entry 10

Through a study by Lt. Col. David M. Beskow and Dr. Kathleen M. Carley the authors analyze how social media along with digital platforms serve as platforms for waging misinformation campaigns as well as disinformation campaigns and influence tactics. The article shows how hostile forces use social network environments to reshape public sentiment while making communities unstable while threatening national… Read more →

Journal Entry 10

The scale components use, allow the identification of behavioral addiction-related symptoms such as maintaining addictive behavior under control and concealing usage-related information and social media behavior as a method for emotional stress relief. The assessment tool successfully pins down possible problems but provides no indication of whether users are deeply addicted or simply intense users. Individuals who rely on social… Read more →

Journal Entry 8

“Hacker Rates 12 Hacking Scenes in Movies & TV” provided insights into the inaccurate ways hacking appears on entertainment media. The entertainment industry demonstrates hacking through rapid keyboard typing which immediately leads hackers to breach firewalls and obtain confidential classified data. The excessive representation of cybersecurity incorrectly presents how the practice operates in real-life activities. Real hacking operations demand extensive… Read more →

Journal Entry 7

This meme humorously highlights inefficiencies in workplace communication, which directly relate to Human Systems Integration (HSI). HSI focuses on optimizing interactions between people, technology, and organizational processes to improve productivity and reduce unnecessary workload. The image depicts a long meeting with disengaged participants, suggesting that the content could have been conveyed more efficiently via email. This aligns with the HSI… Read more →

Journal Entry 6

I’ve identified additional three fake website cases alongside their true counterparts. Users are drawn in by “www.ebay-deals.com” which represents a fake eBay website that promotes suspicious discount offers on common products. Such unauthorized websites duplicate eBay’s layout while demanding additional personal details like credit card information to “process the transaction.” Users can trust the authentic eBay website because it maintains… Read more →

Journal Entry 5

For Money (Rank 1)Financial gain stands as the basic and most popular reason that drives individuals to engage in cybercrimes. The direct extraction of funds through theft and fraud together with extortion drives these cybercriminals to their profitable ends. Revenge (Rank 2)The intense emotional drive to seek revenge establishes itself as a frequent cause which motivates criminal activities especially within… Read more →