Week 5: Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.

The motive that makes the least sense is boredom because I feel that boredom alone isn’t enough to commit cybercrimes and that there should be more motivation. At #6 is recognition because compared to the rest of the motives, the consequences compared to wanting recognition outweigh the gain. Meanwhile at #5, entertainment is similar to…

Week 4: Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

Maslow’s Hierarchy of Needs visualizes the hierarchy of needs all humans have. The pyramid-shaped diagram places psychological, safety, belongingness, esteem, and self actualization needs on it beginning with psychological needs at the bottom and self actualization needs at the top. As bottom-level needs are met, humans focus on meeting their needs moving up the pyramid….

Week 3: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

On PrivacyRights.org, I found information on data breaches regarding reports and laws and contains a chronology that dates all the way back to 2005. Despite the abundance of reports on PrivacyRights.org, these are only the incidents that have been made “publicly available by government entities”. They state that it is not a complete record of…

Week 2: Explain how the principles of science relate to cybersecurity.

The principles we learned about in Module 2 are relativism, objectivity, parsimony, empiricism, skepticism, ethical neutrality, and determinism. Relativism states that all things are related and this ties into cybersecurity because of the interdisciplinary nature of the study. Objectivity encourages researchers to conduct research from an unbiased perspective which is necessary when cybersecurity researchers study…

Week 1: Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

There are many different areas within the NICE Workforce Framework, but the one that I am especially most interested in is the Investigation (IN) category. This category is composed of Cybercrime Investigation as well as Digital Evidence Analysis. I am very intrigued by the idea of investigating incidents within cyberspace as well as gathering and…

Journal #8: How can you tell if your computer is safe?

A boom in the technology industry over the past decades has led to a current widespread growth and use of computers. There are many methods for ensuring the safety of our computers, but a few areas that can be secured to increase the safety of computers are authentication and authorization. Authentication is making sure that…

Journal #11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

With the evolution of technology continuously on the rise, more and more of our every day interactions from big to small are connected to technology. Likewise, the growth of technology has also led to a growth in several other different types of crime. This relationship between technology and crime is quickly developing and our understanding…

Journal #7: What are the costs and benefits of developing cybersecurity programs in business?

With technology constantly evolving and on the rise, uneducated businesses are constantly a target for cyber incidents. There are many cybersecurity companies that sell products and services related to cybersecurity. Many of these products and services are anti-virus software, technological solutions, secure hardware, cloud security solutions, security platforms, breach detection services, data analytics, and data…

Journal #6: How has cyber technology created opportunities for workplace deviance?

Even though the rise of technology has provided opportunities for businesses to grow, it has equally made businesses more susceptible to cyber attacks. Increases in information technology applications has also increased the vulnerability to cyber attacks. The rise of cyber technology has made it easier for workplace deviance to occur and harder for there to…