Victim and Offender

Technology creates a considerable overlap between victim and offender interactions and changes the way they interact. Because of technology it has allowed offenders to move to different modes of crimes. The new forms of crimes are digitized whilst the old one were not. Victims and offenders share risk factors like low self-control, routine activities or…

Alanna

Something someone who searches my name up would find out is that it is derived from an old high German word that mean precious child. In Gaelic Alanna means serenity or beauty. Also, it is the name of a book a young adult series named The Song of the Lioness. There are also several celebrities…

Computers and safety

Because of the progression of computers there has been an improvement in the safety mechanisms that are used for our devices and home security. Technologies have data encryptions in computers help keep important information for the owners eyes only. There are several different apps and and tech that you can buy and download that can…

Cost benefits and safety

Cyber security setups are a necessity for starting a business because it protects important information that is being stored and transported throughout a company’s networking system. In fact, about 40% of companies claim that cybersecurity is and will continue to be the top priority in their budget allocation for technology reporting (Eisenstein 2020). This is…

Cyber tech and workplace deviance

The rise of the inclusion of technology in the workplace has created a variety of complications. A very prominent problem that’s been observed is that because technology is rapidly progressing and quick becoming more of a necessity in societies daily lives it makes it more difficult to find the individuals that are performing harmful acts…

Ethics and risks

As technology becomes even more prominent in our society and used as a big part in many careers. Along with the many benefits that arise with its upcoming such as, having information in digital format make the data more accessible, improves the quality of the data, and it also decreases the costs. However as beneficial…

Major

My major relates to this class because my major is computer science. Cybersecurity is considered a subfield of computer science because people who go into the cybersecurity field need to have a deep understanding of many areas that are included in computer science. For example, analyzing and preventing data breaches and attacks, monitoring network systems,…