Picture 1. When using computers in public places, make sure to use a screen protector to protect from prying eyes afar, especially if you are conducting financial transactions or using personal information. Being aware of who’s watching you and what they can see, will minimize the theft of information. Picture 2. If your personal devices…
Journal Entry #6 – Can spot three fake websites and compare them to three real websites, plus showcase what makes them fake?
Fake websites are increasingly harder to tell apart from real websites as hackers get more knowledgeable and proficient at reproduction. Fake websites are created to obtain sensitive data illegally like usernames, passwords, or credit card information before an individual realizes that the site is not legitimate. Some of the ways to identify fake websites from…
Article Review #1: Do You Love Me? Psychological Characteristics of Romance Scam Victims
Article Review: Do You Love Me? Psychological Characteristics of Romance Scam Victims Whitty M. T. (2018). Do You Love Me? Psychological Characteristics of Romance Scam Victims. Cyberpsychology, behavior and social networking, 21(2), 105–109. https://doi.org/10.1089/cyber.2016.0729 The article, “Do You Love Me? Psychological Characteristics of Romance Scam Victims”, by Monica Whitty focused on the psychological characteristics of…
Journal Entry #5 – Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
Entertainment – 5 Political – 3 Revenge – 6 Boredom – 7 Recognition – 4 For Money – 1 Multiple Reasons – 2 After reading each article based on its respective motivation, I have ranked the motives from most sense to least sense as follows: Money, Multiple Reasons, Political, Recognition, Entertainment, Revenge, and Boredom. The…
Journal Entry #4 – Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Maslow’s Hierarchy of Needs is a five-tier theory created by Abraham Maslow in 1943. The hierarchy of needs theorizes that there are five stages of human needs that motivate how we behave and as we successfully achieve one stage, we ascend to the next stage and so forth until we reach the fifth and final…
Journal Entry #3 – Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.
PrivacyRights.org is a non-profit organization that collects information regarding data breaches that have occurred in the United States since 2005. They make this information public knowledge to keep everyone in the know in case companies and organizations fail to disclose data breaches as they are legally obligated to and to make you aware that individual…
Journal Entry #2 – Explain how the principles of science relate to cybersecurity.
Cybersecurity is an interdisciplinary study of the social sciences as it relates to technology uses and practices. Robert Bierstedt’s argument that social sciences adhere to the same principles as the natural sciences, makes the principles of science also relate to cybersecurity through the Social Science perspective. The principles of science are Relativism, Objectivity, Parsimony, Skepticism,…
Journal Entry #1 -Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
According to the National Initiative for Cybersecurity Careers and Studies (NICCS), The NICE Workforce Framework is a nationally focused resource to help employers develop their cybersecurity workforce. It breaks the cybersecurity workforce into seven categories: Analyze, Collect and Operate, Investigate, Operate and Maintain, Oversee and Govern, Protect and Defend, and Securely Provision. As my experience…