Module 14 Journal

The career of digital forensics investigators relates to social sciences in severalimportant ways, because their work doesn’t just involve analyzing data and technology;it also requires understanding human behavior, motivation, and societal context. Themost significant aspect, in my opinion, is that investigators often rely on psychologicaltheories to interpret digital evidence and help profile cybercriminals, which aids…

Module 12 Journal

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a journal entry. In this article the author outlines eleven online activities that people do online that theymight not know is illegal. Same of these things include torrenting/pirated media,cyberbullying, stealing someone’s identity, and illegal searches,…

Module 8 Journal

Watch these videos and pay attention to the way that movies distort hackers. After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity. Has this understanding changed over time? What is different in the older pieces of media vs. more current media? After watching the videos…

Module 6 Journal

https://www.youtube.com/watch?app=desktop&v=6BqpU4V0YpkWe have many misconceptions about cybersecurity. Here, hackers tell you about some of our misconceptions. What personal misconceptions did you have before you started to study cybersecurity? Have those been proven right or wrong? As I watched the video on common misconceptions in cybersecurity, it reminded me of when I watched movies about hacking as…

Module 5 Journal

Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. 1. Multiple Reasons—To me, this motive makes the most sense becausecybercriminals…

Module 4 Journal

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of Needs is a psychological theory that outlines five levels of humanneeds, from basic survival to self-actualization. The first level consists of physiologicalneeds,…

Module 3 Journal

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? What branch or branches of social science do you think would benefit the most from a site hosting this information? Researchers can utilize this site as a comprehensive resource to study data breaches from acrossthe…

Module 2 Journal

Define each of the principles of science in your own words. Then, give an exampleof how each of the principles relates to cybersecurity. RelativismThe principle of relativism in philosophy says that truth or moral values are not definitive. It alldepends on the context, culture, or perspective. In relation to cybersecurity this means thatpolicies, risk decisions,…