PROMPT: Explain how the principles of science relate to cybersecurity.The principles of science play a crucial role in understanding and addressingcybersecurity challenges. In studying cybersecurity as a social science, we must always adhereto the scientific principles of relativism, objectivity, parsimony, ethical neutrality, anddeterminism. Relativism can be understood to mean that all things are related. From…
Journal 3
PROMPT: Visit PrivacyRights.org to Links to an external site. see the types of publiclyavailable information about data breaches. How might researchers use this information tostudy breaches?Data breach has become a pressing concern for individuals, businesses and policymakers.Publicly available information on data breachers serves as a valuable resource for researchersseeking to understand and analyze the impact…
Journal 4
Review Maslow’s Hierarchy of Needs and explain how each level relates to yourexperiences with technology. Give specific examples of how your digital experiences relateto each level of need.Maslow’s Hierarchy of needs is a psychological theory proposed by Abraham Maslow in1943 which suggests that human motivation is based on fulfilling a hierarchy of needs, startingfrom the…
Journal 5
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as themotives that you think make the most sense (being 1) to the least sense (being 7). Explainwhy you rank each motive the way you rank it.I would say that committing cyber crime for money makes the most sense because…
Journal 6
human centered cybersecurity because that is what specialists do in their day to day job. Thesecond photo shows a room filled with people listening to a person presenting a presentation. Iput that caption because if I was in this situation I would want to go to sleep. This type ofenvironment seems like a place that…
Journal 7
Basil OgbomohPrompt:After watching the video, write a journal entry about how you think themedia influences our understanding about cybersecurity. Has this understandingchanged over time? What is different in the older pieces of media vs more currentmedia?Media is one of the biggest influences in our day to day life. Media can change away someone thinks and…
Journal 8
PROMPT: Complete the Social Media Disorder scaleLinks to an external site.. How didyou score? What do you think about the items in the scale? Why do you think thatdifferent patterns are found across the world?Before reading the scale I believe that I do not have a social media disorder. I try to lowermy social media…
Journal 9
PROMPT: think about how the description of the cybersecurity analyst job relatesto social behaviors. Write a paragraph describing social themes that arise in thepresentation.Some social themes that arise in the presentation multiple times are cost ofliving, salary, certifications and networking. To get a job you need to understand thatwhere you live can have an impact…
Article review 2
Article 2 reviewhttps://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/186/68Cybercrime Laws in Iraq: Addressing Limitations for Effective GovernanceCybercrime happens in every country, but there are laws in place to try and detercybercrime from happening. Countries like Iraq do not have the policies in place to deter thesecrimes and the government is unstable. It is one of the most open and vulnerable in…
Article review 1
Article1 review:https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/214/81Mitigating Ransomware Risks in Manufacturing and the Supply chain: A comprehensiveSecurity FrameworkIt’s crucial for businesses to implement comprehensive security measures to protectthemselves against cyber threats. An organization’s security posture refers to the variouselements, including individuals, procedures, and technologies, that safeguard its informationsystems, data, and assets against cyber threats. A framework has been developed to…