Article Review # 1 Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students

Brittney DavisCYSE 201SFebruary 21, 2025 Article Review #1: Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students Introduction The article “Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students” covers the effects of cyberbullying and its correlation to suicidal thoughts among Jordanian students. The article also examines the psychological impact of cyberbullying on mental health and its…

Journal Entry #2

Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. In what ways can researchers utilize thisinformation to analyze data breaches? The website Privacyrights.org offers insight into data breaches that have occurred nationwide and their impact. It also offers resources, advocacy, and law information that can be utilized to protect sensitive information. The…

What benefit can organizations gain from using the NIST Cybersecurity Framework, and how would you use it in your future workplace?

The Nist Framework benefits many organizations because it provides them with the tools to identify, evaluate, and diminish threats, improving their risk management protocols. The Framework is easy to understand, adaptable, and flexible enough to be incorporated throughout an organization. There are also a few core functions within the framework that an organization should follow…

The Principles of Science and Their Correlation to Cybersecurity

The foundation of the natural and social sciences is built on seven principles: Relativism, Objectivity, Parsimony, Empiricism, Ethical Neutrality, and Determination. The principle of Relativism is the concept that all things are related. Regarding cybersecurity, an example of Relativism is understanding that technological advancements will influence changes to the economy, policy-making, societal norms, and social…