Journal 12

This sample data breach notification relates to several economic theories and psychological sciences. Companies tend to prioritize their image over all else because how they make money has everything to do with marketing. This is where the theories of Rational Choice and Laissez-Faire come into play. The Rational Choice Theory is part of the reason…

Feedback Reflection

I got a lot of positive feedback on my research paper. They enjoyed my paper as a whole, especially my hook of “our planet is dying faster than ever before,” and I am happy that they found it to be a pleasant read. The biggest piece of feedback that I received was to expand on…

Journal Entry 11

The job of a cybersecurity analyst is an entry-level position that you can find in most companies. It requires an understanding of cybersecurity and social sciences in order to best monitor the network and defend against cyber attacks such as phishing attacks. Unlike other careers, since cybersecurity has so many job positions and so little…

Journal Entry 10

The article discusses the increasing significance of social cybersecurity in modern times. It states that technology is able to manipulate the global marketplace of beliefs and ideas at a rapid pace. I would have to agree given how technology becomes more and more ingrained into people’s everyday lives. We cannot look at technology and sociology…

Blog Entry 4: Citation Practice

Han, Sangwon, and Joon Young Choi. “Impact of 18F-FDG PET, PET/CT, and PET/MRI on Staging and Management as an Initial Staging Modality in Breast Cancer: A Systematic Review and Meta-Analysis.” Clinical Nuclear Medicine, vol. 46, no. 4, 2021, pp. 271-82. Clinical Nuclear Medicine, https://doi.org/10.1097/RLU.0000000000003502. Accessed 26 February 2025. Ramos‐Torres, Karla. “Common Anesthetic Used in Preclinical…

Changing Views: Space Exploration

When I was younger, I was fascinated by space exploration. I thought the Space Race was the coolest thing to happen in human history and really thought that the government should’ve been putting more effort into getting more humans on the moon and perhaps even further into space. I was always so disappointed that I…

Journal Entry 3

The information on PrivacyRights.org can be used by researchers to study many things to help prevent breeches. Information on what kind of attacks are happening most often can motivate researchers to create and test more software and preventative measures to stop them. The information can also be used to study which people are most at…

Journal Entry 2

Empiricism, Objectivity, Determinism, and Parsimony all relate to cybersecurity and each other in their own way. Empiricism ensures scientists do not use hunches or personal opinions while researching. This is important in cybersecurity experiments because most of its experiments are made in cyberspace which can be difficult for an average social scientist to immerse themselves…

Journal Entry 1

I would like to work in the protect and defense area in my future career. It’s quite literally what I imagine when I hear the word cybersecurity. As time goes on I have become increasingly aware and suspicious of the collection of data. Investigation also seems like something I would enjoy. I really enjoy learning…

Research Areas & Potential Questions

One of the areas I’m interested in researching is ocean pollution. Living on the beach for my entire life has given me a deep appreciation for the ocean and its creatures. One of the research questions I’m considering is “do military bases and ports cause significant damage to the surrounding marine environment?” My opinion on…