Journal 14

There are many common illegal actions that people do on the internet knowingly and unknowingly. A lot of the time people may not know that a certain action is illegal, and if they do know, then they might not think it’s very serious. I believe that the five most serious violations on this list are…

Blog: Remix Ideas

For the rhetorical situation remix of my paper on the negative effect of tourism, I have chosen to make a PowerPoint presentation to convince investors to give me funding to address this issue. However, to make my case as convincing as possible, I will be focusing more on the economic benefits that tourism has on…

Journal 13

The article discusses the efficiency and practicality of using “bug bounties.” That is when companies and organizations of all sizes can pay freelance cybersecurity researchers to find and explain the vulnerabilities in their systems, promoting safer and more cost-effective cybersecurity practices. The study shows that using bug bounty hunters is more effective and cost-efficient than…

Journal 12

This sample data breach notification relates to several economic theories and psychological sciences. Companies tend to prioritize their image over all else because how they make money has everything to do with marketing. This is where the theories of Rational Choice and Laissez-Faire come into play. The Rational Choice Theory is part of the reason…

Feedback Reflection

I got a lot of positive feedback on my research paper. They enjoyed my paper as a whole, especially my hook of “our planet is dying faster than ever before,” and I am happy that they found it to be a pleasant read. The biggest piece of feedback that I received was to expand on…

Journal Entry 11

The job of a cybersecurity analyst is an entry-level position that you can find in most companies. It requires an understanding of cybersecurity and social sciences in order to best monitor the network and defend against cyber attacks such as phishing attacks. Unlike other careers, since cybersecurity has so many job positions and so little…

Journal Entry 10

The article discusses the increasing significance of social cybersecurity in modern times. It states that technology is able to manipulate the global marketplace of beliefs and ideas at a rapid pace. I would have to agree given how technology becomes more and more ingrained into people’s everyday lives. We cannot look at technology and sociology…

Blog Entry 4: Citation Practice

Han, Sangwon, and Joon Young Choi. “Impact of 18F-FDG PET, PET/CT, and PET/MRI on Staging and Management as an Initial Staging Modality in Breast Cancer: A Systematic Review and Meta-Analysis.” Clinical Nuclear Medicine, vol. 46, no. 4, 2021, pp. 271-82. Clinical Nuclear Medicine, https://doi.org/10.1097/RLU.0000000000003502. Accessed 26 February 2025. Ramos‐Torres, Karla. “Common Anesthetic Used in Preclinical…

Changing Views: Space Exploration

When I was younger, I was fascinated by space exploration. I thought the Space Race was the coolest thing to happen in human history and really thought that the government should’ve been putting more effort into getting more humans on the moon and perhaps even further into space. I was always so disappointed that I…

Journal Entry 3

The information on PrivacyRights.org can be used by researchers to study many things to help prevent breeches. Information on what kind of attacks are happening most often can motivate researchers to create and test more software and preventative measures to stop them. The information can also be used to study which people are most at…