Here is my ranking of the individual motives for cybercrime from most sensible (1) to least sensible (7), along with explanations for each: Financial gain is the most logical and understandable motive for cybercrime. Many cybercriminals are motivated by the potential to make significant profits through activities like ransomware, fraud, and theft of financial data….
Category: Journal Entries
At different times during the semester, the professor will ask students to answer general questions related to cybersecurity through a social science lens. Students will answer the questions and then enter them in their ePortfolio. For instance, when discussing cybersecurity through a criminological lens, students might be asked to review articles linked with each individual motive. The student might be asked to rank the motives and explain the rationale. Or when discussing cybersecurity and psychology, students might be asked to watch an assigned video and then write a journal entry about how they think the media influences societal understanding about cybersecurity. The journal entries are meant to be opinion-type assignments, though the opinions should be supported with social science evidence. The table below shows the types of journal questions students will be asked to respond to throughout the semester and how they relate to the course learning outcomes.
Journal Entry 4
Physiological: Technology helps fulfill basic physiological needs by enabling access to food, water, and shelter. For example, ensuring our smartphones are charged and have a data connection. And food delivery apps and online grocery ordering for easy access to food. Plus,smart home devices to control temperature, lighting, etc. for comfort. Safety needs: Technology provides tools…
Journal Entry 3
Researchers may use the PrivacyRights.org Data Breach Chronology for extensive studies of data breaches within the United States. This database allows the filtering of entries according to year, company, organization type, and breach type in order to analyze trends and patterns in data breaches over time. They can view how often certain types of breaches,…
Journal Entry 2
The principles of science are closely related to cybersecurity through several key concepts. Relativism recognizes the interconnectedness of systems, highlighting how changes in one area affect cybersecurity. Objectivity ensures unbiased research, crucial when studying sensitive topics like cybercrime punishment or digital terrorism. Parsimony strives for simple explanations in complex scenarios, such as applying self-control theory…
Journal Entry 1
The NICE Workforce Framework for Cybersecurity presents a range of career options that pique my interest. However, there are a few areas that particularly stand out to me. My top choice would be the Protection and Defense category, as I’m drawn to roles that involve actively safeguarding systems and networks against threats. The aspect of…