Week 1 Journal Entry
For the NICE workforce framework, I focused my career on cybersecurity curriculum
development. Threat Analysis and Incident Response appealed to me the most. It focuses on
identifying, analyzing, and responding to cybersecurity threats.
It Appeals the Ideal for those who enjoy dynamic, problem-solving roles and real-time
challenges. Also, it focuses on testing systems for vulnerabilities to prevent malicious attacks.
Lastly, it focuses on aligning security strategies with organizational objectives and regulatory
requirements. Appeals to those who enjoy policy development, frameworks, and risk
management.
I was least focused on cybersecurity instruction. The area that might appeal the least
depends on the audience and their goals, but here are some areas that could be less
engaging. Theoretical discussions on cryptography principles, security models, or cybersecurity
frameworks can be abstract and less engaging for those who prefer practical, real-world
applications. If learners are seeking immediate, actionable skills, theory-heavy content might
feel less rewarding. Theoretical foundations are crucial for deep understanding, but they might
be less interesting for those looking for more hands-on or applied learning.
Week 2 Journal 2
Scientific principles like Empiricism, Determinism, Parsimony, and Objectivity are crucial in cybersecurity. Empiricism relies on real-world data, such as attack patterns and system behavior, to shape security decisions. My favorite is determinism. I believe that with proper security measures in place, we can predict and prevent most cyberattacks, as each breach has identifiable causes that can be addressed. Determinism suggests that security breaches have identifiable causes, allowing for proactive mitigation. Parsimony advocates for simple, effective solutions to security challenges, avoiding unnecessary complexity. Objectivity ensures that cybersecurity strategies are based on facts and evidence, free from personal biases. Together, these principles enable a systematic, logical approach to securing systems, identifying vulnerabilities, and adapting defenses based on observed threats and predictable outcomes.
Week 3 Journal 3
Researchers can use this information to better understand how data breaches occur and what factors contribute to them. By studying the techniques used by hackers, the types of systems targeted, and the nature of the data compromised, they can identify patterns and trends that help predict and prevent future breaches. This kind of analysis is essential for improving cybersecurity strategies and developing more effective tools for threat detection and response. Additionally, examining real-world breaches provides insight into which security measures are failing and where organizations need to focus their efforts to protect sensitive information.
Week 4 Journal 4
Maslow’s Hierarchy of Needs connects to technology in multiple ways. At the physiological level, technology supports basic needs through food delivery apps and smart home devices that regulate temperature. The safety level includes cybersecurity measures, antivirus software, and encrypted communication to protect personal information. For belongingness, social media, messaging apps, and online communities help people stay connected. The esteem level is reflected in social media recognition, professional networking on LinkedIn, and achievements in online gaming. I use online courses to develop new skills and expand my knowledge. Technology also helps me stay connected with family and friends, no matter where they are.Lastly, self-actualization is fostered through e-learning platforms, creative software, and coding tools that encourage growth and skill development. Overall, technology enhances every level of Maslow’s hierarchy, shaping and improving daily life.
Week 5 Journal 5
I would list them this way in my opinion. The First option would be Entertainment, it can be harmless or even beneficial if it brings joy without causing harm. Next Multiple reasons, this can be complex, sometimes justifiable, depending on the mix of motives. Recognition would follow, Seeking acknowledgment can be neutral or positive, depending on the method. For money, this depends on ethics; earning through fair work is fine, but greed can be harmful. Boredom is Often leads to reckless actions, making it a weak motive. Political can be good or bad, depending on whether it promotes justice or harm. Lastly Revenge, this typically destructive and rarely justified. I ranked them based on their ethical implications and potential consequences.
Week 6 Journal 6
Week 7 Journal 7

Week 8 Journal 8
Movies and TV shows have shaped the way I see cybersecurity, often making it seem more
dramatic and instant than it really is. When I watch scenes with hackers typing rapidly while glowing
code scrolls across the screen, I know it’s exaggerated, but it still influences my perception. In reality,
hacking takes time, research, and skill—it’s not just about pressing a few keys and breaking into a system.
Shows like Mr. Robot give a more realistic look at cybersecurity, but many others oversimplify or
misrepresent it. This can make people either underestimate real threats or believe hacking is some kind of
magic. I realize now how important it is to question what I see in media and seek accurate information
about digital security.
Week 10 Journal 9

Week 11 Journal 11
The description of the cybersecurity analyst job highlights several social themes, particularly the importance of trust, communication, and ethical responsibility in digital spaces. As cybersecurity analysts work to protect sensitive information and prevent breaches, their role directly ties into how individuals and organizations interact online. One key theme is the social responsibility of safeguarding others’ data, which reflects broader concerns about privacy and digital citizenship. Additionally, the job requires collaboration and clear communication with teams and stakeholders, emphasizing the social dynamics within organizations.
Week 12- Journal Entry 12
The “Sample data breach notification” letters can be analyzed through the lenses of
prospect theory and behavioral economics from the field of economics, as well as cognitive
dissonance theory and social comparison theory from the psychological social sciences. These
theories help explain how individuals and organizations respond to data breaches and
notifications. Additionally, Prospect Theory explains how people make decisions under risk and
uncertainty, which is applicable to data breach scenarios. The theory posits that individuals
evaluate potential gains and losses relative to a reference point, and they are more sensitive to
losses than to gains. In the context of a data breach notification, affected individuals may
perceive the breach as a loss, leading to heightened anxiety and risk-averse behavior.
Behavioral economics recognizes that people are not always rational decision-makers
and incorporates psychological insights to understand economic behavior. Sample data breach
notification letters can be viewed through this lens, as they aim to influence the behavior of
recipients. For example, the letters often include recommendations for individuals to monitor
their accounts, change passwords, and enroll in identity theft protection services. These
recommendations are designed to encourage individuals to take proactive steps to mitigate the
potential harm from the breach. These theories offer frameworks for understanding how
recipients perceive and respond to the information presented in the notification.
Week 13 -Journal Entry 14
Andriy Slynchuk identifies eleven activities that internet users commonly engage in that may be
illegal, highlighting the risks associated with seemingly routine online behaviors. Among these,
the five most serious violations include collecting information about children, faking your online
identity, sharing passwords, addresses, or photos of others without consent, bullying and trolling,
and using torrent services for pirated material. Collecting data on children under 13 is a grave
violation because it breaches the Children’s Online Protection Act, making it illegal to gather
such information without verifiable parental consent, thus protecting minors from potential
exploitation and harm (Andriy Slynchuk, 2021). Faking one’s identity online constitutes identity
fraud when it aims to deceive or defraud others, posing significant risks of victimization and
legal consequences that can profoundly affect both individuals and society by enabling criminal
activities (Andriy Slynchuk, 2021). The unauthorized sharing of others’ personal information,
including passwords, photos, or addresses, invades privacy, potentially leading to identity theft,
harassment, and emotional harm, thereby undermining trust and safety in digital spaces (Andriy
Slynchuk, 2021).
Journal 15
Today I listened to a speaker talk about his career as a digital forensics
investigator, and it really made me think about how connected this field is to the social sciences.
At first, I assumed digital forensics was strictly technical focused on recovering data and
tracking cybercrimes. But the speaker explained how much of his work involves understanding
human behavior, motives, and communication patterns, which really surprised me.He didn’t
have a straight path into the field. He talked about being interested in psychology and criminal
justice early on, and how those interests eventually led him to digital forensics. He made it clear
that solving digital crimes isn’t just about coding or analyzing hard drives, it’s also about thinking
critically, recognizing patterns, and interpreting the context behind people’s actions online.
I found it interesting that ethics plays such a big role in his work. He said investigators often deal
with sensitive information and must consider the social impact of their findings. This really
highlighted how careers in tech still need a strong understanding of human behavior and
society. Overall, it made me see digital forensics as a much more dynamic and interdisciplinary
field than I expected