Watch this video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. A cyber security analyst has a wide range… Continue Reading →
Read this and write a journal entry summarizing your response to the article on social cybersecurity https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/Links to an external site. The importance of social cybersecurity has grown exponentially in the past decade. The development of technology has transformed traditional… Continue Reading →
Complete the Social Media Disorder Scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? I achieved a score of 3/9 for this assignment…. Continue Reading →
Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTubeLinks to an external site. After watching the video, write a journal… Continue Reading →
Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s). https://unsplash.com/photos/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs “You can’t teach an old dog new tricks, right?” This relates… Continue Reading →
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Examples of fake websites include 70News, World News Report, and The Boston Tribune. While majority of… Continue Reading →
Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). … Continue Reading →
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. (Elizabeth Hopper, 2020) Physiological Needs – This consists of our… Continue Reading →
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? This site offers an extensive range of privacy resources including law overviews, reports, and advocacy. With the use of this site you’re… Continue Reading →
© 2026 Liana Davis — Powered by WordPress
Theme by Anders Noren — Up ↑