ODU Logo

CYSE201S-22131-REED

Category Uncategorized

Article Review #1

Social Media and victimization are sadly a reality we must face in today’s cyber world. One study I found interesting is on the relationship between SNS or social networking service and victimization. The study was performed by Yeonjae Park and… Continue Reading →

ePortfolio Entry #5: Motives

Every cybercriminal has a motive. Be it money, fame, or just plain fun criminals commit crimes with some intention in mind. Here I would like to propose a list, ranking my top 7 motives cybercriminals have for committing crimes.

ePortfolio Entry #4: Maslow and Technology

Even today we can apply Maslow’s Hierarchy of Needs to address people and their relationship with technology. Starting from the bottom we have Physiological needs, which requires our want for food, water, warmth and rest to be met before we… Continue Reading →

ePortfolio Journal Entry #1: Career Choices

From looking through the NICE Framework I have found a couple of career areas that I am interested in. The first one is Cyber Investigation. I am interested in this career because it allows me to use my critical thinking… Continue Reading →

Journal Entry #3: Privacyrights.org and Researchers

Researchers can find a great resource in using Privacyrights.org for data breach research. One of the most interesting functions that the site has is it’s Data Breach Chronology page. On this page it shows a myriad of information. It shows… Continue Reading →

ePortfolio Entry #2: Principles of Science and Cybersecurity

Normally people would associate the principles of science with the natural science disciplines. However, this is not the case as we can also apply them to the social sciences and by extension the field of cybersecurity. The six principles of… Continue Reading →

© 2025 CYSE201S-22131-REED — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑