The so-called Pacific Northwest tree octopus is well known in internet circles as one of the most significant hoaxes regarding online literacy challenges. Its artificiality is revealed by several factors. To begin with, the idea that an octopus lives in a tree on the coasts of Pacific North America is highly unrealistic because octopuses reside…
Author: dlevy001
Journal Entry #15
In the presentation on digital forensics, its speaker, Davin Teo, gives a rare glimpse into his own way to get a job in this niche. He somehow found himself in the area of digital forensics after having been a trainee as an accountant at a small accounting practice that needed support or IT help. He…
Journal Entry #14
According to the article of Andriy Slynchuk, there are several possible illegal online practices that include unauthorized transmission service, involving torrents’ use, violation of the right of publishing someone’s photos without authorization, provision of someone’s private data, as well as This includes the likes of unofficial streaming services and torrent services which have seen content…
Journal Entry #13
“Hacking for good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties” examines the effectiveness of bug bounty programs in a bid to address the issues surrounding them as well as other associated parameters. The literature review is interesting and impressive, taking a close look into bug bounty terrain and drawing on critical…
Journal Entry #12
The information asymmetry theory and the notion of externality can be traced in the context of the sample data breach notification. The information of asymmetry theory is present in the data breach described in the Glasswaherparts.com letter. Payment card data was compromised in a manner that went unnoticed for a while by customers (economic agents),…
Journal Entry #11
In the presentation by Nicole Enesse on the responsibility a Cybersecurity Analyst she focuses on both hard-techie issues and the more subtle societal themes underlying their industry. Reference is given to graveyard shifts, which are often indicated among basic jobs requirements, underscoring the societal dimension of cybersecurity occupation. Social circumstances like family duties and/or preferences…
Journal Entry #10
In the document titled “Social Cybersecurity An Emerging National Security Requirement,” social cybersecurity and its significance as a National Security requirement is discussed. It reveals information warfare evolution mainly in social cyber threats and their impact on the military and geopolitical aspects. The authors postulate that social cybersecurity, which involves understanding and forecasting cyber-induced change…
Journal Entry #9
After taking the Social Media Disorder Scale-9, I received a score of 1, which means that I have a normative social media use. I feel that the questions do a decent job at determining someone’s use of social media with the given 9-item question count. There is another version of the scale that uses 27…
Journal Entry #8
The media has a big impact on how people perceive hacking, such as in movies or TV shows. These forms of entertainment are just that, for entertainment. Therefore, they will dramatize what hacking is because hacking by itself is not very interesting to watch if you do not know how it really works or they…
Journal Entry #4
One of Maslow’s Hierarchy of Needs is that digital technology has become a psychological need. It depends on what I need to do when I have no internet access. For example, if an assignment is due, and I cannot use the internet to complete the assignment, I would feel anxious because I am running out…