Journal 11

Part A Classical Economic Theory applies to the information letter because the company was using or holding consumers financial information was willingly given in the process of purchasing items. This was part of normal business practices. Rational Choice Theory also applies to the information letter because the business chose to use a third-party platform as…

Journal 12

The author goes over some aspects of using the internet and educating the public about what could be or is illegal to perform. Then goes onto offer some simple and effective ideas for cyber-hygiene. I would say the most serious actions listed are recording VoIP without consent, faking an online identity, collecting information on those…

Journal 10

The article in summary calls for the education of everyone on what the internet is. This is a much needed improvement in our society as many do not know how to perform appropriate research. Having an educated people in a society is a very important and strong dynamic of any culture or government. I think…

Journal 9

After answering the Social Media Disorder Scale I only rated a one which is classified as normative. I feel that the questions are very subjective, and the answers would be from the viewpoint and assumptions of the test taker. For example, what does regularly mean in this context? As it stands with the 9 questions,…

Journal 8

The media most certainly influences a layperson’s mindset about how hacking attempts are operated. It’s much in the same way that it influences our mindset about how law enforcement or military operations are performed. There is generally some kernel of truth or fact that the story starts off with. Usually though because of time or…

Journal 7

Human Integrated systems are technological systems that are designed with human interface in mind. Meaning that it is easy for people to use and incorporate in their everyday lives without a whole lot of hassle. As you can see in the image provided that there is the desktop, a phone, a smart watch, and wireless…

Journal 6

Three ways you can spot a fake website are There are also several types of scam websites such as clone websites which imitate legitimate companies. Fake online store or sellers which imitate e-stores and try to get you to enter your financial information. Phising websites which have links distributed and imitate legitimate senders except for…

Journal 5

Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. Multiple reason: Rank 1. Mainly because people are not a singular dimension. It takes multiple reasons/dimensions to lead a…

Journal 4

Maslow’s Hierarchy of Needs is a motivation-based theory in psychology in which lower tier needs must be met before higher needs can be sought after. From the bottom up the tiers go physiological needs, safety needs, belongingness and love needs, esteem needs, and lastly is self-actualization. My experience within this type of hierarchy related to…

What type of publicly available information is on privacyrights.org. How might researchers use this information to strudy breaches?

After visiting privacyrights.org and searching for the key word “data breach” through their publications, I have come to find that social science researchers might use this site for archival research. The organization’s site has seven resource types which include advocacy, articles, guides, law overviews, news, Q&A, and reports. In each of these categories there are…