eetie003

Student Name

Article Review 2

Article review #2 Cyberbullying and Psychological Stress among Female Employees Elissa Etienne 11/5/2023The article titled “Cyberbullying and psychological stress among female employees,” published in theInternational Journal for Cyber Criminology, investigates the impact of cyberbullying on thepsychological well-being and workplace dynamic… Continue Reading →

Article Review 1

The article titled “Role of Cyber Security on Employees’ Digital Workplace Performance: Exploring the Effects of Employees ‘Digital Awareness and Organizational Support” by Associate Prof. Dr. Vimala Venugopal Muthuswamy. Investigates the influence of cybersecurity on employees’ digital workplace performance. This… Continue Reading →

Career Paper

The interplay of social science Research and Cybersecurity: A Focus on CybersecurityPolicy Analyst IntroductionIn the ever-evolving cybersecurity landscape, professionals Play a pivotal role in safeguardingdigital ecosystems against a myriad of threats. One specialized cybersecurity career that distinctlyrelies on social science… Continue Reading →

Davin Teo’s journey

Davin Teo’s journey into digital forensics is a fascinating blend of technical expertise and a deep understanding of human behavior. As he described his educational background, with degrees in both computer science and psychology, I was struck by the intentional… Continue Reading →

 Eleven things internet users do that may be illegal.

Within the expansive realm of the internet, seemingly innocuous activities can carry significant repercussions. The discussion of the five most severe violations here underscores the critical importance of upholding legal and ethical standards in the online domain. To begin, the… Continue Reading →

 Sample breach letter

The presented letter discusses the evolving landscape of bug bounty programs, emphasizing their significance in identifying vulnerabilities and enhancing cybersecurity. The literature review underscores a shift in attitudes towards vulnerability disclosure policies (VDPs) and bug bounty initiatives, highlighting the growing… Continue Reading →

 SAMPLE DATA BREACH NOTIFICATION

Economics: Cost-Benefit Analysis: The incident described in the letter can be analyzed through the lens of cost-benefit analysis. From an economic standpoint, organizations often weigh the costs and benefits of investing in cybersecurity measures. In this case, the company is… Continue Reading →

  Cybersecurity Analyst Job

The description of a cybersecurity analyst job can relate to social behaviors in several ways, as cybersecurity is not just about technical skills but also about understanding and addressing human behavior and interactions. I will be providing a few ways… Continue Reading →

Social Cybersecurity

An Emerging National Security Requirement The article discusses national security and its profound implications for modern warfare. It dives into the evolving nature of warfare, particularly in the information domain, where state and non-state actors employ technology to rapidly manipulate… Continue Reading →

Social media disorder scale

I scored a four out of nine on the Social Media Scale Disorder assessment. I believe the items on the scale were designed to reflect common challenges that both teenagers and adults face when it comes to their social media… Continue Reading →

« Older posts

© 2025 eetie003 — Powered by WordPress

Theme by Anders NorenUp ↑