There are a lot of reasons that cyber victimization goes underreported in my personal opinion. First, the victims most likely don’t report the incidents because they don’t want the shame associated with the event. This would be due to the fact that when people hear about someone who has experienced cyber victimization, they assume it…
Author: cbead002
Journal 18: CNN Host Weed vs Alcohol
This CNN host would probably be in the majority if this question was posed to the rest of the modern USA population. I think this has to do with the decriminalization, destigmatization, and legalization of weed over the last decade. This has to do with the culture being more progressive and the experts learning about…
Journal 17: A.I. and Social Sciences
Artificial intelligence surprisingly relates to social sciences and their principles a lot. One aspect of this is human factors and human-system integration being combined with A.I. to best suit the human users and their needs. To enhance cybersecurity artificial intelligence, depending on their purpose, are designed with criminology (to prevent crime), psychology (to understand how…
Journal 16: Artificial Intelligence and Cybersecurity
Artificial intelligence relates to cybersecurity in numerous facets. It enhances cybersecurity by making it more efficient. There are core cyber tools that assist the analyst such as Expert Systems, Autonomous Systems, Augmented Reality, and Neural Networks just to name a few. Expert Systems use facts and knowledge like a human expert to solve complex problems….
Journal 15: ODU’s Electronic Communications Policy
Old Dominion’s University Policy 3506 relates to cybersecurity in a multitude of ways. An ODU email given to an employee, researcher, students, etc. has the appropriate security measures in place, such as the Midas ID and passwords, as well as the University Identification Number (UIN) being needed in accessing the user’s email and other various…
Journal 14: 11 Illegal Online Activities
There are many cyber crimes are they can be very big or very small, but they are crimes, nonetheless. Some of these illegal deeds people have done in their past unknowingly and they probably didn’t realize the seriousness of their actions. Eleven of these activities are using unofficial streaming services, using torrent services, using copyrighted…
Journal 13: Social Media Disorder Scale
I answered the social media disorder scale, and the results were as I suspected. I did not get a single question wrong. I scored one hundred out of one hundred with not a single question pointing to me having social media disorder. I am not addicted to social media like so many other people of…
Journal 12: Cybersecurity Analyst Job
They are a lot of social factors discussed in this video. She talks about trying to find the right location for the job that suits you. She mentions the competitiveness of other professions and how cybersecurity is very in demand while having not enough workers to fill the job positions. This creates extremely nice wages…
Journal 11: G4Boys and Cybersecurity Subcultures
There are many types of cybersecurity subcultures such as professional, cybercriminal, fraud, hacker, etc. In the song “In Scam We Trust” G4Choppa and the G4Boys talk about a litany of cyber offenses that their posse has committed. One of the crimes they mention is catfishing someone in online dating and then getting that person to…
Journal 10: 12-Year-old Cybersecurity Expert
I am absolutely astounded that he has as much knowledge about the cybersecurity field as he does. Reuben Paul has embedded himself into the hacker subculture because he is able to hack into other devices, is self-taught, and is knowledgeable about technology. Reuben would also fall under the subculture of the professional as well because…