Journal 9: The Media’s influence on how we view Cybersecurity

The media portrays cyberspace to be way more unsafe than it really is. Scenes of databases being attacked and everyone scrambling to stop it are shown to be frequent occurrences. It also shows hackers to be mysterious, scary figures with dark clothes and masks, when they are normal looking and dressing people like the media…

Journal 8: Psychological Consequences of being a Revenge Porn Victim

The most common psychological consequences that come from being a victim of revenge porn are anger, guilt, paranoia, depression, and in some cases even suicide. The usual motive for doing things like sending naked pictures of oneself is having low self-esteem, which relates to depression and succorance or seeking emotional support from other individuals. There…

Journal 7: Human System-Integrations Meme

Human-System integration is no laughing matter. Human-System integration is a vital part of the process in the development of any product. Without this core element, the product would perform inadequately, and it would not be optimized to its potential. Another consequence of human-system integration being overlooked is that the product would be inherently unsuccessful because…

Journal 6: Sandra’s reason to go into Cybersecurity

Sandra mentions a myriad of reasons to get into cybersecurity in the video. One of the aspects that interests me the most is job security. One of the reasons I decided to major in cybersecurity is job security. I like knowing that no matter where I am I have a heavy possibility of being employed….

Journal 5: Rating Motives for Cybercrime

There are many reasons why someone would cyber offend. These range from entertainment, political, revenge, boredom, recognition, for money, and multiple other reasons. I would rank entertainment as a five on the list. I don’t think this is very common among cybercriminals participating in these crimes. The political reason seems more common to me than…

Journal 4: Ethics needed in Cyberspace Study?

All scientists are supposed to conduct their studies under ethical guidelines, which include social scientists. If the research is being conducted in cyberspace the rules still apply. However, in order to get the most accurate and unbiased data the subject would have to be unaware they are being observed. If they are privy to the…

Journal 3: Ex-Cyber Criminal insight into Cyberspace

Cybersecurity studies can be greatly improved by the knowledge of former cybercriminals in many ways. First, knowing where other cybercriminals commonly congregate helps in trying to find and stop them. Second, if their habits are anything like the former criminal helping the researcher it brings cybersecurity studies closer to understanding the human causes and technological…

Journal 2: NICE Workforce Framework

I’m currently uncertain about what field I want to specialize in. However, the general categories that jumped out at me were; Analyze, Investigate, Operate and Maintain, and Protect and Defend. The categories that I did not find interesting were; Collect and Operate, Oversee and Govern, and Securely Provision. The specific job type that appeals the…

Journal 1: Ann got Scammed

Ann got an email saying that she had gotten a free coupon for her shopping website. To receive this coupon all she had to do was provide her account information. When she did a hacker got her information and used it to get money from her account. It is people like Ann, and even the…