Most Recent Articles
Module 11 Bug Bounty
The second part of this week’s journal entry was an article review, which discussed bug bounty policies, and how researchers identified and got rid of the bugs in their programs. They do this through the...
Read MoreModule 11 Case Study
This week, we were given a sample of a data breach announcement that was...
Read MoreModule 10 Article Journal
This week’s journal entry was an article review about information...
Read MoreSMD Scale – Module 9
This week we were given the instructions to take the Social Media Disorder...
Read MoreHacking Movies – Are they Real? Module 8
For this week’s journal entry, we were given a reaction video to watch...
Read MoreReview the articles linked with each individual motive (individuals and crime). Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
The 7 motives given are Entertainment, Political, Revenge, Boredom,...
Read MoreReview Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Maslow’s Hierarchy of Needs has 5 different levels of needs. The first...
Read More