Edmund Reisser

Most Recent Articles

Career Paper

Career-PaperDownload

Read More

Module 11 Bug Bounty

The second part of this week’s journal entry was an article review, which discussed bug bounty policies, and how researchers identified and got rid of the bugs in their programs. They do this through the...

Read More

Module 11 Case Study

This week, we were given a sample of a data breach announcement that was...

Read More

Module 10 Article Journal

This week’s journal entry was an article review about information...

Read More

SMD Scale – Module 9

This week we were given the instructions to take the Social Media Disorder...

Read More

Hacking Movies – Are they Real? Module 8

For this week’s journal entry, we were given a reaction video to watch...

Read More

Article Review 2

The article I chose for this week’s article review was “Cyber...

Read More

Article Review 1

For the article review, I chose an article written on the subject of...

Read More

Review the articles linked with each individual motive (individuals and crime).  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.

The 7 motives given are Entertainment, Political, Revenge, Boredom,...

Read More

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.  Give specific examples of how your digital experiences relate to each level of need.

Maslow’s Hierarchy of Needs has 5 different levels of needs. The first...

Read More