Most Recent Articles
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
Researchers can use public data gathered by Data Breaches to prevent not only...
Read MoreExplain how the principles of science relate to cybersecurity
Cybersecurity is a type of applied science, so the different principles of...
Read MoreReview the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.
The area’s that appeal to me the most in the NICE Framework are Analyze...
Read MoreHow should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
How should we approach the development of cyber-policy and -infrastructure...
Read MoreHow does cyber technology impact interactions between offenders and victims?
How does cyber technology impact interactions between offenders and victims?...
Read MoreWhat is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
What is the overlap between criminal justice and cybercrime? How does this...
Read MoreHow do engineers make cyber networks safer?
How do engineers make cyber networks safer? A Cyber Security Engineer creates...
Read MoreHow can you tell if your computer is safe?
How can you tell if your computer is safe? In the digital age, it is easy to...
Read MoreWhat are the costs and benefits of developing cybersecurity programs in business?
Cybersecurity is arguably one of the most important aspects a business could...
Read MoreHow has cyber technology created opportunities for workplace deviance?
Deviance is defined as “the fact or state of departing from usual or accepted...
Read More