Edmund Reisser

Most Recent Articles

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?

Researchers can use public data gathered by Data Breaches to prevent not only...

Read More

Explain how the principles of science relate to cybersecurity

Cybersecurity is a type of applied science, so the different principles of...

Read More

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

The area’s that appeal to me the most in the NICE Framework are Analyze...

Read More

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

How should we approach the development of cyber-policy and -infrastructure...

Read More

How does cyber technology impact interactions between offenders and victims?

How does cyber technology impact interactions between offenders and victims?...

Read More

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

What is the overlap between criminal justice and cybercrime? How does this...

Read More

How do engineers make cyber networks safer?

How do engineers make cyber networks safer? A Cyber Security Engineer creates...

Read More

How can you tell if your computer is safe?

How can you tell if your computer is safe? In the digital age, it is easy to...

Read More

What are the costs and benefits of developing cybersecurity programs in business?

Cybersecurity is arguably one of the most important aspects a business could...

Read More

How has cyber technology created opportunities for workplace deviance?

Deviance is defined as “the fact or state of departing from usual or accepted...

Read More