ODU Logo

erichcyse201sfall23

Erich Downing

Discussion 4: “Apply the phrase victim precipitation to cyber victimization”

Applying the concept of “victim precipitation” to cyber victimization involves exploring how victims may unknowingly contribute to their victimization in the digital world. This doesn’t imply victim blaming, but rather acknowledges that certain behaviors or lack of awareness can increase… Continue Reading →

Discussion 5: Identify which theories you think best explain cybercrime and discuss what you like about that theory.  

One theory that effectively explains cybercrime is the Routine Activity Theory. I appreciate this theory for its focus on the convergence of three elements: a motivated offender, a suitable target, and the absence of a capable guardian. It applies well… Continue Reading →

Dicussion 6: Human Firewall

The concept of the “human firewall” emphasizes the importance of individual awareness and skepticism in cybersecurity. It involves being cautious about sharing personal information online, discerning the trustworthiness of websites and links, and understanding what personal details are most vulnerable…. Continue Reading →

Discussion 9: Ruben Paul – Cybersecurity Expert

Ruben Paul, a 12-year-old cybersecurity expert, exemplifies the essence of hacker culture as described by Steven Levy, focusing on skills and actions rather than traditional credentials like age or degrees. His background, with parents in the cybersecurity industry, aligns well… Continue Reading →

Discussion 10: Identify two research questions that researchers might address related to the social aspects of cybersecurity.

Two possible research questions related to the social aspects of cybersecurity are:

Discussion 11: What does economics have to do with cybersecurity? Enter your own entry and respond to two other students’ entries.

Economics plays a significant role in cybersecurity. Cybersecurity involves costs and benefits, resource allocation, and strategic decision-making, all key economic concepts. Companies must balance the cost of implementing robust security measures against the potential losses from cyber incidents. This includes… Continue Reading →

Discussion 4: What you think about the “human firewall”? 

Rob May’s analogy of cybersecurity as a pipe with joints manned by people effectively illustrates the concept of the “human firewall.” This idea emphasizes the critical role each individual plays in safeguarding against cyber threats. Everyone must be informed and… Continue Reading →

Discussion 3: Visit PrivacyRights.org to Links to an external site. See the types of publicly available information about data breaches. How might researchers use this information to study breaches?

The Data Breach Chronology at PrivacyRights.org is a valuable resource for researchers studying data breaches. This database, initiated in 2005, includes information about reported data breaches in the United States, gathered from publicly available sources like government entities. Researchers can… Continue Reading →

Discussion 2: What do you think about the principle of determinism as it relates to computer hacking?  Post your opinion and respond to two other students’ posts.

In the context of computer hacking, the term “determinism” refers to the idea that since digital actions and events are governed by cause-and-effect relationships, hacking incidents and their results can be predicted and explained if you have complete knowledge of… Continue Reading →

Hello World!

This is a post. Use posts to update your blog.

© 2025 erichcyse201sfall23 — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑