Skip to content
Welcome
About Me
Resume
Skills
IDS300W
Cybersecurity Foundations
CYSE 300
Tech & Society
CYSE 200T
Why Are You Interested In Cybersecurity Technology?
Select Four Other Majors Offered By ODU And Explain How Those Majors Relate To Cybersecurity
Describe Four Ethical Issues That Arise When Storing Electronic Information About Individuals
Compare Cybersecurity Risks In The U.S. And Another Country
Use The Letters Of The Word “Cybersecurity’ To List Legal Ways To Make Money In Cybersecurity
How Has Cyber Technology Created Opportunities For Workplace Deviance?
What Are The Costs And Benefits Of Developing Cybersecurity Programs In Business?
How Can You Tell If Your Computer Is Safe?
Describe Three Ways That Computers Have Made The World Safer And Less Safe
How Do Engineers Make Cyber Networks Safe?
What Is The Overlap Between Criminal Justice And Cybercrime? How Does This Overlap Relate To The Other Disciplines Discussed In This Class?
How Does Cyber Technology Impact Interactions Between Offenders And Victims
How Should We Approach The Development Of Cyber-Policy And Cyber-Infrastructure Given The “Short Arm” Of Predictive Knowledge?
CYSE201S
Review The NICE Workforce Framework. Are There Certain Areas That You Would Want To Focus Your Career On? Explain Which Areas Would Appeal The Most To You And Which Would Appeal The Least
Explain How The Principles Of Science Relate To Cybersecurity
Visit PrivacyRights.org To See The Types Of Publicly Available Information About Data Breaches. How Might Researchers Use This Information To Study Breaches?
Review Maslow’s Hierarchy Of Needs And Explain How Each Level Relates To Your Experiences With Technology. Give Specific Examples Of How Your Digital Experiences Relate To Each Level Of Need
Rate The Motives For Individuals To Commit Crimes From 1 To 5, As The Motives You Think Make The Most Sense (Being 1) To The Least (Being 5). Explain Why You Rank Each Motive The Way You Rank It
Can You Spot Three Fake Websites And Compare the Three Fake Websites To Three Real Websites, Plus Showcase What Makes The Fake Websites Fake
Review The Following Ten Photos Through A Cybersecurity Human Systems Integration Framework. Create A Meme Explaining What Is Going On In The Individuals’ Mind(s). Explain How Your Memes Relate To Human Systems Integration
View The Video Below. How Do You Think The Media Influences Our Understanding About Cybersecurity?
Complete The Social Media Disorder Scale. Discuss Your Score, What Do You Think About The Items In The Scale, & Why Do You Think That Different Patterns Are Found Across The World?
Read The Article Below on Social Cybersecurity And Respond
Read The Sample Breach Letter And Describe How Two Different Economics Theories & Two Different Social Sciences Theories Relate To The Letter
Review Andriy Slynchuk List Of Eleven Things Internet Users Do That May Be Illegal. What Are The Five Most Serious Violations And Why Do You Think Those Offenses Are Serious?
Watch This Video & Describe What You Think About The Speaker’s Pathway To His Career
Contact
Fhale002 @ Old Dominion University
Felicia Hale
Compare Cybersecurity Risks In The U.S. And Another Country
Menu
Welcome
About Me
Resume
Skills
IDS300W
Cybersecurity Foundations
CYSE 300
Tech & Society
CYSE 200T
Why Are You Interested In Cybersecurity Technology?
Select Four Other Majors Offered By ODU And Explain How Those Majors Relate To Cybersecurity
Describe Four Ethical Issues That Arise When Storing Electronic Information About Individuals
Compare Cybersecurity Risks In The U.S. And Another Country
Use The Letters Of The Word “Cybersecurity’ To List Legal Ways To Make Money In Cybersecurity
How Has Cyber Technology Created Opportunities For Workplace Deviance?
What Are The Costs And Benefits Of Developing Cybersecurity Programs In Business?
How Can You Tell If Your Computer Is Safe?
Describe Three Ways That Computers Have Made The World Safer And Less Safe
How Do Engineers Make Cyber Networks Safe?
What Is The Overlap Between Criminal Justice And Cybercrime? How Does This Overlap Relate To The Other Disciplines Discussed In This Class?
How Does Cyber Technology Impact Interactions Between Offenders And Victims
How Should We Approach The Development Of Cyber-Policy And Cyber-Infrastructure Given The “Short Arm” Of Predictive Knowledge?
CYSE201S
Review The NICE Workforce Framework. Are There Certain Areas That You Would Want To Focus Your Career On? Explain Which Areas Would Appeal The Most To You And Which Would Appeal The Least
Explain How The Principles Of Science Relate To Cybersecurity
Visit PrivacyRights.org To See The Types Of Publicly Available Information About Data Breaches. How Might Researchers Use This Information To Study Breaches?
Review Maslow’s Hierarchy Of Needs And Explain How Each Level Relates To Your Experiences With Technology. Give Specific Examples Of How Your Digital Experiences Relate To Each Level Of Need
Rate The Motives For Individuals To Commit Crimes From 1 To 5, As The Motives You Think Make The Most Sense (Being 1) To The Least (Being 5). Explain Why You Rank Each Motive The Way You Rank It
Can You Spot Three Fake Websites And Compare the Three Fake Websites To Three Real Websites, Plus Showcase What Makes The Fake Websites Fake
Review The Following Ten Photos Through A Cybersecurity Human Systems Integration Framework. Create A Meme Explaining What Is Going On In The Individuals’ Mind(s). Explain How Your Memes Relate To Human Systems Integration
View The Video Below. How Do You Think The Media Influences Our Understanding About Cybersecurity?
Complete The Social Media Disorder Scale. Discuss Your Score, What Do You Think About The Items In The Scale, & Why Do You Think That Different Patterns Are Found Across The World?
Read The Article Below on Social Cybersecurity And Respond
Read The Sample Breach Letter And Describe How Two Different Economics Theories & Two Different Social Sciences Theories Relate To The Letter
Review Andriy Slynchuk List Of Eleven Things Internet Users Do That May Be Illegal. What Are The Five Most Serious Violations And Why Do You Think Those Offenses Are Serious?
Watch This Video & Describe What You Think About The Speaker’s Pathway To His Career
Contact
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
Accept