Skip to content
  • Welcome
    • About Me
    • Resume
    • Skills
    • IDS300W
  • Cybersecurity Foundations
    • CYSE 300
  • Tech & Society
    • CYSE 200T
      • Why Are You Interested In Cybersecurity Technology?
      • Select Four Other Majors Offered By ODU And Explain How Those Majors Relate To Cybersecurity
      • Describe Four Ethical Issues That Arise When Storing Electronic Information About Individuals
      • Compare Cybersecurity Risks In The U.S. And Another Country
      • Use The Letters Of The Word “Cybersecurity’ To List Legal Ways To Make Money In Cybersecurity
      • How Has Cyber Technology Created Opportunities For Workplace Deviance?
      • What Are The Costs And Benefits Of Developing Cybersecurity Programs In Business?
      • How Can You Tell If Your Computer Is Safe?
      • Describe Three Ways That Computers Have Made The World Safer And Less Safe
      • How Do Engineers Make Cyber Networks Safe?
      • What Is The Overlap Between Criminal Justice And Cybercrime? How Does This Overlap Relate To The Other Disciplines Discussed In This Class?
      • How Does Cyber Technology Impact Interactions Between Offenders And Victims
      • How Should We Approach The Development Of Cyber-Policy And Cyber-Infrastructure Given The “Short Arm” Of Predictive Knowledge?
    • CYSE201S
      • Review The NICE Workforce Framework. Are There Certain Areas That You Would Want To Focus Your Career On? Explain Which Areas Would Appeal The Most To You And Which Would Appeal The Least
      • Explain How The Principles Of Science Relate To Cybersecurity
      • Visit PrivacyRights.org To See The Types Of Publicly Available Information About Data Breaches. How Might Researchers Use This Information To Study Breaches?
      • Review Maslow’s Hierarchy Of Needs And Explain How Each Level Relates To Your Experiences With Technology. Give Specific Examples Of How Your Digital Experiences Relate To Each Level Of Need
      • Rate The Motives For Individuals To Commit Crimes From 1 To 5, As The Motives You Think Make The Most Sense (Being 1) To The Least (Being 5). Explain Why You Rank Each Motive The Way You Rank It
      • Can You Spot Three Fake Websites And Compare the Three Fake Websites To Three Real Websites, Plus Showcase What Makes The Fake Websites Fake
      • Review The Following Ten Photos Through A Cybersecurity Human Systems Integration Framework. Create A Meme Explaining What Is Going On In The Individuals’ Mind(s). Explain How Your Memes Relate To Human Systems Integration
      • View The Video Below. How Do You Think The Media Influences Our Understanding About Cybersecurity?
      • Complete The Social Media Disorder Scale. Discuss Your Score, What Do You Think About The Items In The Scale, & Why Do You Think That Different Patterns Are Found Across The World?
      • Read The Article Below on Social Cybersecurity And Respond
      • Read The Sample Breach Letter And Describe How Two Different Economics Theories & Two Different Social Sciences Theories Relate To The Letter
      • Review Andriy Slynchuk List Of Eleven Things Internet Users Do That May Be Illegal. What Are The Five Most Serious Violations And Why Do You Think Those Offenses Are Serious?
      • Watch This Video & Describe What You Think About The Speaker’s Pathway To His Career
  • Contact

Fhale002 @ Old Dominion University

Felicia Hale

Resume

COMING SOON  embedded PDF.

Menu

  • Welcome
    • About Me
    • Resume
    • Skills
    • IDS300W
  • Cybersecurity Foundations
    • CYSE 300
  • Tech & Society
    • CYSE 200T
      • Why Are You Interested In Cybersecurity Technology?
      • Select Four Other Majors Offered By ODU And Explain How Those Majors Relate To Cybersecurity
      • Describe Four Ethical Issues That Arise When Storing Electronic Information About Individuals
      • Compare Cybersecurity Risks In The U.S. And Another Country
      • Use The Letters Of The Word “Cybersecurity’ To List Legal Ways To Make Money In Cybersecurity
      • How Has Cyber Technology Created Opportunities For Workplace Deviance?
      • What Are The Costs And Benefits Of Developing Cybersecurity Programs In Business?
      • How Can You Tell If Your Computer Is Safe?
      • Describe Three Ways That Computers Have Made The World Safer And Less Safe
      • How Do Engineers Make Cyber Networks Safe?
      • What Is The Overlap Between Criminal Justice And Cybercrime? How Does This Overlap Relate To The Other Disciplines Discussed In This Class?
      • How Does Cyber Technology Impact Interactions Between Offenders And Victims
      • How Should We Approach The Development Of Cyber-Policy And Cyber-Infrastructure Given The “Short Arm” Of Predictive Knowledge?
    • CYSE201S
      • Review The NICE Workforce Framework. Are There Certain Areas That You Would Want To Focus Your Career On? Explain Which Areas Would Appeal The Most To You And Which Would Appeal The Least
      • Explain How The Principles Of Science Relate To Cybersecurity
      • Visit PrivacyRights.org To See The Types Of Publicly Available Information About Data Breaches. How Might Researchers Use This Information To Study Breaches?
      • Review Maslow’s Hierarchy Of Needs And Explain How Each Level Relates To Your Experiences With Technology. Give Specific Examples Of How Your Digital Experiences Relate To Each Level Of Need
      • Rate The Motives For Individuals To Commit Crimes From 1 To 5, As The Motives You Think Make The Most Sense (Being 1) To The Least (Being 5). Explain Why You Rank Each Motive The Way You Rank It
      • Can You Spot Three Fake Websites And Compare the Three Fake Websites To Three Real Websites, Plus Showcase What Makes The Fake Websites Fake
      • Review The Following Ten Photos Through A Cybersecurity Human Systems Integration Framework. Create A Meme Explaining What Is Going On In The Individuals’ Mind(s). Explain How Your Memes Relate To Human Systems Integration
      • View The Video Below. How Do You Think The Media Influences Our Understanding About Cybersecurity?
      • Complete The Social Media Disorder Scale. Discuss Your Score, What Do You Think About The Items In The Scale, & Why Do You Think That Different Patterns Are Found Across The World?
      • Read The Article Below on Social Cybersecurity And Respond
      • Read The Sample Breach Letter And Describe How Two Different Economics Theories & Two Different Social Sciences Theories Relate To The Letter
      • Review Andriy Slynchuk List Of Eleven Things Internet Users Do That May Be Illegal. What Are The Five Most Serious Violations And Why Do You Think Those Offenses Are Serious?
      • Watch This Video & Describe What You Think About The Speaker’s Pathway To His Career
  • Contact
Proudly powered by WordPress | Theme: Afterlight by WordPress.com.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept