We have many misconceptions about cybersecurity. Here, hackers tell you about some of our misconceptions. What personal misconceptions did you have before you started to study cybersecurity? Have those been proven right or wrong?
Category: CYSE 201S Cybersecurity and the Social Sciences
Journal 5: Motives for Cyber Offending
Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.
Cybercrime Theories
Identify which theories you think best explain cybercrime and discuss what you like about that theory.
Journal 4: Hierarchy of Needs
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
Journal 3: Data Breaches and Privacy
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? What branch or branches of Social Science do you think would benefit the most from a site hosting this information?
Journal 2: Cybersecurity and the Principles of Science
Define each of the principals of science in your own words. Then, give an example of how each of the principals relates to cybersecurity.
Journal 1: NICE Workforce Framework
Review the NICE Workforce Framework. Rank the categories based on how much they interest you. Write about why your top three categories interest you. In addition, write about your lowest ranked category and why you think it would interest you the least?