Article Review #2

The article, “Cyberbullying and Psychological Stress among Female Employees” by Al Doghan and Arshad delves into a prevalent issue that many individuals face in their professional lives: cyberbullying. This research explores the impact of workplace cyberbullying on female employees employed across diverse organizations in Saudi Arabia. To comprehensively analyze this study and its implications, this…

Module 9

Complete the Social Media Disorder scale. How did you score? Whatdo you think about the items in the scale? Why do you think thatdifferent patterns are found across the world? On the social media disorder scale, I scored a 2/9 meaning that only 2 of the items pertained to me. The items in the scale…

Module 8

Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTubeLinks to an external site. After watching the video, write a journal entry about how you think the media influences our understanding of cybersecurity. After watching the…

Module 7

Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration. https://unsplash.com/photos/mfB1B1s4sMc https://unsplash.com/photos/gySMaocSdqs https://unsplash.com/photos/ICTKcvnXx_8 https://unsplash.com/photos/Z3ownETsdNQ https://unsplash.com/photos/5QgIuuBxKwM https://unsplash.com/photos/R6dSBkz32B8 https://unsplash.com/photos/BXiLSwwvqrY https://commons.wikimedia.org/wiki/File:Computer_user_icon.svg https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).jpg

Module 6

Can you spot three fake websites and compare the three fake websitesto three real websites, plus showcase what makes the fake websitesfake? Real Websites: https://www.amazon.com/ https://www.walmart.com/ https://www.sephora.com/ These are recognizable well-known brands. They use HTTPS to encrypt data and ensure user security. They have contact information such as email addresses and phone numbers. The website…

Article Review #1

The article, “Role of Artificial Intelligence in Cybersecurity” by Arab Mohammad Shamiulla, discusses the alarming rise in cybercrimes and the increased need for artificial intelligence in the cybersecurity field. The topic of the integration of Artificial Intelligence into cybersecurity is tied to several social science principles. It explores the intersection of technology and society, emphasizes…

Module 5

Review the articles linked with each individual motive. Rank themotives from 1 to 7 as those that make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it.

Module 4

Review Maslow’s Hierarchy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need. BASIC NEEDS Physiological: These are basic needs to help us survive. Technology allows us to order food, find recipes to cook, book a hotel, and buy a…

Module 3

Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. This website is a valuable tool for researchers to understand and analyze data breaches. The information that can be found includes the range of dates of the breaches, the…

Module 2

Explain how the principles of science relate to cybersecurity. This means that all things are related, and a change in one system leads to a change in other systems. This principle helps us to recognize that when societal systems change, it leads to changes in cybersecurity as well. This is the way that scientists study…