Journal Entry 4

Assignment Description: “Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.” Maslow’s first stage, physiological, has become much easier to access with moderntechnology. Food delivery services like UberEats or Grubhub have made it easier…

Journal 5

Assignment Description: “Review the articles linked with each individual motive in the presentation page… Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.” #1: Multiple Reasons makes the…

Journal 3

Cybersecurity researchers could use the information on PrivacyRights.org to study databreaches by looking through the website’s archive of past breaches, company responses tobreaches, and legal responses to breaches. The website would be a major assisting tool in databreach research because the information is already filtered and sorted in many ways. Informationlike the types of breaches,…

Journal 2

The principles of science relate to cybersecurity by making sure research and policyin the field is accurate and ethical. While cybersecurity is not researching a “hardscience,” it is still connected to studies on the behaviors of hackers, employees, and theusage of technology to monitor and gather data on individuals. Parsimony, empiricism,skepticism, and relativism all ensure…

Journal 1

Reading through the NICE Workforce Framework, the area I am most interested in is Design and Development. Specifically, I am interested in the development, assessment, and testing career fields under it, as I find the software and coding sides of cybersecurity the most enjoyable and would like to pursue a side of the field more…