Policy Analysis Paper Topic. For the assignments below you will need to select a topic that needs to be approved by the instructor. Once you choose a policy/strategy for the four policyanalysis papers and it was approved by the instructor, you… Continue Reading →
On two occasions during the semester, students will write an article review using social science cybersecurity studies and should follow the rubric closely. Article 1 review will be derived from a scholarly journal. The reviews should focus on (1) how the topic… Continue Reading →
*Please do not click on any links in this article* Fake websites seem easy to catch, but that is not always true. The difference between a fake and real website can be as simple as 1 added letter to the… Continue Reading →
I love how he explained this topic and showed just how easy it can be. He has a great point that humans can be the greatest weakness. People talk to strangers they find things to relate to others. Whether this… Continue Reading →
Answer both of the following questions: Many security companies have top-of-the-line software, yet cyberattacks still happen every day even if they are not reported. I don’t think anyone is ever 100% safe. I do think you can greatly decrease the… Continue Reading →
References: Carole, J. (2021, April 8). Sex, Drugs and Toilet Rolls: How Cybercriminals Spend Their Money (infographic). HP Wolf Security. https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/ Corfield, G. (2021, June 30). 8-month suspended sentence for script kiddie who DDoS’d Labour candidate in runup to 2019… Continue Reading →
I believe that cognitive theories are most closely related to cybercrime. People who rob banks do need the money and most do not tend to hurt people in some theories it is that they believe the bank has money and… Continue Reading →
What I understood from this talk, is discussed how the world has become dependent on technology. In times when the internet is down, panic is involved. The internet leaves more vulnerability as banking, taxes, etc are primarily used online now…. Continue Reading →
There are 5 levels to Maslow’s Hierarchy of Needs. From top to bottom, the levels are self-actualization, esteem, love and belonging, safety needs, and physiological needs. I strive to work hard in everything I do and pushing myself to study… Continue Reading →
Cyber victimization happens very commonly in today’s day and age. Recently, there has been a spike where many people “hype” up someone in the media and praise them, but then suddenly something is done that turns the users away. In… Continue Reading →
Reference: IBM warns of rising VoIP cyber-attacks. CSO Online. (2016, December 1). https://www.csoonline.com/article/559047/ibm-warns-of-rising-voip-cyber-attacks.html
This site gives various statistics and laws regarding privacy rights and gives the most recent information on data breaches. Previous studies and documents are posted giving aspiring researchers insight and plans. Understanding and adding additional information regarding these breaches can… Continue Reading →
Clarifying information: Definition: Computer hacking is broadly defined as intentionally accessing a computer without authorization or exceeding authorized access. Various state and federal laws govern computer hacking. The federal Computer Fraud and Abuse Act provides details as follows: definitions.uslegal.com/c/computer-hacking/ From… Continue Reading →
There are seven principles of science topics: relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. The principle of relativism explains how all things are related to one another. An example of this can be technology leading to cyberspace, new crime… Continue Reading →
One of the careers that I would consider is an ethical hacker/ penetration tester. Using my skills for good and understanding an attacker’s motives would be beneficial and intrigue me. Computer Forensics analysis is another field at the top of… Continue Reading →
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑