How does cyber technology impact interactions between offenders and victims in this week’s journal question and I will dive into what these interactions are. Back when computers were not a thing and people were either bullied by classmates or just everyday people, the person who was bullied could try and avoid these people. by doing…
Journal #10
In this Journal I will talk about what is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class? The overlap between criminal justice and cybercrime is major, you can not have cybercrime without involving criminal justice, as cybercrime is a crime. This means…
Journal #9
This Journal is about how How engineers make cyber networks safer. The process of making cyber networks safer is complicated. This is because if it is a large network a large amount of people use it every day. The way these engineers makes these networks safer is complicated but are very advantages to a cyber…
Journal #8
Describe three ways that computers have made the world safer and less safe. Computers are a revolutionary invention that changed the world for the better. But some parts that come with computers also cause damage as well as good. In this Journal I will talk about 3 examples of this. The internet is full of…
Journal #7
This week’s Journal is asking how to tell if a computer is safe, and this is a very hard question to answer, and it really depends on quite a few circumstances. The first key circumstance is whether the computer is owned by the user or a public computer. Public computers have a higher threat than…
Journal 6
In this week’s Journal question we are talking about How cyber technology created opportunities for workplace deviance. You must first understand what deviance is and how it portrays cyber tech before a person can answer this question. Deviance can be defined as an action or behavior that violates social norms, including a formally enacted rule,…
Journal #5
C- create anti-virus software Y-yield results in helping companies with cybersecurity B-e useful to a company and work for them E-xceed job expectations R-ender old software useless by coming up with new software S-top major cyber attacks E-nsure no one is hacked again C-enterlize cybersecurity in America U-tilize AWS and make a security firm like…
Journal 4
The USA is very different from other countries for many reasons but one of its biggest issues is that it is a world superpower. This might make a person think why is it an issue, and it is because it makes them a target. They have data that is very valuable compared to a country…
Journal #3
There are always ethical issues everywhere, Computers are no different. In this journal, I will describe 4 different ethical issues that come with storing electronic information about individuals. The first one is surprising about cars, self-driving ones. As these cars have to constantly store data about what is around them I think this problem falls…
Journal #2
A major that ODU provides that some might not think about that requires amazing cybersecurity to make sure the job is done well is accounting. For larger companies their accounting department is one of the most important, but not a lot of accounting is done by hand anymore, most of it is done through programs…