I scored a one on the social media disorder scale, indicating normal social media use. This test was easy for me because I use only one social media platform, and it is only for entertainment. I think a person who uses social media for content would have more ‘yes’ responses when taking the social media…
“Exploring the Mind of Cybercriminals to Prevent Crime” Article Review #2
Introduction Cybercrime is a crime that continues to grow as technology advances. According to the article “Exploring the Psychology Profile of Cybercrime: A Comprehensive Review for Improved Cybercrime Prevention, Cybersecurity can target individuals, corporations, and governments, often resulting in significant financial losses, reputational damage, and privacy breaches (Holt &Bossler, 2015; Kshetri 2018). As mentioned in…
“The Power of Media” Journal 8
After watching the YouTube video “Scientists rate 65 scenes from movies and TV: How Real is it,” it is proof that you cannot believe everything you see on TV. Of course, you should not. However, if you are not educated on how specific systems work, you may think what you watch on the media is…
“Cybersecurity Memes Edition”
Meme: “When you’re trying to protect yourself and the system from a virus.” Explanation related to Human Centered Cybersecurity: This is a photo of two individuals wearing masks, most likely during COVID, while working on a task in the office. This photo highlights that although you are following protocols to protect a system, you can…
“The Risks & Benefits of Digital DNA”
The evolution and growth of using digital DNA raises a huge concern for many. Although the use of digital DNA could be helpful for medical research purposes, it can also be a focus for cybercriminals to hack your information. The article “Hacking Humans: Protecting Our DNA from Cybercriminals” discusses the risk of digitization of human…
“Protecting Digital DNA”
After reading “Malicious code written into DNA infects the computer that reads it” and Hacking Humans: Protecting Our DNA from Cybercriminals, I have learned that biology is increasingly digitized, raising serious biosecurity concerns. Since DNA is typically stored in databases, this poses a high risk of potential hacking. This stored information can be hacked and…
“Cyber Defense Starts with You” Journal #6
After watching the YouTube video, The Human Firewall: Why Cybersecurity Isn’t Just a Technical Problem, it becomes clear how convenient and easy it is for a hacker to view your information without having to share your personal information (through phone, WIFI connections, or the use of online credit cards. The video discussed how the speaker…
“Cybersecurity’s Big Three” CIA Triad
CIA triad is a model that should be used by all organizations to not only protect sensitive information or ensure availability, but also to bring awareness to understand the foundation and best practices better. As mentioned in Chai (2022), some best practices, divided by each of the three subjects, should include: For Confidentiality, data should…
“Controlling Cyber Crime Through Behavior” Article Review #1
Introduction According to Arabia, (2025), it is important to have a trustworthy upper management team to run a successful organization. After reading this article, I believe it is also necessary to have employees who believe in the company’s mission, are involved in training and cybersecurity awareness, and share the company’s culture. As mentioned in the…
What’s The Motive”
After reviewing the articles of examples of each motive, I would rank money as number one. I’m sure we all have heard the phrase “Money is the root of all evil”. I believe that individuals who commit cybercrime are often motivated by financial gain, although not always. As highlighted in the article “Sex, Drugs and…