Module 5

Review the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it. Entertainment (6): Makes a little amount of sense because there is nothing to be…

Module 14

Complete the Patchin and Hinduja’s cyber bullying survey. Aftercompleting the survey, discuss how you think criminologists mightuse the surveys to explore relationships between the different items. I think criminologists can use the surveys to find patterns in answers. If they are able to see a pattern in results they can implement those answers into solving…

Module 13

There was no journal entry for module 13.

Module 12

Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. 1. Bullying: Bullying is a serious issue because when people decide to indulge in bullying online it is usually a gateway into many more serious crimes. Child pornography is a big example,…

Module 10

Watch this video. As you watch the video, think about how thedescription of the cybersecurity analyst job relates to social behaviors.Write a paragraph describing social themes that arise in thepresentation. Watching this video I could see many instances where a cyber security analyst job relates to certain social behaviors. One instance is the basis of…

Module 9

Complete the Social Media Disorder scale. How did you score? Whatdo you think about the items in the scale? Why do you think thatdifferent patterns are found across the world? When I took the social media disorder scale I found myself to score a 2/9. Personally I think that this score was pretty mild. I…

Module 8

After watching the video, write a journal entry about how you thinkthe media influences our understanding about cybersecurity. I think that the media gives us some sort of misinformation about cybersecurity in general. Every time you see on tv something about hackers or cyber defenders they seem to throw out many “tech” words that make…

Module 6

Can we create three fake websites and three real websites and askthem to spot what makes them fake? It would definitely be possible to create 6 websites and be able to identify which ones are real and which are fake. Most of the ways to be able to tell would be in the details of…

Module 4

Review Maslow’s Hierrachy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need.   Physiological needs: These are basic needs, I would equate this to knowing the very basics of using a computer. Turning it on, logging in and out of…

Module 3

Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. Researchers can definitely use the majority of the information that the database includes to primarily focus on how to stop a certain type of breach. They can see what…