Review the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it. Entertainment (6): Makes a little amount of sense because there is nothing to be…
Category: CYSE 201S Journal Entries
Module 14
Complete the Patchin and Hinduja’s cyber bullying survey. Aftercompleting the survey, discuss how you think criminologists mightuse the surveys to explore relationships between the different items. I think criminologists can use the surveys to find patterns in answers. If they are able to see a pattern in results they can implement those answers into solving…
Module 13
There was no journal entry for module 13.
Module 12
Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. 1. Bullying: Bullying is a serious issue because when people decide to indulge in bullying online it is usually a gateway into many more serious crimes. Child pornography is a big example,…
Module 10
Watch this video. As you watch the video, think about how thedescription of the cybersecurity analyst job relates to social behaviors.Write a paragraph describing social themes that arise in thepresentation. Watching this video I could see many instances where a cyber security analyst job relates to certain social behaviors. One instance is the basis of…
Module 9
Complete the Social Media Disorder scale. How did you score? Whatdo you think about the items in the scale? Why do you think thatdifferent patterns are found across the world? When I took the social media disorder scale I found myself to score a 2/9. Personally I think that this score was pretty mild. I…
Module 8
After watching the video, write a journal entry about how you thinkthe media influences our understanding about cybersecurity. I think that the media gives us some sort of misinformation about cybersecurity in general. Every time you see on tv something about hackers or cyber defenders they seem to throw out many “tech” words that make…
Module 4
Review Maslow’s Hierrachy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need. Physiological needs: These are basic needs, I would equate this to knowing the very basics of using a computer. Turning it on, logging in and out of…
Module 3
Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. Researchers can definitely use the majority of the information that the database includes to primarily focus on how to stop a certain type of breach. They can see what…