ODU Logo

Joshua Aurelio

Psychology Major

eP Blog Post 13: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Cyber policy development is an essential part of regulating and maintaining the security of digital technologies. As they develop, more safeguards and policies need to be implemented to ensure that people are not exploited by the use of those technologies…. Continue Reading →

eP Blog Post 12: How does cyber technology impact interactions between offenders and victims?

Cyber technology allows for new avenues by which criminals can antagonize victims. As technology evolves, criminal activities evolve concurrently, offering new methods by which offenders can exploit civilians or do them harm. Fraud, cyberbullying, disturbing the peace, blackmail, ransom, etc…. Continue Reading →

eP Blog Post 11: What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

With the incorporation of computers within the government, business, and personal use all across the globe; the need to regulate the traffic that flows through it becomes increasingly important. Criminals have existed since the creation of the first law (or… Continue Reading →

eP Blog Post 10: How do engineers make cyber networks safer?

The modern era has brought about new and advanced technologies that assist in bettering public goods and infrastructure. That infrastructure maintains towns, cities, counties, and the country at large. Engineers are the backbone by which that infrastructure is maintained and… Continue Reading →

eP Blog Post 9: Describe three ways that computers have made the world safer and less safe.

Computers are a technological marvel, being a machine that can complete a myriad of tasks, store an immeasurable amount of data, and act as search engines by which any conceivable piece of information can be searched or documented. Computers and… Continue Reading →

eP Blog Post 8: How can you tell if your computer is safe?

A personal computer system maintained by an individual as opposed to an organization tends to be a lot easier to manage. The main avenue by which the security of a personal computer is maintained and authorized is via a password… Continue Reading →

eP Blog Post 7: What are the costs and benefits of developing cybersecurity programs in business?

All businesses, big or small, should maintain some sort of cybersecurity protections to ensure the safety of the business as a whole and the personnel employed within it. However, the endeavor to create a cybersecurity program or elicit the assistance… Continue Reading →

eP Blog Post 6: How has cyber technology created opportunities for workplace deviance?

Cyber technology is a remarkable milestone of human progress. A relatively new concept that was unheard of near to half a century ago. However during the course of human events, there has and always will be those who are willing… Continue Reading →

eP Blog Post 5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.

Cryptocurrency procurement and security consulting.YouTube Content Creator discussing cybersecurity topics.Building firewalls for businesses in effort to prevent foreign intrusions. Enforcement against cybercrime via a career in Law Enforcement Information Technologies. Recreate and defeat significant cyber attacks to systems for training… Continue Reading →

eP Blog Post 4: Compare cybersecurity risks in the U.S. and another country.

The United States of America is one of the major global superpowers on the globe. Technologically speaking, the United States maintains a very high standing within the realm of cybersecurity. With many organizations both in the public and private sector… Continue Reading →

« Older posts

© 2025 Joshua Aurelio — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑