Maslow’s Hierarchy of Needs and how they relate to technology 

In relation to physiological needs are primarily essentials that are needed in order to survive such as food and water. Technology enables applications such as sleep apnea machines which keep people alive during sleep. Other technology would include safety features such as a ring doorbell which makes it possible to see who’s at your front…

How might researchers use information on Privacyrights.org to study breaches?

When visiting the website PrivacyRights.org I instantly noticed how researchers use thisinformation to study and become informed about breaches. When opening the page it came upwith information regarding the law overviews, reports, and advocacy. After going into depth inthe Advocacy tab there were a variety of articles that can inform researchers from lawsregarding breaches or…

Explain how the principles of science relate to cybersecurity.

Science and Cybersecurity have a deep coherent bold that interlinks the two in avariety of ways. Science is the observation and identification of a theoretical explanation.Cybersecurity relates to science as one of the major aspects of defending a system andobserving that system against threats. I would describe cybersecurity as a defense againstsystems and devices. I…

Are there certain areas that you would want to focus your career on?

When reviewing the NICE Workforce Framework I would like to focus on specificallyInvestigating, overseeing and governing, and protecting and defending. I would appeal less toanalyzing, operating and maintaining, collecting and operating, and Securely Provision. I wouldlike to focus on investigating as it applies to becoming a cyber investigator and a digitalforensics specialist. I would say…

How does Routine Activity Theory explain the interactions of individuals involved in Illegal Gambling on the DarkNet? (article review 2)

This topic relates to the field of social sciences as it very much relates to criminology and sociology. Human behavior is studied through why these individuals commit the cybercrimes there motivations which also relates to criminology. I hypothesize that Routine activity Theory explains how and the reasoning behind individuals’ gambling is for profit or to…

Career Paper

Information security analystsIntroductionA dynamic and multifaceted job, information security analysis heavily depends on thefusion of social science concepts and research techniques. Information security analysts’success is greatly impacted by their comprehension of organizational dynamics, humanbehavior, and larger societal contexts in addition to their technical proficiency. This is shownthrough human behavior with computers, social networks, and risk…

How the Career of Digital Forensics Investigators Relates to the Social Sciences

Investigators in digital forensics play a critical role at the nexus of social sciences and technology. When examining cybercrimes, investigators look beyond the digital world to examine human motivations and behavior. The field acknowledges that sociocultural elements have an impact on online actions, thus research must comprehend the psychology underlying cyber threats. Furthermore, as technology…

things Internet users do that may be illegal

The five most serious violations in my opinion are bullying and trolling, faking your identity, sharing information, collecting information regarding children, and using other people’s internet. I would say that bullying and trolling are a violation as it breaks many cyberbullying laws as well as can cause people to commit self-harm and even suicide just…

Hacking for good

When reading this article what stood out was the bug bounty significance and how companies have to utilize freelance hacker skills to find vulnerabilities. By using different data the study is better versed and more accepted within the cyber community. For instance, using data from HackerOne provides evidence and provide findings such as the prices…