Review the articles linked with each individual motive in slide/page #3. Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 8). Explain why you rank each motive the way you rank it. After reviewing the articles linked, I have come…
Category: Journal Entries
Journal Entry #4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of Needs connects strongly to technology. At the physiological level, technology supports basic needs through food delivery apps, online grocery services, and health…
Journal Entry #3
Visit PrivacyRights.orgLinks to an external site. to see the types of publicly available information about data breaches. How might researchers use this information to study breaches and forecast future data breach trends ? Enter a paragraph in your journal. While exploring PrivacyRights.org’s Data Breach Chronology, I noticed how detailed and organized the data is. The site tracks publicly reported data breaches…
Journal Entry #2
How does the principle of empiricism enhance the effectiveness of cybersecurity practices? Reflect on how empirical data collection and analysis can help identify emerging threats, assess the effectiveness of current security measures, and guide the development of new strategies to protect information systems. The principle of empiricism enhances cybersecurity because it emphasizes using real evidence…
Journal Entry #1
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas are most appealing to you and which are least appealing. After reviewing the NICE framework for cybersecurity, I have found a few areas where I would like to focus on my career. Based on my motives,…