Discussion 14

Watchthis video Links to an external site. https://www.youtube.com/watch?v=DOGUzKJ7HogLinks to an external site. and explain what it has to do with routine activities theory.   The Routine Activity Theory is a theory that suggests that crime occurs when there elements are involved a motivated offender, a suitable target, and the absence of a capable guardian. The shoppers were…

Discussion 11

What does economics have to do with cybersecurity?  Economics and cybersecurity are closely connected. The economic implications of cyber threats and the investments made in cybersecurity measures highlight the need for a comprehensive understanding of the economic factors influencing cybersecurity decisions and actions. Economics plays a crucial role in shaping the landscape of cybersecurity. Organizations,…

Discussion 10

Identify two research questions that researchers might address related to the social aspects of cybersecurity.

Discussion 9

Watch this videohttps://www.youtube.com/watch?app=desktop&v=7TpsYofbAPALinks to an external site. about a 12-year-old cyber security expert. Pay attention to how he has embedded himself into the cybersecurity culture. Also, pay attention to how the ideas of knowledge, technology, and secrecy relate to his expertise. On the discussion board post an entry about how the video relates to something you…

Discussion 6

Cyber ThreatsWatch this video https://www.youtube.com/watch?v=BpdcVfq2dB8and pay attention to what the biggest risk of cyber threats are. Afterwatching the video, post an entry in the discussion board describingwhat you think about the “human firewall”. The human firewall can be defined as people in an company whose role is to protect information from cyberattacks. During the Ted Talk, …

Discussion 5

Identify which theories you think best explain cybercrime and discuss what you like about that theory.  I believe that the theories that really best explain cybercrime would be the social learning theory. This theory shows that most criminal activity is committed when surrounded by other people. In terms of cybercrime the social learning theory also…

Discussion 4

Post a comment in the discussion board answering the question: “Apply the phrase victim precipitation to cyber victimization” Victim precipitation is that people may initiate things that can cause them to end up being consider a victim of a situation and cyber victimization is when someone is a victim through the use of communication technologies….

Discussion 2

What do you think about the principle of determinism as it relates to computer hacking? Computer hacking is an attempt to try to gain access over another network system and determinism is basically entails that humans can’t act otherwise than they do

Discussion 1B

Describe the top three careers of social science graduates that youwould be interested in considering. What is it about those jobs thatyou find interesting? After looking at some of the careers of a social science graduates a couple of them that I would be interested in considering is Psychology, Sociology, and potentially leadership. I think…

Discussion Board 1A

• Introduce yourself in the discussion board. Include your major, your classstanding (freshman, sophomore…), anything else that you would want us toknow• Have you taken an asynchronous class before? If so, which one/s?• What are your goals after graduation, if known? I am Justin Almond I’m in my junior year of school my major is cybersecurity. I have…