Journal Entry 12

Andriy Slynchuk has described eleven things Internet users do that may be illegal.  Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.  The proliferation of significant cyber-crimes emphasizes the importance of safe online conduct. According to Andriy Slynchuk, the most serious…

Journal Entry 11

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf  sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.    Economic theories, such as cost-benefit analysis and market failure, are relevant to the sample data breach notification letter. Its emphasis on the costs associated with the breach, such…

Journal Entry 10

Watch this video.  As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation.  As presented in the video, the job description of cybersecurity analyst position touches several social themes. Such professionals closely collaborate with…

Journal Entry 9

Social media and cybersecurity  Complete the Social Media Disorder scale.  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world?  A self-reported tool called the Social Media Disorder scale is used to gauge how addicted a person is to…

Journal Entry 8

Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? – YouTube  After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity  As I watched the video “Hacker Rates…

Journal Entry 7

Review the following ten photos through a cybersecurity human systems integration framework.  Create a meme explaining what is going on in the individual’s or individuals’ mind(s).  Explain how your memes relate to Human Systems Integration.  1. Someone is seated in front of the laptop: “Just one more assignment before I start my episode.”  2. Individual…

Journal Entry 6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?  https://supermario-game.com/#google_vignette One can play various Super Mario games online for free on this website. Despite its appearance as the official Mario website, it is a scam designed to trick users into…

Journal Entry 5

Review the articles linked with each individual motive.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.Entertainment   Political   https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms  Revenge  https://newsfromwales.co.uk/news/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net/  Boredom  https://www.heraldlive.co.za/news/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase/  Recognition  https://www.theregister.com/2021/06/30/bradley_niblock_election_ddos/  For money   https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/ …

Journal Entry 4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.  Give specific examples of how your digital experiences relate to each level of need  Maslow’s Hierarchy of Needs psychological theory describes and ranks human needs as the driving forces behind behavior. This hierarchy comprises five levels: physiological, safety, love…

Journal Entry 3

Visit PrivacyRights.org to see the types of publicly available information about data breaches.  How might researchers use this information to study breaches?  Enter a paragraph in your journal.  PrivacyRights.org offers several ways of investigating data breaches, and scholars can use this information. To determine the frequency and seriousness of such incidents over time, they can…