Ranking the motives from what makes the most sense to what makes the least, I started with “For money” being the one that made the most sense. Since what the motive is providing to these hackers who may participate in unethical hacking, is something they can do mostly anonymously and the money they make from…
Journal Entry 4
Reviewing Maslow’s Hierarchy of Needs and thinking about how I can relate to an experience I have had with technology is something that is a long history, since I’ve grown up with technology but more on a internet social network rather than the classic social media inclusion people often feel they miss out on by…
Journal Entry 3
Researchers might use this information to study breaches by being able to see data that is collected about data breaches in a wide range of ways that are interactive. The map that is provided by “Privacyrights.org” is a map of the USA that shows hotspots of reported data breaches country wide and shows which states…
Journal Entry 2
How the principles of science relate to cybersecurity is that they both serve as guidelinesfor further progression in the respective fields. At each principle although they are for morenatural sciences as opposed to social science that encompasses cybersecurity, we see that theprinciples are also applicable to help guide researchers in the work. A clear example…
Journal Entry 1
After reviewing the NICE Workforce Framework and taking a look at the Work RoleCategories and reading their brief descriptions of the repective work roles in each category, thereis some areas that I would like to focus more on in my career on. One of the first areas thatappeals to me is the category “Oversigh and…