Short Arm of Predictive Knowledge

Hans Jonas’s concept of the “short arm” of predictive knowledge highlights a major limitation in our ability to foresee the long-term consequences of emerging technologies. When applying this to the development of cyber-policy and infrastructure, it becomes clear that traditional reactive models are no longer sufficient. Cyber threats evolve faster than our regulations, and by…

Hacking Humans

The article “Hacking Humans: Protecting Our DNA From Cybercriminals” highlights the increasing risks associated with digitizing human DNA, particularly through direct-to-consumer DNA testing services. While these services have gained popularity due to curiosity about ancestry and medical advancements, security and ethical concerns are issues as well. One of the main concerns is the DNA is…

Cyber Roles & Responsibilities

The role I choose was the Information Security Officer because it plays a pivotal role in an organization’s framework in cybersecurity. The ISO ensures that security policies, risk management strategies, and compliance efforts align with industry standards and regulations. This role is crucial for maintaining the integrity, confidentiality, and availability of the organization’s information assets….

How has cyber technology created opportunities for workplace deviance?

Cyber technology has made it a lot easier for people to break the rules at work without getting caught, at least not yet. Workplace deviance is defined by violating company policies. Since everything is digital and online, it is hard to keep track of what everyone is doing. Employees can steal sensitive data or share…

Article #1

Article Review #1: Testing Human Ability to Detect ‘Deepfake’ Images of Human Faces:Kevin Person February 15,2025IntroductionThe Article “Testing Human Ability to Detect ‘Deepfake’ Images of Human Faces” by Nightingale, Wade, and Watson (2023), publishes in the Journal of Cybersecurity, explores the effectiveness of human detection of deepfake images generated by StyleGAN2. The study examines the…

Article #2

Article Review 2Cyberbullying and Psychological Stress among Female EmployeesThe article “Cyberbullying and Psychological Stress among Female Employees”by Mohammed A. Al Doghan and Saman Arshad explores the negative impact ofworkplace cyberbullying on female employees in Saudi Arabia. The study examines the relationship between cyberbullying, psychological stress, organizational commitment, perceived interactional justice, and job satisfaction. This research…

NICE Framework

The seven categories of the NICE workforce framework of Cybersecurity are all very important, but oversight and governance (OG), investigation (IN), and cyberspace effect (CE) is more appealing to my employment history. I always held a position of leadership in my career and with these certain focus roles, I could easily adapted to the role…

Maslow’s Hierarchy of Need

Maslow’s Hierarchy of Needs connects to my digital experiences in various ways. The bottom tier is physiological needs, it provides access essential services like food and health. DoorDash and Uber Eats are useful when no time to cook. Fitness apps provide improvements in health by monitoring levels and goals. Safety needs is the next tier…

Top 3 Motives

1. Financial Gain (Most Sensible): The article “Sex, Drugs, and Toilet Rolls” article discusses how cybercriminals use stolen funds to support their lifestyles. Money is the most common and practical reason for cybercrime. Hackers often steal data, conduct fraud, or use ransomware to make money. 2. Hacktivism (Political/Activism): The “Hacktivism Wave” article describes how young…

Fake Website

Fake websites attempt to deceive users by imitating legitimate platforms. For example, a fake PayPal website (e.g., “paypall-login.com”) mimics PayPal’s login page to steal credentials, whereas the real PayPal site (paypal.com) has a secure HTTPS connection and verified domain (Aura). Another is DMV sites (e.g., “dmv-services.org”) tricks users into paying fake fees, while official DMV…