Journal

Journal: 1

I think I am a self-starter because I think of ways to expedite a workload.  From my previous experience, I do not always follow through with my plans because I am either too busy with college or the military. This class is making my idea`s come true because now it is a class requirement and I feel great that now I can get the ball rolling. I would like to think that I get along with all types of personalities because in the army I have met so many different types of people with different personalities. I am very confident when it comes to decision making because if I was not I would not be in the position I am today. I would like to think I have the physical and emotional stamina because one thing I have learned in the military is to never quit and keep trying again. I am still working on my organization skills, they are usually messy but I always make the deadline and I always know where my material is located.  I think my entrepreneurial efforts will affect my family in a positive way because it is better to do something than nothing at all to better your life situation.

Journal: 2

Today I am working on my proposal because my submission was not perfected yet. The problem we ran in to was deciding how this project would correlate to my major, which is cybersecurity. This was not a hard decision to make because our first proposal was how to become an ROTC cadet. The next step was to make it relate to my major. I am going to be a cybersecurity officer in the military and thought that it would be better to do a workbook on how to become a cyber security officer. This would be great because I know the steps and the process of doing it.

Journal: 3

The start of my proposal has been challenging because there are so many options I can choose from. My main focus is to help students who are thinking of pursuing the path I have chosen during my college career. I know that everyone has there own path but I believe that in some way we all come to a point where we all meet that decides our future. The idea that I have come up with is to make a workbook that explains how to become an Army Cybersecurity Officer, the problem is that normal people are scared to become a military member because only one percent of the world’s population is military. Army Cybersecurity Officers are one of the most demanding position in the military. All military leadership courses take place both in the classroom and in the field and are mixed with normal academic studies. This workbook relates to my major because we are about to be commissioned officers in the military. My major is cyber security and I have chosen to be a commission officer in the branch of cybersecurity. But the problem I thought of, is how I got to this point. No one in the military talks about the process of becoming a CyberSecurity Officer while pursuing a bachelor degree. I would like to help students gain knowledge of this process. Some people like to join the military after they finish and obtain a degree. This workbook can help the students who are pursuing cybersecurity gain more options than civilian life. This workbook will be something I wish I had before joining the military.

Journal 4

Working on my workbook today and I have decided to make some searches to help me with creating a workbook. The first thing that came to mind is how the process would work. First, I searched all the requirement you need in order to be eligible to become a cyber security officer. Then I had compiled them together and started making a list of stuff that I should put into the workbook.

Journal 5

Now that I have all the requirement set aside today, I searched all the different ways you can become a cyber security officer. You can be an ROTC cadet or graduate from college with a bachelor’s degree and try to join the military that way. I have found a lot of information that can help a student choose their best path.

Journal 6

I have thought about the benefits I got becoming an ROTC cadet pursuing cybersecurity. These will be incorporated into the workbook. So today I searched all the benefits that a cadet will receive when pursuing this path of cybersecurity and all the resources that can help.

Journal 7

I have a lot of data so far, but I feel like the search is not over yet. Civilian life is an easy process when trying to become a cybersecurity officer because you just apply for it after graduation. I went and searched all the data I could find on becoming a cybersecurity officer the civilian way and its benefits.

Journal 8

With all of the information I have access to, I decided today I would make an index for my workbook because I need to know what I will be putting in my workbook and also I need to know what pages the information will be on.

Journal 9

This has been a long week because my exam has been starting for the summer so today, I did not encounter any problem when working on my workbook. I contacted my team member and showed him some of the resources I have found so we could start thinking on how to put this workbook together.

Journal 10

For my last journal this month I decided on answering some questions. My overall perspective on the entrepreneurship experience is great so far because I think that this book could be huge in helping other people out with cybersecurity. The benefits of the entrepreneurship placement from your perspective is that this class helped me see how I got to this point and how it can help other people do the same. The best thing I like about the experience is how to create a workbook. I like learning new things, and this benefits me because I am learning while creating something new. The last thing I like about this experience is knowing where to put all of this information I found on this workbook.

journal: 11

Today I am looking up ways to publish the workbook. This process to some time because there are so many ways to publish a workbook. The easiest way that I found to publish a workbook so far is to use the workshop for workbooks. They also give you the step you need in order to be successful: Outline your workbook content and create engaging questions Use InDesign’s tools and features, Create and set up your document, Create a branded cover page, Create Master Pages to save you hours of time, Create complex layouts super easily, Save your workbook for easy printing by your audience, Deliver your workbook to readers, Promote your workbook

journal: 12

Today I have decided to research another way to publish my workbook. Tableau Server and Tableau Online are great options for publishing and sharing Tableau content. Tableau Server provides browser-based analytics without the need to download software. Tableau Online is the hosted SaaS version of Tableau Server and can also be used to publish and share dashboards and workbooks. If the Tableau Server administrator has granted the appropriate permissions, users can share their Tableau content from within Tableau Server.  With Tableau Server, content can be organized into sites, projects, and groups; providing a better collaboration environment. Content can be shared via the share icon in Tableau Server (shown below). The share icon can be used to email a link to the workbook or embed a URL on a web page. Users can then access the published Tableau content via a web browser. Users can also subscribe to workbooks or worksheets published on Tableau Server. These workbooks can be set up for automatic refresh, ensuring the latest view of the data. If end users are given edit permissions, they can make changes within Tableau Server’s web authoring environment. As is the case for Tableau Mobile, users accessing this content will need the appropriate Tableau Server or Tableau Online license.

journal: 13

For the next 8 days, I decided to find one scholarly source for my academic paper and listed below is the citation. After I found the scholarly source, I took some of the information out and put it toward my academic paper because it has to be 8 pages and 8 sources worth. Arachchilage N. A., Love S. (2013). A game design framework for avoiding phishing attacks.Comput. Hum. Behav. 29 706–714. 10.1016/j.chb.2012.12.018 [CrossRef] [Google Scholar]

journal: 14

For the next 8 days, I decided to find one scholarly source for my academic paper and listed below is the citation. After I found the scholarly source, I took some of the information out and put it toward my academic paper because it has to be 8 pages and 8 sources worth. Army Cyber Branch Annex (2017). Army DA PAM 600-3Cyber Branch. Available at: https://www.armystudyguide.com/content/publications/da_pams/da-pam-6003.shtml [accessed April 15, 2018]. [Google Scholar]

journal: 15

For the next 8 days, I decided to find one scholarly source for my academic paper and listed below is the citation. After I found the scholarly source, I took some of the information out and put it toward my academic paper because it has to be 8 pages and 8 sources worth. Asgharpour F., Liu D., Camp L. J. (2007). “Mental models of computer security risks,” inProceedings of the International Conference on Financial Cryptography and Data Security eds Dietrich S., Dhamija R., editors. (Berlin: Springer; ). 10.1007/978-3-540-77366-5_34 [CrossRef] [Google Scholar]

journal: 16

For the next 8 days, I decided to find one scholarly source for my academic paper and listed below is the citation. After I found the scholarly source, I took some of the information out and put it toward my academic paper because it has to be 8 pages and 8 sources worth. Baker M. (2016). Striving for Effective Cyber Workforce Development. Pittsburgh, PA: Software Engineering Institute. [Google Scholar]

journal: 17

For the next 8 days, I decided to find one scholarly source for my academic paper and listed below is the citation. After I found the scholarly source, I took some of the information out and put it toward my academic paper because it has to be 8 pages and 8 sources worth. Bardi A., Schwartz S. H. (2003). Value and behavior: strength and structure of relations. Pers. Soc. Psychol. Bull. 29 1207–1220. 10.1177/0146167203254602 [PubMed] [CrossRef] [Google Scholar]

journal: 18

For the next 8 days, I decided to find one scholarly source for my academic paper and listed below is the citation. After I found the scholarly source, I took some of the information out and put it toward my academic paper because it has to be 8 pages and 8 sources worth. Barrick M. R., Mount M. K., Gupta R. (2003). A meta-analysis of the relationship between the five-factor model of personality and Holland’s occupational types. Pers. Psychol. 56 45–74. 10.1111/j.1744-6570.2003.tb00143.x [CrossRef] [Google Scholar]

journal: 19

For the next 8 days, I decided to find one scholarly source for my academic paper and listed below is the citation. After I found the scholarly source, I took some of the information out and put it toward my academic paper because it has to be 8 pages and 8 sources worth. Bell S. V. (2014). “A longitudinal study of students in an introductory cybersecurity course,” inProceedings of the 121st Annual ASEE Conference and Exposition Indianapolis. [Google Scholar]

journal: 20

For the next 8 days, I decided to find one scholarly source for my academic paper and listed below is the citation. After I found the scholarly source, I took some of the information out and put it toward my academic paper because it has to be 8 pages and 8 sources worth. Ben-Asher N., Gonzalez C. (2015). Effects of cybersecurity knowledge on attack detection. Comput. Hum. Behav. 48 51–61. 10.1016/j.chb.2015.01.039 [CrossRef] [Google Scholar]

One Comment Add yours

Leave a Reply to Anonymous Cancel reply

Your email address will not be published. Required fields are marked *