Skip to content

Locky

Carl Lochstampfor Jr

  • Home
    • About Me
    • Certifications
    • Resume
      • Skills
      • Experience
      • Awards & Recognitions
    • Goals & Future Plans
    • IDS 493
  • Cybersecurity Foundations
    • CYSE 250: Basic Cybersecurity Networking & Programming
    • CYSE 300
    • CYSE 301
    • ECE 416
    • ECE 419
  • Tech & Society
    • CYSE 200T: Cybersecurity, Technology, & Society
    • CYSE 201S: Cybersecurity & Social Science
    • IDS 300W
  • Law & Ethics
    • CRJS 405
    • CYSE 406: CYBER LAW
  • Internship
    • CYSE 368
  • Cybersecurity Applications
    • CYSE 270
    • CYSE 280
    • CYSE 407
    • CYSE 494
  • Blog
  • News
  • Wikis
  • Contact

Category: Ethics

Ensuring Accessibility when Implementing the CIA Triad

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Designing the Public Sphere with Intelligification

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Cyber Technology in Workplace Deviance

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

AI, the Metaverse, & DEI

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

The Law & Encryption Workarounds

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

First Amendment Freedoms &Protections, The Cyber World, and You

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

“Going Dark”

An Overview and Analysis of Former FBI Director James Comey’s Security Concerns aboutLaw Enforcement and Encryption

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Cybercrime: Using Psychological Theories to Understand & Prevent It

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

BioCybersecurity: Ethical Considerations of CRISPR Gene Editing

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Hacking Humans

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

The Threat of Deepfakes: An Overview of Human Ability to Detect Them

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Whistleblowing vs. Espionage: A Brief Review of Julian Assange

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Determinism within Cybersecurity & Computer Hacking

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
Translate »
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept