Eportfolio Journal Entries

Week 1

NICE Work Frame will help my career by identifying the roles and responsibility we have in our organization.  Currently in my organization the team doesn’t have evenly divided roles.  The team members schedule is not scheduled properly.  We have certain people who works overtime and some members working less than 40 hours.  I also identify that the best people are not at the most needed role.  NICE Work Frame firs will help us with the scheduling issues.  The new scheduling issues also will help us with time management.  The organization will save money from paying overtime.  At last the by having employees in the right roles the production of the company will get better.

Week 2

All of the principles of science are related to science in different ways. Determinism is a term to basically pass down. I would compare this to how peoples personalities form is by the people they were around when they were growing up just like I think my personality was formed because of my brother. Empiricism is the study of all of our five bodies senses. That is touch, hearing, smell, taste and sight. Parsimony is basically a process that the correct solution is the more likely all of situations. Objectivity means that it is normal for different people to have different views on certain topics.

Week 3

The information on the privacy rights website helps researchers find trends in Data breaches in many ways. There are many charts and data about data breaches happening recently. The charts I’ve seen help people realize that data breaches are becoming more common than we think. There even is a chart of daily breaches from different companies what type of breach happened and how many people were affected by the breach. I think the privacy rights website is a good resource for researchers and your common person with their data because it can give you a reality of how data breaches are becoming very serious especially with a lot of people trusting multiple companies with their data.

Week 4

Maslow’s Hierarchy of need levels relates much to my digital experience. The first level of this hierarchy is physiological needs, this is important because this level is the necessities for humans to live and survive. The next level is safety and security, this level is fundamental because security in the technology is crucial because there’s so much data out there that you don’t want any of it going to the wrong person. In my opinion, love belonging, and self-esteem fall in the same column because I think its more about caring about yourself and others. The last level is self-actualization, this more a lot to me because this is important for me as a man in his 20s trying to find out what I want to do with my life.

Week 5

This article talks about how dangerous cyberbullying can be. It is considered a public health
issue. In this generation people feel entitled to comment and express their feeling about any
current events. People are very emotional and reactionary about current events. As well due to
internet service events are circulated around the world in minutes. Any events can be viewed on
social media with 1million views in few minutes. A single post can generate up to few hundred
thousands of comments. Some can be very harsh and straight forward. These comments can
cause mental and physical disturbance. To protect the general public government should sensor
comments, and ban anyone who commit cyberbullying.

Week 6

TiffanyCoShop[.]com

Sheingivesback[.]com

BedBathClose[.]com

These websites are examples I got from Express Vpn List of Scam Shopping Websites. All these websites have something in common and that’s because all these websites are trying to use other companies to promote their scams. Companies like Shein, Tiffany & Co, and Bad Beth Beyond are being used for their well-known status to scam people who can’t tell the difference between each other and their websites. The Shein website is a survey that gets information from people to get “gift cards” for Shein. Bed Bath Close is a website that sells home furniture for 50% or more off. The Tiffany & Co shop website is a replica of the real Tiffany & Co website.

Week 7

https://unsplash.com/photos/man-in-black-and-white-striped-polo-shirt-sitting-on-chair-in-front-of-silver-macbook-ICTKcvnXx_8

Meme: Me knowing I don’t get random ads on a website because of ad blocker

Explanation: This relates to cybersecurity because ad blockers can eliminate random ads on websites that can lead to scams. 


https://unsplash.com/photos/woman-in-white-button-up-shirt-holding-silver-iphone-6-R6dSBkz32B8

Meme: When you almost fall for a phishing email but you heard it was a scam before doing it

Explanation: A phishing email is an email that tries to get your info and can say they will give you a reward for it.


https://unsplash.com/photos/woman-in-white-and-black-long-sleeve-shirt-wearing-black-framed-eyeglasses-LyF5jsdcYW0

Meme: Me showing my mom that she isn’t getting a free trip to Europe if she gave a website her social security number

Explanation: Websites would tell you if you give them some of your information that you can win a chance of free money or a trip.

Week 8

While watching movies that use databases, I guess they fabricate a lot of the reality side of cyber security and the different ways they can fictionize the realness of handling a data breach or cyber attack. The movie The Fate of the Furious had a reenactment of a real-life hacking that happened a couple of years before the movie came out. The hack was that they could remotely hack a 2014 Jeep Cherokee using the infotainment system. In the video, she explained how this process is very difficult to do, but in the near future, cars will become easier to hack. 

Week 9

I had 5 yes’ and 4 no’s. 

I think the choices of questions made me realize that I should spend less time on social media because it puts a perspective in my head that makes me seem like a crazy person without it.  

I think people have different opinions and enjoyment in social media so their answers can be various. 

Week 10

Protecting the world from online threats that impact behavior, social structures, and politics is the focus of the emerging field of social cybersecurity. It examines how rapidly disseminating information through technology might sway public opinion and topple regimes. Given that it addresses how technology affects security and society, this is significant for both conventional and contemporary types of conflict.

Week 11

Social issues frequently delve into the intricacies of cultural values, societal structures, and interpersonal interactions. Inequality, such as disparities in class, race, and gender, which illustrate how privilege and power dynamics shape personal experiences, is one prevalent theme. The function of family, community, and social expectations is essential in shaping interpersonal relationships and connections. The debates of today are also centered on issues such as justice, ethics, and the impact of technology on human relationships.

Week 12

I think this article/statement is showing an example of rational choice. This statement states what happened, what information of yours may be out, and how the company is handling the situation. 

Week 13

Policies are very important in cybersecurity because just as it is illegal to commit a cyber attack,
it is illegal to perform certain procedures to stop them. It’s important to have guidelines and
policies on protecting against cyber attacks because it helps people know how to protect their
data to ensure companies won’t be cyber attacked, which will risk everyone’s data. Also, for
people to know if their data has been breached, what to do, because that’s important to know
and how to handle a data breach. Some measures can risk you even more, so its best to trust
professionals.

Week 14

  • One of the five things I saw on this list that is bad is faking your identity online. Faking your identity to get something out of someone is devious and very misleading.
  • Bullying is on this list, and I think any form of bullying is horrible because you shouldn’t put someone down for your enjoyment. 
  • Sharing photos, addresses, and passwords is a really serious offense because that is the person’s data and information that shouldn’t be out there without the person’s consent. 
  • I believe copyright is serious because imagine someone working hard for something and someone else steals it and uses it for their content. 
  • Finally, I think illegally streaming movies and TV shows is a serious crime because if they can steal movies and shows, they can be able to steal anyone’s information. 

Week 15

Digital forensics can relate to social sciences in many ways that people do not seem to recognize. Digital forensics focuses on evidence that is in digital form and understanding patterns in evidence, some of which focuses on common patterns that humans personally exhibit. Learning about people’s day life and seeing what type of human someone is can sometimes eliminate suspicion of them by their characteristics. For example, if there was a robbery in a bank, and there were two suspects. One of them is a member of a gang who is known for doing robberies, and the other one is a loyal member of a church and is a beloved person in the community. This helps narrow down who can easily be the culprit.