Journal Entry #18
Why do you think victims don’t report cyber victimization? Cyber victimization is trauma. Understanding this, it makes sense that the methodology of handling trauma is a very individual thing. It … Continue reading
Journal Entry #17
1. A CNN host recently said he’d rather give his kids Jack Daniels and weed than Instagram. What do you think about this statement? It is a sensationalist title, to be sure. … Continue reading
Journal Entry #16
Social sciences are integral to a complete system because there is always a human component when dealing with computers or AI. They are a creation that is man-made. It is … Continue reading
Journal Entry #15
AI is one of the latest emerging tools to implemented on the cybersecurity front. It is able to be utilized in both defensive and offensive capabilities. An example of this … Continue reading
Journal entry #14
https://clario.co/blog/illegal-things-you-do-online/ In this article, author Andriy Slynchuk outlines eleven things internet users may be doing online that are actually criminal offenses. These are: Using Unofficial Streaming Services Using Torrent Services … Continue reading
Journal Entry #13
ODU’s Electronic Communication policy explicitly lays out the university’s expectations and rules regarding communication. First, it references Virginia Law to establish its authority to do so. Then, it clearly outlines … Continue reading
Journal Entry #12
For the Social Media Disorder Scale, I answered 7 of the 27 questions with a ‘yes.’ For the most part, I found the questionnaire quite fair. I am a little … Continue reading
Journal Entry #11
What I liked and appreciated about this video was the emphasis the content creator placed on the need for soft skills for the field of cybersecurity. The reality for the … Continue reading
Journal Entry #10
In this video, we see a combination of hacker and hip hop subcultures that meld together in a very unique way. It is particularly interesting because, traditionally, these two subcultures … Continue reading
Journal Entry #9
Reuben Paul, an apparent cybersecurity prodigy, shows practical and tangible ways that cybersecurity (or lack thereof) can be a threat to the average person. He shows the ability to easily … Continue reading