Journal Entry #8
Ignoring some of the movies with over-the-top examples of hacking, it seems like the common criticism in these examples is the unrealistic speed in which they achieve things. For example, … Continue reading
Article Review 2
By Matthew Mattozzi 01184001 for https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.475.1398&rep=rep1&type=pdf Battle of the sexes: An examination of male and female cyber bullying How the topic relates to the principles of social sciences Bullying, and … Continue reading
Journal Entry #5
For money Entertainment Boredom Recognition Revenge Political Multiple reasons https://economictimes.indiatimes.com/magazines/panache/new-generation-of-angry-youthful-hackers-join-the-hacktivism-wave-adding-to-cyber-security-woes/articleshow/81707844.cms Political Multiple reasons Entertainment For money Revenge Boredom Recognition Revenge Recognition Multiple reasons Entertainment Boredom political For money https://www.heraldlive.co.za/news/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase/ Multiple … Continue reading
Journal Entry #6
Based on this video: https://www.youtube.com/watch?v=aeRHeXceRSA There are many reasons I am interested in pursuing this field, but by far the two most dominant reasons are the job security/demand the ability … Continue reading
Article Review #1
Article Review 1 by Matthew Mattozzi 01184001 https://www.frontiersin.org/articles/10.3389/fpsyg.2018.00744/full How the topic relates to the principles of the social sciences An emerging field or not, there is a relatively consistent picture … Continue reading
Journal Entry #4
Diversity is a strength in any field because it allows a wide spectrum of multifaceted perspectives that can be employed to tackle any problem. This typically leads to more creative … Continue reading
Journal Entry #3
Q: Is it ethical to study people in cyberspace when they don’t they are being studied? The answer to this, save for some exceptions and caveats, lies in the means … Continue reading
Journal Entry #2
NICE Framework I still have a couple years left to narrow my focus from what is now a broad overview of the field. That being said, as of this time, … Continue reading
Journal Entry #1
Avoiding Phishing Pitfalls Reference: https://www.youtube.com/watch?v=inWWhr5tnEA There were several mistakes made by Ann in this video of a technical nature, such as a weak password and no anti-virus or anti-malware software … Continue reading