Journal Entry 10:

Read ODU’s electronic communications policy.  Write a paragraph describing how it relates to cybersecurity. Old Dominion University communications policy is a way for the University to monitor students. This will give the university an insight of their students’ atmosphere. It also helps students stay on track on following rules that are most likely going to…

Journal Entry 9:

Watch this video.  As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation.  Social themes is an idea or message that applies directly to society and social issues. This presentation displayed great pointers on how…

Journal Entry 8:

Complete the Social Media Disorder scale.  How did you score?  What do you think about the items in the scale?  Why do you think that different patterns are found across the world? After completing the Social Media Disorder scale I have noticed that social media has a very low factor in my everyday life. There…

Journal Entry 7:

Read the account below from a revenge porn victim.  Which psychological consequences described in this module do you think the victim experienced? This self revenge porn victim experienced self-objectification, Negative subjective experience, and Mental health risk just because she was seeking attention. She was in a broken cycle with herself and with others that seemingly…

Journal Entry 6:

Cybersecurity Memes Review the following ten photos through a cybersecurity human systems integration framework.  Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your memes relate to Human Systems Integration. Human Systems Interrogation is an aspect of systems engineering that seeks to ensure the human component of a…

Journal Entry 5:

Review the articles linked with each individual motive.  Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it. After reviewing the articles of each individual motive I would rank…

Journal Entry 4:

Maslow’s Hierarchy of Needs consists of five levels such as, Self-Actualization, Esteem, Love+Belonging, Safety, and Physiological. Physiological needs consist of food, water, warmth, and rest. Without this level most individuals would not be able to function. As an adult I have realized that any type of technology needs to be taken care of in order…

Journal Entry 3:

Define in your own words what the terms “cybercrime” and “cybersecurity” mean.  Discuss the connections between the two terms as well as how they the related careers. Cybercrime is defined as criminal activities carried out by means of computers or the internet (Security tip (ST04-001)). Cybersecurity is the state of being protected against the criminal…

Review 2

Malware Infections in the U.S. during the COVID-19 Pandemic: An Empirical Study The reviews should focus on (1) how the topic relates to the principles of the social sciences (2) the study’s research questions or hypotheses (3) the types of research methods used (4) the types of data and analysis done (5) how concepts discussed…