Social Cybersecurity An Emerging National Security Requirement I found the article that was required reading to be very interesting. The title of the article was Social Cybersecurity An Emerging National Security Requirement https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/ and it was a great read. It basically highlights why understanding and researching why and how human behavior is being manipulated by…
Journal Entry 9 : Social Media Disorder Scale
In taking the assigned social media disorder scale, I answered yes to three questions. I don’t think I care too much or too little about social media. I am onewho likes to look at everyone else’s stuff but only on Instagram and or Facebook, and posts things rarely. The main reason is because those platforms…
Journal 8 : Do you think the media influences our understanding about cybersecurity?
Media can easily influence our understanding of cybersecurity. Good information as well as bad information can be distributed easily through the media. I have seen so many things online that are definitely opinion, hearsay or “fake news” about events, people, businesses and products. Movies tend to exaggerate timelines and procedures of online hacking or cybersecurity…
Journal 7: 3 Memes that relate to human-centered cybersecurity
Everyone seems friendly online You never know who you are really interacting with Keep in mind that one can be anything online, and proceed with caution, safeguard your information and pay attention. Human-centered cybersecurity acknowledges that humans make mistakes, but being the first line of defense you can make choices that limits your risk factors.
Journal 6: Can you spot 3 fake websites?
I looked up Louis Vuitton bags for sale, and typed that in the google search bag. Many websites came up that said “authentic” Louis Vuitton bags, new or used for sale. One way I could determine if it was a fake website was that the website added words before or after to alter the Louis…
Article Review #1 CYSE201S
Cybersecurity during COVID-19 I will be detailing my understanding of the article “Cybersecurity when working from home during COVID-19: considering the human factors” by Monica T Whitty, Nour Moustafa, and Marthie Grobler. The research conducted was from a social constructionist view with emphasis on Vygotsky’s theory of learning, as a basis. COVID-19 Before the COVID-19…
Journal #5 Ranking Motives
1. For money2. Multiple reasons3. Political 4. Recognition5. Revenge6. Entertainment7. Boredom This is the ranking I came to after reading each article in the module. Some of the articles did not really turn out to be how I envisioned them but still very insightful. Money is the root or in some way can be correlated…
Journal 4 : Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.
It is interesting how I correlate Maslow’s Hierarchy of Needs to my experiences with technology. I had to really ponder things I normally take for granted. The base of Maslow’s Hierarchy of Needs is Physiological. How I translate this is my shelter, my home. I use technology everyday to make my life comfortable, such as…
Journal 3 -Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
The website PrivacyRights.org is a tool not only to learn about data breaches, but also advocacy, education and law overview. There are many free and resourceful overviews and question and answer type resources that are free and offer some great insight. Researchers can utilize the Data Breach Chronology Database on the website but will have…
Journal 2 – How Do The Principles Of Science Relate To Cybersecurity
The Principals of Science briefly described:Relativism- The concept that all things are relatedObjectivity- Scientists need to be neutral, not opinion based when doing studies or researchParsimony- Keeping scientific explanations as simple as possible.Empiricism- Scientists can only study things that are real to the senses.Ethical Neutrality- Ethical standards must be adhered when conducting researchDeterminism- A principle…