{"id":316,"date":"2025-08-09T20:11:14","date_gmt":"2025-08-09T20:11:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/princesso\/?page_id=316"},"modified":"2025-08-10T02:12:36","modified_gmt":"2025-08-10T02:12:36","slug":"critical-thinker","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/princesso\/critical-thinker\/","title":{"rendered":"Critical Thinking"},"content":{"rendered":"\n<p>As a Cybercrime major, critical thinking is an essential skill that enables me to analyze complex digital threats, assess security vulnerabilities, and make sound, ethical decisions in high-pressure environments. This skill allows me to approach cyber investigations methodically, question assumptions, and evaluate evidence before drawing conclusions. You\u2019ll see this skill demonstrated in my chosen artifacts where I explored real-world issues through an interdisciplinary lens.<\/p>\n\n\n\n<p><strong>Below are examples from my academic work of my critical thinking skills.<\/strong><\/p>\n\n\n\n<p><mark style=\"background-color:#7bdcb5\" class=\"has-inline-color\">The first artifact<\/mark> below is 7 entries of thought provoking cyber questions and my responses from my Cybersecurity, Technology, and Society\u00a0CYSE 200T course I took in the Fall of 2022.<\/p>\n\n\n\n<p>In this course, students explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. <br><br><\/p>\n\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fprincesso%2Fwp-content%2Fuploads%2Fsites%2F31056%2F2025%2F08%2Fcyse200T-portfolio-entries.docx&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fprincesso%2Fwp-content%2Fuploads%2Fsites%2F31056%2F2025%2F08%2Fcyse200T-portfolio-entries.docx&#038;hl=en\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><mark style=\"background-color:#7bdcb5\" class=\"has-inline-color\">The second artifact<\/mark> is my research paper I wrote for my Interdisciplinary Theory and Concepts IDS300 course I took Spring of 2025. This writing intensive course is an examination of the history, concepts and application of interdisciplinary study. This course includes an analysis of similarities and differences in academic disciplines and the application of interdisciplinary approaches to a specific topic of study.<\/p>\n\n\n\n<p>My research question was:<br>\u201cHow can psychological profiling be integrated with machine learning techniques to predict and prevent cybercrime activities?\u201d<br>This paper allowed me to explore how technology and psychology can work together in proactive cyber defense and I\u2019m really proud of how it turned out.<\/p>\n\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fprincesso%2Fwp-content%2Fuploads%2Fsites%2F31056%2F2025%2F08%2Fannotated-IDSresearchpaper.docx.pdf&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/uploads\/sites\/31056\/2025\/08\/annotated-IDSresearchpaper.docx.pdf\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n<p>Below is a visual representation of my research topic.<\/p>\n\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fprincesso%2Fwp-content%2Fuploads%2Fsites%2F31056%2F2025%2F08%2Fannotated-workshop4.png.pdf&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/uploads\/sites\/31056\/2025\/08\/annotated-workshop4.png.pdf\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n<p><\/p>\n\n\n\n<p><mark style=\"background-color:#7bdcb5\" class=\"has-inline-color\">My third artifact<\/mark> is a research paper I wrote in my Introduction to Cybersecurity course (CYSE 300) on identity theft and various ways to mitigate risks. This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies and practices, and develop a foundation for further study in cybersecurity. <\/p>\n\n\n\n<p>In this paper, I explored common methods used by attackers to steal personal information and discussed practical strategies for prevention. This artifact demonstrates my ability to research real-world threats and communicate effective solutions clearly and professionally.<\/p>\n\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fprincesso%2Fwp-content%2Fuploads%2Fsites%2F31056%2F2025%2F08%2FCYSE300-Research-Paper-Osei-Adubfour.docx&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fprincesso%2Fwp-content%2Fuploads%2Fsites%2F31056%2F2025%2F08%2FCYSE300-Research-Paper-Osei-Adubfour.docx&#038;hl=en\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/princesso\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p class=\"excerpt\">As a Cybercrime major, critical thinking is an essential skill that enables me to analyze complex digital threats, assess security vulnerabilities, and make sound, ethical decisions in high-pressure environments. This skill allows me to approach cyber investigations methodically, question assumptions, and evaluate evidence before drawing conclusions. You\u2019ll see this skill demonstrated in my chosen artifacts where I explored real-world issues&hellip; <a href=\"https:\/\/sites.wp.odu.edu\/princesso\/critical-thinker\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":25266,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/princesso\/wp-json\/wp\/v2\/pages\/316"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/princesso\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/princesso\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/princesso\/wp-json\/wp\/v2\/users\/25266"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/princesso\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/princesso\/wp-json\/wp\/v2\/pages\/316\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/sites.wp.odu.edu\/princesso\/wp-json\/wp\/v2\/pages\/316\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/princesso\/wp-json\/wp\/v2\/media?parent=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}