The routine activities theory centers upon motivated offenders searching for suitable targets that have little to no guardianship around them. Offenders find motivation to commit their crimes through various reasons, mainly for financial gain, revenge, or to enhance their ego. Victims are usually people that have good intentions but they are vulnerable or uneducated with…
Why Cybercrime isn’t Reported
Cybercrime is at an all-time high, with people being victimized and taken advantage of practically everyday. With all the data and research that has been collected for the cybercrime that is reported to the authorities, it can be equally as interesting as to why people might not alert the media or law enforcement. I find…
11 Illegal Online Activites
Andrly Skynchuk posted 11 activities internet users do that are deemed illegal, ranging from modest harm all the way to a serious crime, or at least a predecessor for intention to commit a malicious violation. They are listed as unofficial streaming services, torrent services, using copyrighted images, bullying/trolling, sharing other people’s personal info (addresses, passwords,…
Sample Company Breach Memo
In 2023 alone, there were thousands of data breaches that affected millions of people and it continues to be a growing problem as the years progress. The article in question provided an example of a company notifying their clients that a significant data breach has occurred, what information was potentially retrieved by the cybercriminals, and…
Short Arm of Predictive Knowledge
I believe that there should be a massive importance put on the development of cyber policies and infrastructure given how technology continues to progress at a rapid rate. Crime shows an alarmingly increasing trend that is parallel with technological advancement, which means that as a society we need to evolve with the change. Improving policies…
Ethics of CRISPR Gene Editing
Based on the information provided regarding biocybersecurity and CRISPR Gene editing, there seems to be a divide whether it is ethically acceptable or whether there should continue to be scrutiny on the methods they carry out this procedure. The module referring to Gene editing made me think about the positive capabilities this technology could have…
Workplace Deviance
Workplace deviance is characterized as an employee intentionally causing harm to a business or organization in the workplace, especially in the sense that it violates the rules and regulations for whom they work for. Deviance can have a wide variety of examples, ranging from showing up to work late or working slow on purpose, all…
Maslow’s Hierarchy of Needs – CYSE 201S
Maslow’s Hierarchy of Needs established the ideology that there are 5 stages of essential aspects of life that all humans strive to achieve. Those needs can evolve and change as a person subsequently evolves and changes through life. It is theorized that as the lower level needs are met then the person will try to…
NICE Workforce Framework – CYSE 201S
After looking at the NICE Workforce Framework, I have assessed which departments I have a keen interest in and which ones I would show limited excitement about. At first glance, I would say that my attention was focused on the Operate & Maintain as well as the Protect & Defend areas. I chose the Operate…