Skip to content

svakoseportfolio

Sarah F. Vakos

  • Home
    • Resume
    • Skills
    • Experience
    • Awards and Recognitions
    • IDS 493
    • IDS 300W
  • Cybersecurity Foundations
    • CYSE 300
    • CYSE 301 – Cyber Techniques and Operation
    • ECE 416
    • ECE 419
  • Tech & Society
    • IT/CYSE 200T
    • CYSE 201S – Cybersecurity and Social Sciences
      • Career Professional Paper
      • CYSE 201S Article Reviews
      • CYSE 201S – Journal Entries Cont.
  • Law & Ethics
    • CRJS 405
    • CYSE 406 – Cyber Law
    • PHIL 355E – Cybersecurity Ethics
      • Case Analysis PHIL355E
      • Case Analysis PHIL 355E
  • Internship
    • CYSE 368
  • Cybersecurity Applications
    • CYSE 407
    • CYSE 494
  • Blog
  • Contact

Author: svako001

Complete the Patchin and Hinduja’s cyber bullying survey. After completing the survey, discuss how you think criminologists might use the surveys to explore relationships between the different items.

Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

Watch this video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

Read this and write a journal entry summarizing your response to the article on social cybersecurity.

Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?

Write a journal entry about how you think the media influences our understanding about cybersecurity.

Review the following ten photos through a cybersecurity human systems integration framework. Write a sentence for each image.

Can you spot three fake websites and compare them to three real websites, plus showcase what makes them fake? 

Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.

Posts navigation

Older posts
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept