For this journal entry, we had to create a meme explaining what is going on in the individual’s mind. It also wants us to explain how it relates to the Human Systems Integration. To explain the memes. The meme at… Continue Reading →
For this journal entry, we were asked, “Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake website fake?” Some of the ways I have identified fake websites… Continue Reading →
For this assignment, we had to look up some articles and write a review about the article we chose. I chose my article through the Journal of Cyber-security. The questions we have to answer are: (1) how the topic relates… Continue Reading →
For this journal entry, we had to read 7 different articles. Our assignment was to rate the motives from 1( most sense) to 7 (least sense). After reading the 7 articles, I rated boredom at number 7, revenge as number… Continue Reading →
Maslow’s hierarchy of needs have three types of needs. The bottom two tiers are basic needs which includes physiological and safety needs. Physiological needs are basic needs such as food, water, warmth, and rest. Safety needs are security and safety…. Continue Reading →
Researchers would use the information to study breaches by comparing the information on the bar graphs. They would use the information from the bank breaches also. They would look for the information that was easiest to access. Even, to see… Continue Reading →
The principles of science relate to cyber security by relativism, objectivity, parsimony, determinism, and ethical neutrality. They relate to cyber security in different ways. In today’s society, technology is advancing. With relativism, when one system changes, it leads to another… Continue Reading →
For this journal entry, the assignment was to select certain areas that I would want to focus my career on. I also have to select which one appeals to me and the one that does not. The areas that appeal… Continue Reading →
In today’s society, we depend on technology for numerous things such as smart energy applications, smart agricultural and food supply applications, farmbots, water and wastewater processing, and transportations systems. How do we protect all of these smart applications? We have… Continue Reading →
Hello Everyone! Some of the ethical consideration that I identified from,”Hacking Humans: Protection Our DNA from Cyber-Criminals”, are how humans are curious about their family generation. When people are doing the online DNA testing, they need to read the contract… Continue Reading →
© 2026 shanicedolson — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑