Journal Entries
Journal Entry: 1
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.

Journal Entry: 2
Explain how the principles of science relate to cybersecurity.

Journal Entry: 3
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

Journal Entry: 4
Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

Journal Entry: 5
Review the articles linked with each individual motive in the presentation page or Slide #4. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.

Journal Entry: 6
Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Note: Don’t generate/access or click on any unwanted/fake websites on your web browsers. Showcase with examples, what makes the fake websites fake.

Journal Entry: 7
Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual’s or individuals’ mind(s).

Journal Entry: 8
Watch this video and pay attention to the way that movies distort hackers.
Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It?
After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity

Journal Entry: 9
Watch this Video:
Social media and cybersecurity.
Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?

Journal Entry: 10
Read this and write a journal entry summarizing your response to the article on social cybersecurity
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/

Journal Entry: 11
Watch this video. As you watch the video
https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.

Journal Entry: 12
Read this https://dojmt.gov/wp-content/uploads/Glasswasherparts.com_.pdf. sample breach letter “SAMPLE DATA BREACH NOTIFICATION” and describe how two different economics theories and two different social sciences theories relate to the letter.

Journal Entry: 13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefits principles. Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.

Journal Entry: 14
Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.

Journal Entry: 15
Digital Forensics | Davin Teo | TEDxHongKongSalon
– YouTube
Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career.
