Journal Entry #5

Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. The seven different individual motives that were reviewed are: Entertainment, Political,…

Journal Entry #4

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. Maslow’s Hierarchy of needs lays out all of human’s need in a hierarchy. The theory states that once we meet our lower-level needs, humans tend…

Journal Entry #3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? When visiting PrivacyRights.org, the user is initially greeted with a chart of the United States that shows the amount of data breaches within a customizable timeframe. This figure also gives a key which…

Journal Entry #2

Explain how the principles of science relate to cybersecurity. When examining cybersecurity through a social science framework, the same principles that adhere to natural sciences also adhere to social sciences. Five of the main scientific principles are Relativism, Objectivity, Parsimony, Ethical Neutrality, and Determinism. Understanding each of these principles allows for the understanding of how…

Journal Entry #1

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. The Workforce Framework for Cybersecurity (NICE Framework) is a framework that helps employers establish a common ground over all of the different…