ODU Logo

Davon Young

Cybersecurity & Social Science

Journal Ten

The Journal “Social Cybersecurity: An Emerging National Security Requirement,” which I read today, shed light on the crucial junction between social dynamics and the constantly changing field of cybersecurity. The essay emphasized the significant influence that social interactions have on… Continue Reading →

Journal Eleven

Theories of Economics:

Journal Twelve

A broad viewpoint on major transgressions committed online. Because they have the ability to do a great deal of harm, crimes like online fraud, cyberbullying, malicious software distribution, unauthorized access (hacking), and intellectual property infringement are usually regarded as serious…. Continue Reading →

Journal Nine

1. Regularly found that you can’t think of anything else but the moment you will be able to use social media again? No (Preoccupation) 2. Regularly felt dissatisfied because you want to spend more time on social media? No (Tolerance)…. Continue Reading →

Journal Eight

In movies and TV shows, the media frequently exaggerates and unrealistically portrays hackers in order to create dramatic effect, distorting the truth of hacking. This may contribute to a number of public misconceptions regarding cybersecurity. One method to give the… Continue Reading →

Journal Six

Signs of Phishing Websites Misspelled URLs, additional symbols, or domain names that mimic popular websites are all signs of a fake website. Check the web address thoroughly. You can search for shoddy layouts, bad image quality, or inconsistent design. Real… Continue Reading →

Journal Four

Human needs are outlined in a hierarchical system by Maslow, ranging from basic physiological demands to higher-order psychological needs. Applying this to technology, let’s explore: Needs for Physiology: This translates to having access to fundamental digital resources including hardware, software,… Continue Reading →

Article Two

It is anticipated that the essay “Evaluating Legal Frameworks for Cybercrime in Indonesian Public Administration: An Interdisciplinary Approach” will address the assessment of Indonesia’s cybercrime legal frameworks in relation to public administration. An overview of what you could read in… Continue Reading →

Article One

Introduction to Cybercrime The essay probably starts off with presenting the idea of cybercrime and highlighting how much of a concern it is to businesses around the world.The corporate landscape of Indonesia: It probably offers a broad perspective of Indonesia’s… Continue Reading →

Journal Three

Researchers can examine numerous facets of cybersecurity and data protection by using publicly available data on data breaches from sources like PrivacyRights.org. The frequency and size of breaches, the industries or sectors that are most affected, and the typical attack… Continue Reading →

« Older posts

© 2025 Davon Young — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑