ODU Logo

Finnegan Kenney

Student Name

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

It is hard to fathom every action a person could take to achieve a desired outcome, especially when it comes to computers and technology where we are still learning new things and discovering new capabilities every day. With that in… Continue Reading →

How does cyber technology impact interactions between offenders and victims?

Cybertechnology impacts interactions between offenders and victims by closing the gap between them. In the past, if a criminal committed a crime the left victims in critical condition or traumatized they would usually be separated as much as possible even… Continue Reading →

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

Criminal Justice and Cybercrime overlap in a multitude of ways, most notably being the fact that each practice is related to crime, laws, and the understanding of why and how they come about. Criminal Justice is an umbrella term with… Continue Reading →

How do engineers make cyber networks safer?

Engineers make cyber networks safer in a myriad of ways, they provide a level of ingenuity and creativity to problem solving that almost no other profession can offer. Engineers apply what is called systems security engineering in the efforts to… Continue Reading →

Describe three ways that computers have made the world safer and less safe.

1: Computers and the internet have Created a wall of anonymity for potential threats. Cyberbullying and cyber-terrorism is a big threat that has been brought on by the creation of computers and the world wide web. Essentially it allows for… Continue Reading →

How can you tell if your computer is safe?

Computer safety is a hard think to gauge but at its core is the most important concept to keep in mind when using your computer or device with info tied to your name. Computer safety can entail anything from anti-virus… Continue Reading →

What are the costs and benefits of developing cybersecurity programs in business?

Developing a cybersecurity program in your business is not cheap but it is extremely beneficial and, some would argue, crucial to the long term success of your business. As I previously stated in the discussion board, over 75 percent of… Continue Reading →

How has cyber technology created opportunities for workplace deviance?

Cyber technology is rapidly advancing both our collective personal and business lives as a whole. The problem with new technology means there is people looking for new ways to exploit it. My father who is a program manager for a… Continue Reading →

C.Y.B.E.R.S.E.C.U.R.I.T.Y

Critical infrastructure protection plans for purchase. Yacht G.P.S software that is secure Building and monitoring local area and wide area networks for businesses or governments. Emergency network or system recovery services. Reinforcing networks and systems with firewall and malware protections… Continue Reading →

Describe four ethical issues that arise when storing electronic information about individuals.

Data Usage Companies like Google, Amazon, Apple, and other browsing based companies, use user search data to help improve communication and ad services between a business and a consumer. The issue in this regard tends to lie in how the… Continue Reading →

« Older posts

© 2025 Finnegan Kenney — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑