ODU Logo

Alexander Trevino

Student Name

Category Uncategorized

Module 14 Discussion Board

Routine activities theory is a criminological theory that explains how crime occurs when three elements come together: a motivated offender, a suitable target, and the absence of a capable guardian. In the context of the video “Cyber crime spikes as… Continue Reading →

Module 13 Discussion Board

Many older individuals do not report cybercrime victimization due to perceived severity, lack of awareness, and embarrassment. They often view minor frauds, like unauthorized charges, as too insignificant to report, believing it’s not worth the trouble or doubting that authorities… Continue Reading →

Module 11 Discussion Board

The relationship between economics and cybersecurity is crucial, as it affects both the motives for cyberattacks and the defenses against them. Cybercriminals often seek financial rewards, which drives businesses to invest heavily in cybersecurity to protect their assets and maintain… Continue Reading →

Module 10 Discussion Board

How effective are current cybersecurity awareness programs in protecting elderly individuals from phishing attacks, and what improvements can be made to these programs? What are the implications of AI and deepfake technologies on cybersecurity vulnerabilities, and what strategies can be… Continue Reading →

Module 6 Discussion Board

The video discusses the concept of the “human firewall,” emphasizing how human error can lead to cybersecurity issues. As technology evolves, so do the methods of scamming. Initially, scammers would call individuals to obtain sensitive information like social security or… Continue Reading →

Module 5 Discussion Board

Behavioral theories explain cybercrime by focusing on how people learn behaviors from different sources. These sources include family, schools, peers, mass media, and the broader environment. This view helps us understand why people commit cybercrimes by showing that these actions… Continue Reading →

Module 4 Discussion Board

Victim precipitation refers to situations where an individual’s actions or behaviors make it easier for them to become a target of victimization. In the context of cyber victimization, this can occur when someone does not take necessary precautions, such as… Continue Reading →

Module 2 Discussion Board

Determinism, in simple terms, is the idea that a series of prior situations predetermine all events. There is some truth to this, as certain factors can influence behaviors, such as the thrill some people may feel from hacking or engaging… Continue Reading →

Module 1 Discussion Board

After researching careers for social science graduates, I found three jobs that interest me the most: Media Analyst, Behavioral Economist, and Human-Computer Interaction Specialist. A Media Analyst studies media trends and their impacts on public opinion. This field intrigues me… Continue Reading →

Career Paper

Alexander TrevinoProfessor UmphletCYSE 201SAugust 1, 2024Using Social Sciences as a Security AnalystAs a passionate college student embarking on a cybersecurity career, I’m discovering justhow vital it is to combine technical skills with social sciences. The role of a security analyst… Continue Reading →

MODULE 12 JOURNAL

Alexander TrevinoProfessor UmphletCYSE201SDue: July 28, 2024MODULE 12 JOURNALIn the article “Eleven Things Internet Users Do That May Be Illegal,” Andriy Slynchuk talksabout common online activities that could get you into legal trouble, even if you don’t realize it.These include things… Continue Reading →

MODULE 11 JOURNAL ENTRY 2

Alexander TrevinoProfessor UmphletCYSE201SDue: July 21, 2024MODULE 11 JOURNAL ENTRY 2The article on bug bounty policies examines how companies use ethical hackers to findweaknesses in their cyber systems. By paying hackers to find problems before bad actors exploitthem, companies can save… Continue Reading →

MODULE 11 JOURNAL

Alexander TrevinoProfessor UmphletCYSE201SDue: July 21, 2024MODULE 11 JOURNALThe letter Glasswasherparts.com provides a clear example of how economic and socialscience theories can be applied in responding to cybersecurity incidents. In economic terms,cost-benefit analysis is evident in the company’s approach to managing… Continue Reading →

Article Analysis

Alexander TrevinoProfessor UmphletCYSE201: CybSec and Soc ScienceDue July 21, 2024The Impact of Artificial Intelligence on Organizational Cyber SecurityAs digital technology grows, companies see both its advantages and the risks that come with it.With more tech comes a higher chance of… Continue Reading →

Module 10 Journal Entry 2

Alexander TrevinoProfessor UmphletCYSE201SDue: July 14, 2024Module 10 Journal Entry 2The article emphasizes the need for a new approach to cybersecurity that focuses on protectingsocietal behaviors manipulated via cyber means. Unlike traditional cybersecurity, which protectsinformation systems, social cybersecurity aims to safeguard… Continue Reading →

« Older posts

© 2025 Alexander Trevino — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑