Article Review 1

This article review is on “The Present and Future of Cybercrime, Cyberterrorism and Cybersecurity” By Kyung-shick Choi, Boston University and Bridgewater University USA, and Claire Seungeun Lee, Unha University South Korea.

                The article shows that the line between cybercrime and physical crimes is starting to blur, and because of this, there are ways of identifying Cybercrime. It involves studies of Cybercriminology, which covers a multitude of combined knowledge. Since Cybersecurity is an emerging field, it needs tools to help combat new crimes that use new technology as well as old and current technology. Also, people in Cybersecurity need to take on all possible paths to learn their craft. I agree that physical security and IT security do not have boundaries. This can be seen today. People take what they see online as truth and bring it into the physical world, even though it may be just propaganda. Or people that see something in real life and post it online, possibly out of context. The same can happen with certain information that takes assets and money from people or companies. People can obtain information physically or digitally to access money and assets physically or digitally.

Criminals can also influence others to participate in their activities by making them fall victim to ways of thinking. Because of this, it is essential for a Cyber Security specialist to understand or have some knowledge of how a criminal mind can work. This Article is short, and it hits on some points that could be expanded on is well written. As someone who wants to get into Cyber Security, this article put into perspective that I need to be diverse in my knowledge and learn everything I can to have that “Balanced approach to Cyber Security.

One thing this Article touched on that could be expanded is how their studies of testing cyber deviance might affect young adults that do not have the luxury of attending the types of schools they did the study on. A test should have also been done with a younger group about aggression-violence and see if they get the same results. I think this because today, aggression and violence are taught at a young age, and that is an area that needs to be studied by more than 19-21-year-olds. Higher education should not be where self-control needs to be predominantly taught. It needs to be taught at a young age before it becomes a problem. Yes, I agree that we need better teaching and nonviolent communication, but these values need to be instilled into people at a young age before they become a problem that needs to be treated at an older age.

As someone who wants to be in the Cyber Security field to stop crimes, I think proper youth education can help prevent future crimes for people in my area to have to protect against. So yes, overall, I agree with the article that Cyber Security needs to learn all possible paths, but I think their study needs to be more in-depth.

Article Link: “Cybercrime, Cyberterrorism, and Cybersecurity” by Kyung-shick Choi and Claire Seungeun Lee (bridgew.edu)

Facebooktwitterlinkedininstagramflickrfoursquaremail

Module 4 Entry

Maslow’s Hierarchy of needs and how it relates to my experiences with technology is that technology can give a false fulfillment of those needs. If I choose, I can go online and have people react to how I am feeling and what I am thinking, and the more people that agree with me, the more validated I feel or think. This can also warp me into thinking no matter what I think or feel, whether right or wrong, it’s okay to think that way or feel that way because people online say it’s okay. Technology is made to make people’s lives easier, and many people think it’s safe. It isn’t safe, and people who commit crimes believe they cannot get caught because they are online, giving them that false sense of security. If I have lots of online friends, it can make me feel like I belong and have lots of friends when in reality, I am alone every day on a computer, and I may never meet any of those online friends face to face. I learned that technology is good if I don’t let it rule my life. I grew up in a time when technology was rising before cell phones and social media. My first time playing a video game was on an Atari. Video games fulfilled my need for entertainment and still do to this day; that’s all technology fulfills for me, and they will never fill my personal needs, such as what’s listed in Maslow’s Hierarchy of needs. Granted, a job in a field where I have to use that technology to make money will help me fulfill some of those needs, such as food, water, and safety, but the rest of those needs can only be achieved in person with real people face to face.

Facebooktwitterlinkedininstagramflickrfoursquaremail

Module 3 Entry

Researchers could use the privacy rights data base to easily categorize data breaches. They can research when they most frequently happen and where they happen. They can research what types of data breaches happen. The site makes it pretty easy to find it if it happened to a business and what kind of businesses it happened to. It also tells you the device that was used or if it was a credit card fraud. It can be a very valuable tool for a researcher to help them discover trends and what types of places need improved security.

Facebooktwitterlinkedininstagramflickrfoursquaremail

Module 2 Entry

Principles of science relate to cyber security because they have things in common. Science is used to explain the natural world and Theories and test are done from evidence from the natural world to prove if the theory is correct. Cyber Security does the same thing but in the digital world and used to find criminals or data breaches. If someone is suspected to have committed a crime online evidence must be gathered to prove if that theory or allegation is true or false.

Facebooktwitterlinkedininstagramflickrfoursquaremail