ODU Logo

Chase Knight

Student Name

Page 2 of 3

Journal Entry 7

Explain how your memes relate to Human-centered cybersecurity. by

Journal Entry 6

  Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites, Academic Resources etc., and cite the source]. Compare the three fake websites to three real websites and highlight the features that identify them as fraudulent. Note:… Continue Reading →

Journal Entry 5

starting at 1 revenge, 2 political, 3 recognition, 4 entertainment, and 5 boredom. I rank them like this because it feels like some motives have a stronger connection to the actions people take online. Starting with revenge it makes sense… Continue Reading →

Journal entry 4

Starting off with physiological needs is like basic needs for survival like food, water and shelter and it also has something to do with technology. I personally use Uber eats while i’m on campus and do not want anything on… Continue Reading →

journal entry 3

researchers can utilize the information available to study data breaches by analyzing the frequency and causes of breaches across different sectors. They can identify trends in methods used by cybercriminals and the vulnerabilities exploited and the type of data most… Continue Reading →

journal entry 2

The principle of these topics helps make cybersecurity more effective in different types of ways.Ways like relying on real data which is empiricism, understanding causes (determinism),keeping the systems basic (parsimony), and making decisions based on true facts (objectivity). In cybersecurity… Continue Reading →

Article Review #2 Going over Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures 

How the topic relates to the principles of the social sciencesHuman Behavior, Social sciences explore human behavior, and this topic examines how individuals and organizations interact with AI technologies in the context of cybercrime. It looks at motivations for cybercriminal… Continue Reading →

The review of use of simulations in economic cybersecurity decision-making(Article Review #1)

by

photos depicting my thoughts about cybersecurity and the social sciences

cite – https://www.istockphoto.com/photos/cyber-security?page=2 by

Journal Entry 1

by

« Older posts Newer posts »

© 2025 Chase Knight — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑