Journal Entry 9

Complete the social media disorder scale. How did you score? What do you think about the items on the scale? Why do you think that different patterns are found across the world? During the past year, have you …• regularly found that you can’t think of anything else but the moment that you will be…

Journal Entry 8

After watching the video, how do you think the media influences our understanding about cybersecurity Overall in the media, hacking, and cybersecurity is shown with a mix of reality and science fiction. When it shows real techniques used, the process of it is done way faster than in reality. The media also adds extra fluff…

Journal Entry 7

Review the following ten photos through a cybersecurity human systems integration framework. Create a meme explaining what is going on in the individual’s or individuals’ mind(s). Explain how your meme relates to Human Systems Integration. https://unsplash.com/photos/mfB1B1s4sMc https://unsplash.com/photos/gySMaocSdqs https://unsplash.com/photos/ICTKcvnXx_8 https://unsplash.com/photos/Z3ownETsdNQ https://unsplash.com/photos/5QgIuuBxKwM https://unsplash.com/photos/R6dSBkz32B8 https://unsplash.com/photos/BXiLSwwvqrY https://commons.wikimedia.org/wiki/File:Computer_user_icon.svg https://commons.wikimedia.org/wiki/File:Summer_school_GLAM_giorno_1_1.jpg https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).jpg People are on the internet all day every day from…

Journal Entry 6

Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?

Journal Entry 5

Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way your rank it.

Journal Entry 4

Review Maslow’s hierarchy of Needs and explain how each level relates to our digital experiences relate to each level of need. For our basic needs, technology can come into play with security. All of our information is kept on technology and if that gets exposed, we are vulnerable. So, our need for cybersecurity starts at…

Journal Entry 3

Visit privacyrights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Researchers can use this information to look at what information is being targeted and how. We know that we must decide what data need more protection than the rest, but with the data…

Journal Entry 2

Explain how the principles of science relate to cybersecurity: Relativism: Every new development is made; new hacks can be made. Each updated system can possibly have new holes for hackers to find. This is a never-ending cycle of closings and openings to be found Objectivity: How can we as individuals decide what to do about…

Journal Entry 1

Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to your and which would appeal the least. When looking at the NICE Framework for Cybersecurity, the category of investigation is the most interesting to me. I have always been…