All posts by Heath

About Heath

This is my second semester attending FHSU online classes. I am a Junior at FHSU and hope to get my Degree in Cyber Security. I enjoy playing video games with friends on Xbox One, fixing and building things, and hanging out with my cat, Thunder.

Security over Convenience Proposal

Abstract Enlightening users’ cybersecurity awareness while learning the impact of cyber-attacks through deliberate attention to your behavior when surfing on public wi-fi. Public wi-fi is synonymous with a lack of privacy. Are people aware of how vulnerable their privacy is if certain safety measures are not taken? Which age group and devices are the most … Continue reading Security over Convenience Proposal

Dangers and Precautions while on Public Wi-Fi

    Deliberate Inattention to Security on Public Wi-Fi Flow Chart —Public Wifi— —UserSafety Risks/Improving Safety— —Types of Attacks/Behavior changes/Educating/sharing info— Hypothesis How can users make a difference in their online security when using public Wi-Fi? Introduction (Heading not included) Briefly discuss public Wi-Fi Safety risks when using public Wi-Fi Improving network safety on public … Continue reading Dangers and Precautions while on Public Wi-Fi

Cybersecurity Trends and Autonomous Systems

Week 12 Cybersecurity Trends Subject Searching The search topic I chose is Cybersecurity Trends. I chose the Computer Source subject and selected the Informatics guide.  I then chose the EBSCOhost databases which returned 11 results.  I selected the Full Text and Peer Reviewed options.  I did change the date range since it was already 2005 … Continue reading Cybersecurity Trends and Autonomous Systems

T55 Intro & T56 Writing Surveys

T55 Survey Intro  A survey is a measurement instrument that collects data like a questionnaire or an interview. The most common approach to a survey in action research is to skip random sampling and never generalize. Data can be collected via mail or email, phone, in-person, or on the world wide web. T56 Writing Surveys … Continue reading T55 Intro & T56 Writing Surveys

Narrowing it Down to the Specifics

Advanced Searches Database: Computer Science Collection Boolean term: Cybersecurity and Cyberattacks Limiters: Academic Journals, Full-Text Documents, Peer-Reviewed Journals, Publication Date Apr 06,2017 – April 06, 2022. Results: 158 Potential Article: Alqahtani, M. A. (2022). Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience, 2022. https://link.gale.com/apps/doc/A698473867/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=494e0159. Accessed April 6, 2022. … Continue reading Narrowing it Down to the Specifics

Cybersecurity, Cyber Attacks, Cyber Crime Awareness

Simple Searches Database: Computer Science Collection Keyword: Cybersecurity Results: 1,402 Potential Article: Alqahtani, M. A. (2022). Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience, 2022. https://link.gale.com/apps/doc/A698473867/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=494e0159. Accessed March 31, 2022. https://link.gale.com/apps/doc/A698238142/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=05d816ca Keyword: Cyberattacks Results: 587 Potential Article: Son, K.-H., Kim, B.-I., & Lee, T.-J. (2020). Cyber-attack group analysis … Continue reading Cybersecurity, Cyber Attacks, Cyber Crime Awareness

Plan to Research Balance of Cyber security, Cybercrime, or Cyberprivacy

My initial research idea was to do something on cybersecurity. I haven’t changed my focus, just trying to refine the research to one main question to investigate. Cybersecurity differences between the military and private sector perception of security in cyberspace, and how to balance national security and individual rights? Which approach will promote a sustainable … Continue reading Plan to Research Balance of Cyber security, Cybercrime, or Cyberprivacy

Research emphasis on Gender Theory

Heath Milam T17 Gender Theory Presentation 2 W9 Research with the Gender Theory Approach requires the action researcher to ask questions and place the context of the impact on Gender Identity Construction. Gender socialization occurs through our family, schools, peer groups, and the mass media. Gender roles are reinforced by creating and maintaining expectations for … Continue reading Research emphasis on Gender Theory