All posts by Joshua G

About Joshua G

I was born in Garden City, KS. I grew up in rather rural area. I enjoy fishing, hunting, and other outdoor activities. My major is in Cyber Security and I will be graduating with a bachelors this year.

Global Policy’s on Internet Security and Privacy

Hypothesis- My Countries that have stricter policies and less privacy can be more secure then policies that promote privacy. However they will also be more Tyrannical. Meaning people should be given an outline to better discuss which policies and privacies should remain unchanged for the betterment of the world. Introduction Outlining the different producers and … Continue reading Global Policy’s on Internet Security and Privacy

How Different Countries use Social Media.

Research Topic: Different laws, regulations, and social norms among all countries that used social media. Article: one Meta-Media Event, Two Forms of Censorship: The Charlie Hebdo Affair in the United Kingdom and Turkey. Search 1: Censorship Database: Social Media Search Terms/ Restrictions : Full text Peer-reviewed Number of returns: 1,695 The paper is honestly not that … Continue reading How Different Countries use Social Media.

Week 11 Privacy and Freedom “Advanced Searches”

Database: Computer Science collection Boolean: AND Search Terms: Computer Privacy/ Privacy Policy Limiters: Full text/ Peer reviewed Results: 3 academic journals Chosen Article: Pollach, Irene. “Privacy statements as a means of uncertainty reduction in WWW interactions.” Journal of Organizational and End User Computing, vol. 18, no. 1, Jan.-Mar. 2006, pp. 23+. Gale OneFile: Computer Science, link.gale.com/apps/doc/A396138876/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=353a1f04. Accessed 8 Nov. … Continue reading Week 11 Privacy and Freedom “Advanced Searches”

Week 10 Privacy and Freedom “Simple Searches”

First Search Computer Science Collection: Keyword: Chinas internet policies Results: 23 Article: “The Internet sites China censors. (Policy and Market).” China Telecom, vol. 9, no. 12, Dec. 2002, p. 2. Gale OneFile: Computer Science, link.gale.com/apps/doc/A95642544/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=bc47e4eb. Accessed 31 Oct. 2021. Key word Change- UK censorship Article 2: Ginsberg, Jodie. “Balancing privacy and free expression online.” Computers in Libraries, vol. 36, … Continue reading Week 10 Privacy and Freedom “Simple Searches”

Dangerous Cybersecurity/Anti Privacy Regulations

Introduction: My original paper was going to be cybersecurity data that would describe the power of the current American cybersecurity framework. I soon realized this paper would be far to complex of a method for measuring data as the variables were to numerous. So for this paper I will measure individuals emotions based on choices … Continue reading Dangerous Cybersecurity/Anti Privacy Regulations

Cybersecurity article

Joshua Guymon Jr. Research Methods in Informatics 3 October 2021 Citation Dedeke, Adenekan, and Katherine Masterson. “Contrasting Cybersecurity Implementation Frameworks (CIF) from Three Countries.” Information & Computer Security, vol. 27, no. 3, 2019, pp. 373–392., https://doi.org/10.1108/ics-10-2018-0122. Abstract of the article The article discussing multiple countries and their key structures that have vulnerabilities in cybersecurity. How … Continue reading Cybersecurity article