Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment as database developer

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment as database developer. Share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals?

Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole. Answer all 4 topic questions with the minimum to two sources and no more than two paragraphs.

The class discusses ethical and non ethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.

Topic 1: Hacker Motivation and Threat Mitigation

Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc….), and give examples where these motivations were a factor in a cyberattack.

What can organizations do to be more proactive in identifying and mitigating hacker threats?

Background:

1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 – older but, I believe, still relevant and a solid short introduction]

2. Understanding a Hacker’s Mind: A Psychological Insight into the Hijacking of Identities [2004 – RSA. Also still useful]

3. The Risk Propensity and Rationality of Computer Hackers [2010 ]

Topic 2: Ethical and Nonethical Hackers

As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms “hackers” and “crackers” as threat actors, we will use the terms “ethical hackers” and “nonethical hackers” to make the same differentiation.

How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?

Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)? (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation….)

Topic 3: Hacking as an “Addiction”

Some mental health and criminal justice professionals contend that hacking is an “addiction,” and causes obsessive, risk-taking behavior in a manner similar to illegal narcotics—hackers hack to “get high” from the thrill of breaking into a system and getting away with it.

Should policy makers look toward treatment, rather than incarceration, as to the disposition of hacker cases? Why or why not?

How do profiles of ethical and non-ethical hackers differ?
Topic 4 – Profiling of Cybercriminals

While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals?

What sort of things do we already know about the personalities of cybercriminals?

Do we have enough evidence to indicate there is a distinct psychological pattern that would help in the apprehension of cybercriminals?

The Art and Science of Leadership,

Assignment Content

  1.    Resources:
    • The Art and Science of Leadership, Ch. 6
    • Formulating Leadership Part II Grading Guide
    • Management Roles: Leading Video
    • Your company’s Vice President of Human Resources has approached your team for assistance in recruiting and developing your organization’s future leaders. 60% of your company consists of millennials and your team has been charged with how to successfully increase the number of millennials as leaders in your organization. At this time, senior management is reluctant and disinterested in promoting the millennials to leadership roles. Your team created your plan in Week 2 -Part I of this assignment. Now, you are expected to develop a presentation for your senior leadership that will motivate them to encourage millennials as leaders in your organization.
      Re-examine your plan from Part 1 as a team.
      Create a 3- to 5-slide Microsoft® PowerPoint® presentation with speaker notes that contains the following components:
    • Determine how to cultivate millennials as leaders. 
    • Include the pathway necessary to accomplish this goal by identifying the objective(s), methods of achieving the objective(s), and ways to measure success.
    • Evaluate how transformational leadership may assist in this process.
    • Include at least one video presentation within a slide.
    • Showcase some of the best practices needed by companies in order to prepare future leaders.
    • Cite a minimum of three peer reviewed sources not including your text.
      Format your assignment consistent with APA guidelines.
      Submit your assignment.
      Resources

Post by Day 3 a description of two technology tools or platforms that you believe have had a significant impact on I/O psychology.

Post by Day 3 a description of two technology tools or platforms that you believe have had a significant impact on I/O psychology.

  • Explain your rationale and justify your explanation with support from the Learning Resources and current literature.
  • Explain one specific way an I/O psychologist can use technology in an ethical manner.
  • Include in your discussion how technology can be used in an unethical manner and explain why.