Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (491)
- Clark University (68)
- University of New Haven (61)
- Bridgewater State University (58)
- Old Dominion University (38)
-
- Edith Cowan University (21)
- Singapore Management University (18)
- Kennesaw State University (14)
- Georgia State University (12)
- City University of New York (CUNY) (7)
- Nova Southeastern University (5)
- The University of San Francisco (5)
- University of Central Florida (5)
- University of Nebraska - Lincoln (5)
- California State University, San Bernardino (4)
- Chinese Academy of Sciences (4)
- San Jose State University (4)
- University of Arkansas, Fayetteville (4)
- Air Force Institute of Technology (3)
- Eastern Michigan University (3)
- SIT Graduate Institute/SIT Study Abroad (3)
- Selected Works (3)
- University of Kentucky (3)
- Association of Arab Universities (2)
- Clemson University (2)
- Dakota State University (2)
- Purdue University (2)
- University of Nebraska at Omaha (2)
- University of Pennsylvania Carey Law School (2)
- University of South Florida (2)
- Keyword
-
- Digital forensics (55)
- Cybersecurity (48)
- MPA (33)
- Security (31)
- Cybercrime (26)
-
- Privacy (26)
- Computer forensics (20)
- Digital Forensics (20)
- Forensics (19)
- MSIT (17)
- Social media (17)
- Digital evidence (16)
- MSPC (13)
- Survey (12)
- Technology (12)
- Cyber security (10)
- Approximate matching (9)
- Computer Forensics (9)
- Cyber forensics (9)
- Cyberbullying (9)
- Information security (9)
- Computer security (8)
- Cryptocurrency (8)
- Internet (8)
- Mobile device forensics (8)
- Mrsh-v2 (8)
- Big data (7)
- Cyber crime (7)
- Deception (7)
- Phishing (7)
- Publication Year
- Publication
-
- Journal of Digital Forensics, Security and Law (300)
- Annual ADFSL Conference on Digital Forensics, Security and Law (183)
- School of Professional Studies (68)
- International Journal of Cybersecurity Intelligence & Cybercrime (58)
- Electrical & Computer Engineering and Computer Science Faculty Publications (56)
-
- EBCS Articles (11)
- Journal of Cybersecurity Education, Research and Practice (11)
- Cybersecurity Undergraduate Research Showcase (10)
- Research Collection School Of Computing and Information Systems (10)
- Australian Information Security Management Conference (6)
- CCE Theses and Dissertations (5)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (5)
- Publications (5)
- Research outputs 2014 to 2021 (5)
- Australian Security and Intelligence Conference (4)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (4)
- Electronic Theses and Dissertations (4)
- Master's Theses (4)
- Media Studies (4)
- Publications and Research (4)
- Sociology & Criminal Justice Faculty Publications (4)
- Theses and Dissertations (4)
- All Faculty Scholarship (3)
- Engineering Management & Systems Engineering Faculty Publications (3)
- Engineering Technology Faculty Publications (3)
- Faculty Publications (3)
- Independent Study Project (ISP) Collection (3)
- KSU Proceedings on Cybersecurity Education, Research and Practice (3)
- Master's Theses and Doctoral Dissertations (3)
- Mineta Transportation Institute (3)
- Publication Type
- File Type
Articles 181 - 210 of 886
Full-Text Articles in Social and Behavioral Sciences
Diversity And Inclusion In The Workplace; Benefits, Challenges And Strategies For Success, Margaret Leone
Diversity And Inclusion In The Workplace; Benefits, Challenges And Strategies For Success, Margaret Leone
School of Professional Studies
In this case study I have explored the topic of diversity and inclusion in the workplace and learned how it can transform a business. When D&I is a serious business strategy supported by senior management it can help recruit and retain top talent, increase profits, and unleash creativity among other benefits. It is important to have leadership that is inclusive so they can set the tone for their staff
This case study evaluates the D&I culture at The Children’s Study Home (CHS) and explores best practices for improvement. CHS is a non-profit human service agency in Western MA, that’s mission …
The Mental Health Of Black Men: Stabilizing Trauma With Emotional Intelligence, Davis Brandford
The Mental Health Of Black Men: Stabilizing Trauma With Emotional Intelligence, Davis Brandford
School of Professional Studies
The purpose of this study is to explore the relationship between the impact of historical trauma and barriers on African-American males and the effects of emotional intelligence in reducing traumatic experiences. This research study is based on previous research and studies that explores the historical review of African- American oppression, trauma in black males, and mental health in the African American community. This study will utilize the historical trauma and emotional intelligence theories to explore barriers that African Americans have experienced over time and the role emotional intelligence can play to reduce trauma. It also explores the relevance of historical …
Elder Isolation In Immigrant Communities, Jessica Da Silva
Elder Isolation In Immigrant Communities, Jessica Da Silva
School of Professional Studies
This paper examined loneliness, as a measurement of perceived social isolation, in older immigrant adults. Previous research shows that older adults are more likely to experience social isolation and loneliness. Both of which have a direct correlation with their overall health (Wilson & Molton, 2010, Cacioppo et al., 2002) and mortality rates (Holt-Lunstad et al, 2015). Another international study found that immigrants in particular are at a higher risk for experiencing loneliness (Government of Canada, 2018). In this study, 35 immigrants and non-immigrants participants answered a survey which included 20 questions from the UCLA Loneliness Scale Version 3 (Russel, 1996). …
Managing Burnout And Secondary Traumatic Stress In Human Service Organizations, Naomi Ingram
Managing Burnout And Secondary Traumatic Stress In Human Service Organizations, Naomi Ingram
School of Professional Studies
This Case Study explores how burnout and secondary traumatic stress impact staffing, service delivery, and organizational effectiveness in a human service agency. The Case Study is focused around Ascentria Care Alliance’s Children & Family Services in Massachusetts, which encompasses three foster care programs: the Unaccompanied Refugee Minor (URM), Division of Children’s Services (DCS), and Intensive Foster Care (IFC) programs. Both individual and organizational approaches are needed to most effectively address burnout and secondary traumatic stress. Individual workers need to build resilience factors such as self-compassion and mindfulness, set appropriate boundaries with clients, engage in ongoing training, support, consultation, and supervision, …
Becoming A Trauma Informed Care Organization, Katie Robery
Becoming A Trauma Informed Care Organization, Katie Robery
School of Professional Studies
The Brockton Area Mutli Services Inc or BAMSI is a private, non-profit human services organization providing services to adults and children with developmental disabilities, mental illness, behavioral health, and public health needs. Founded in 1975, BAMSI is in the business of “bringing people and services together.” BAMSI transforms lives by building the capacity of individuals, families, organizations, and communities to learn, thrive, and achieve their goals. BAMSI services promote the recovery, resiliency, and self-determination of the people we serve. As a human services leader, we strive to be the provider of choice. (Duffy, 2019) With an emphasis on respect and …
Crisis Communication And Executive Leadership: Ethical Shortcomings In Government, Daniel Davidoff
Crisis Communication And Executive Leadership: Ethical Shortcomings In Government, Daniel Davidoff
School of Professional Studies
This research thesis project is an analysis of how and why governments fail in their attempts at crisis communication. The hypotheses tested are: there exists a negative correlation between unethical leadership and successful crisis communication practices. And governments are more likely to experience these failures due to ethical disconnects in modern politics. Research includes a review of relevant academic literature regarding crisis communication theory, as well as the ethical framework that can be applied to that theory. Cases considered are Hurricane Katrina, the choking death of Eric Garner, and the COVID-19 global pandemic. The research project concludes with a recommendation …
Rest Homes: Their Value On Massachusetts Healthcare Continuum, Ronald Pawelski
Rest Homes: Their Value On Massachusetts Healthcare Continuum, Ronald Pawelski
School of Professional Studies
In Massachusetts, rest homes provide cost effective care for elderly residents in a community setting. Rest homes, however, are not well-understood and the rest home industry itself suffers greatly, not only from a lack of understanding of the services they provide, but also from the strain on their financial resources due to both competition from other healthcare options and insufficient reimbursement rates for residents’ care.
The paper explores the financial challenges facing the industry and outlines the data that speaks to the value of the rest home care option for both the residents themselves and Massachusetts state healthcare budget. It …
Dallas, Tx: The Staggering Wealth Gap, Macy Golman
Dallas, Tx: The Staggering Wealth Gap, Macy Golman
School of Professional Studies
In the summer of 2019, I had the privilege of serving as an AmeriCorps member with an organization called Equal Heart. One of Equal Heart’s main initiatives was to provide meals to children in underserved populations, to make sure that without school in session, these children would still be receiving food. Unfortunately, in many instances, without these meals, many of the children we served would likely not know when they would be eating their next fulfilling meal. There were certain pockets of Dallas that we would travel to everyday, places that were fifteen minutes maximum from my house, but places …
Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "21: Hacking Democracy: Election Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood
Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood
Independent Study Project (ISP) Collection
The digital domain is the emerging environment for which the internet and data connectivity exists. This new domain is challenging the traditional place for geopolitics to exist, and creating new challenges to international relations. The use of cyberweapons through direct cyberattacks, such as the possibility of an attack on the U.S. power grid, or misinformation campaigns, such as the one launched by Russia against the 2016 U.S. Presidential election, can expand the international threat landscape. While these new threats increase, states are widely not prepared to address the new challenges in the digital domain. This paper will use three primary …
A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey
A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey
Honors Program Contracts
Adversaries launch cyberattacks or cyber-exploits with contrasting intentions and desired outcomes. A cyberattack is a malicious attempt by a state, third party, or individual to disrupt a computer’s network; whereas, a cyber-exploit is an action that uncovers and steals “confidential” information from a computer’s data. 1 Within this research paper, the main adversary of such cyberattacks and/or exploits will be the nation-state. The victims of these cyberattacks will range from multinational corporations, such as Sony, to nuclear programs in Iran. This essay will focus on four motivations behind such cyberattacks: (1) private sector hacking (the theft of intellectual property) (2) …
Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller
Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller
Psychology Theses & Dissertations
System administrators have started to adopt two-factor authentication (2FA) to increase user account resistance to cyber-attacks. Systems with 2FA require users to verify their identity using a password and a second-factor authentication device to gain account access. This research found that 60% of users only enroll one second-factor device to their account. If a user’s second factor becomes unavailable, systems are using different procedures to ensure its authorized owner recovers the account. Account recovery is essentially a bypass of the system’s main security protocols and needs to be handled as an alternative authentication process (Loveless, 2018). The current research aimed …
Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon
Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon
EBCS Articles
The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing …
Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah
Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah
EBCS Articles
The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …
Data Mining Of Chinese Social Networks: Factors That Indicate Post Deletion, Meisam Navaki Arefi
Data Mining Of Chinese Social Networks: Factors That Indicate Post Deletion, Meisam Navaki Arefi
Computer Science ETDs
Widespread Chinese social media applications such as Sina Weibo (Chinese Twitter), the most popular social network in China, are widely known for monitoring and deleting posts to conform to Chinese government requirements. Censorship of Chinese social media is a complex process that involves many factors. There are multiple stakeholders and many different interests: economic, political, legal, personal, etc., which means that there is not a single strategy dictated by a single government authority. Moreover, sometimes Chinese social media do not follow the directives of government, out of concern that they are more strictly censoring than their competitors.
One crucial question …
A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson
A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson
International Journal of Cybersecurity Intelligence & Cybercrime
How individuals conceptualize their accountability related to digital technology. There may also be age-based vulnerabilities resulting from personal perceptions about the importance of engaging in best-practices. However, age may not be as critical as experience when it comes to implementation of these behaviors. Using the Cybersecurity Behaviors subscale of the Online Security Behaviors and Beliefs Questionnaire (OSBBQ), this study compared the self-reported cybersecurity attitudes and behaviors across college-aged individuals from Generation Y and Generation Z. Data were derived from a convenience sample of predominantly African-American and Caucasian respondents (N=593) recruited from two public universities in Virginia, USA. Four of the …
An Empirical Study To Determine The Role Of File-System In Modification Of Hash Value, Kumarshankar Raychaudhuri, M. George Christopher
An Empirical Study To Determine The Role Of File-System In Modification Of Hash Value, Kumarshankar Raychaudhuri, M. George Christopher
International Journal of Cybersecurity Intelligence & Cybercrime
In digital forensics, maintaining the integrity of digital exhibits is an essential aspect of the entire investigation and examination process, which is established using the technique of hashing. Lack of knowledge, while handling digital exhibits, might lead to unintentional alteration of computed hash, rendering the exhibit unacceptable in the court of Law. The hash value of a physical drive does not solely depend upon the data files present in it but also its file-system. Therefore, any change to the file-system might result in the change of the disk hash, even when the data files within it remain untouched. In this …
Review Of Fundamental To Know About The Future, Hannarae Lee
Review Of Fundamental To Know About The Future, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
What we consider fundamental elements can be easily overlooked or perceived as facts without the process of empirical testing. Especially in the field of cybercrime and cybersecurity, there are more speculations regarding the prevalence and the scope of harm carried out by wrongdoers than empirically tested studies. To fill the void, three articles included in the current issue addresses empirical findings of fundamental concerns and knowledge in the field of cybercrime and cybersecurity.
Illegal Gambling And Its Operation Via The Darknet And Bitcoin: An Application Of Routine Activity Theory, Sinyong Choi, Kyung-Shick Choi, Yesim Sungu-Eryilmaz, Hee-Kyung Park
Illegal Gambling And Its Operation Via The Darknet And Bitcoin: An Application Of Routine Activity Theory, Sinyong Choi, Kyung-Shick Choi, Yesim Sungu-Eryilmaz, Hee-Kyung Park
International Journal of Cybersecurity Intelligence & Cybercrime
The Darknet and Bitcoins have been widely utilized by those who wish to anonymously perform illegal activities in cyberspace. Restricted in many countries, gambling websites utilize Bitcoin payments that allow users to freely engage in illegal gambling activities with the absence of a formal capable guardian. Despite the urgency and limited knowledge available to law enforcement regarding this issue, few empirical studies have focused on illegal gambling websites. The current study attempts to examine the characteristics and operations of online gambling websites on both the Darknet and Surface Web, which allow Bitcoin payments. The findings suggest that both websites on …
Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa
Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa
International Journal of Cybersecurity Intelligence & Cybercrime
No abstract provided.
Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta
Teaching About The Dark Web In Criminal Justice Or Related Programs At The Community College And University Levels., Scott H. Belshaw, Brooke Nodeland, Lorrin Underwood, Alexandrea Colaiuta
Journal of Cybersecurity Education, Research and Practice
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This article discusses the need to incorporate courses discussing the Dark Web in criminal justice. A review of existing cyber-criminal justice programs in Texas and nationally suggests that most community colleges and 4-year universities have yet to develop courses/programs in understanding and investigating the Dark Web on the internet. The Dark Web serves as the …
Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons
Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons
International Crisis and Risk Communication Conference
Data security breaches are an increasingly common problem for organizations, yet there are critical gaps in our understanding of how different stakeholders understand and evaluate organizations that have experienced these kinds of security breaches. While organizations have developed relatively standard approaches to responding to security breaches that: (1) acknowledge the situation; (2) highlight how much they value their stakeholders’ privacy and private information; and (3) focus on correcting and preventing the problem in the future, the effectiveness of this response strategy and factors influencing it have not been adequately explored. This experiment focuses on a 2 (type of organization) x …
Divergence Of Safety And Security, David J. Brooks, Michael Coole
Divergence Of Safety And Security, David J. Brooks, Michael Coole
Research outputs 2014 to 2021
© 2020, The Author(s). Safety and security have similar goals, to provide social wellness through risk control. Such similarity has led to views of professional convergence; however, the professions of safety and security are distinct. Distinction arises from variances in concept definition, risk drivers, body of knowledge, and professional practice. This chapter explored the professional synergies and tensions between safety and security professionals, using task-related bodies of knowledge. Findings suggest that safety and security only have commonalities at the overarching abstract level. Common knowledge does exist with categories of risk management and control; however, differences are explicit. In safety, risk …
Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai
Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai
All Faculty Scholarship
Policymakers in the United States have just begun to address regulation of artificial intelligence technologies in recent years, gaining momentum through calls for additional research funding, piece-meal guidance, proposals, and legislation at all levels of government. This Article provides an overview of high-level federal initiatives for general artificial intelligence (AI) applications set forth by the U.S. president and responding agencies, early indications from the incoming Biden Administration, targeted federal initiatives for sector-specific AI applications, pending federal legislative proposals, and state and local initiatives. The regulation of the algorithmic ecosystem will continue to evolve as the United States continues to search …
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney
CCE Theses and Dissertations
Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …
The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes
The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes
Cybersecurity Undergraduate Research Showcase
This report examines the advantages and disadvantages associated with the growth of technology within the United States, specifically how technology, digital literacy, and cybersecurity can be used to both facilitate and combat sex trafficking and sexual exploitation on the Internet. The first part of the report addresses trafficking statistics in the United States, as well as legal intervention the country has taken against this epidemic, including an explanation of the Trafficking Victims Prevention Act and the FOSTA-SESTA bill. The second part of the report addresses the online recruitment of buyers and sellers, as well as how the use of open-source …
Understanding The Challenges Child Welfare Workers Encounter Related To Promoting The Online Safety Of Foster Youth, Denielle Kirk L. Abaquita
Understanding The Challenges Child Welfare Workers Encounter Related To Promoting The Online Safety Of Foster Youth, Denielle Kirk L. Abaquita
Honors Undergraduate Theses
Foster care case managers are responsible for the wellbeing of foster youth in the foster care system. Teens (ages 13-17) in foster care are most vulnerable to serious risks, such as sex trafficking. Such risks have been heightened by the advent of internet-based technologies that connect foster youth with unsafe others at unprecedented frequency and speed. This thesis examines how case managers tackle the challenge of online safety as it relates to adolescents in the foster care system in the United States. I conducted 32 semi-structured interviews with case managers who worked with foster teens (ages 13-17) within the past …
Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo
Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo
Journal of International Technology and Information Management
The development of quantum computers over the past few years is probably one of the significant advancements in the history of quantum computing. D-Wave quantum computer has been available for more than eight years. IBM has made its quantum computer accessible via its cloud service. Also, Microsoft, Google, Intel, and NASA have been heavily investing in the development of quantum computers and their applications. The quantum computer seems to be no longer just for physicists and computer scientists but also for information system researchers. This paper introduces the basic concepts of quantum computing and describes well-known quantum applications for non-physicists. …
Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan
Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan
Electrical & Computer Engineering and Computer Science Faculty Publications
With the widespread integration of AI in everyday and critical technologies, it seems inevitable to witness increasing instances of failure in AI systems. In such cases, there arises a need for technical investigations that produce legally acceptable and scientifically indisputable findings and conclusions on the causes of such failures. Inspired by the domain of cyber forensics, this paper introduces the need for the establishment of AI Forensics as a new discipline under AI safety. Furthermore, we propose a taxonomy of the subfields under this discipline, and present a discussion on the foundational challenges that lay ahead of this new research …
Rhetsec_ | Rhetorical Security, Jennifer Mead
Rhetsec_ | Rhetorical Security, Jennifer Mead
Culminating Projects in English
Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …