Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/33/71/87/33718735-87cb-4b10-4a8f-4075856dd261/mza_14396921831542162912.jpg/600x600bb.jpg
Crossing The Firewall
MSU Center for Cybercrime Investigation & Training
16 episodes
3 days ago
The Crossing the Firewall podcast is a bi-weekly cybercrime podcast hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher and sponsored by the MSU Center for Cybercrime Investigation and Training. Each episode is a deep dive into one of the many facets of cybercrime and features a unique researcher or practitioner in the field.
Show more...
True Crime
RSS
All content for Crossing The Firewall is the property of MSU Center for Cybercrime Investigation & Training and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Crossing the Firewall podcast is a bi-weekly cybercrime podcast hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher and sponsored by the MSU Center for Cybercrime Investigation and Training. Each episode is a deep dive into one of the many facets of cybercrime and features a unique researcher or practitioner in the field.
Show more...
True Crime
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/43205180/43205180-1741357288198-f01baefb63c81.jpg
Human & Robot Factors in Data Protection - Dr. George Burruss
Crossing The Firewall
56 minutes 5 seconds
1 month ago
Human & Robot Factors in Data Protection - Dr. George Burruss

Concern about data privacy, security, and victimhood vary from person to person. How much we are willing to do to avoid being a victim of cybercrime also varies. Why?


The Protection Motivation Theory (PMT) describes this phenomenon well and provides some answers about why or why not people will protect themselves from a particular threat.


This week's guest Dr. George Burruss (Professor and Chair of the Department of Criminology at the University of South Florida) discusses how PMT can help researchers and practitioners understand data protection risks.


---


Learn more about Dr. George Burruss: https://www.usf.edu/cbcs/criminology/faculty-staff/g-burruss.aspx


---


Interested in learning more about the MSU Center for Cybercrime Investigation & Training? Visit our website: www.cybertraining.msu.eduAdvance your career with a Masters Degree in Cybercrime and Digital Investigation from the MSU School of Criminal Justice: https://online.cj.msu.edu/ms-masters-cybercrime-digital-investigation----Follow Crossing the Firewall on social media! Find us on BlueSky and Instagram. You can also follow the MSU Center for Cybercrime Investigation and Training on LinkedIn. Crossing the Firewall is hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher. Edited by JJ Thomas. All views and opinions expressed are the views of the hosts and guests and do not necessarily reflect the views and opinions of their home institutions or places of work. All information provided in this podcast should not be taken as business, personal, financial, or legal advice.

Crossing The Firewall
The Crossing the Firewall podcast is a bi-weekly cybercrime podcast hosted by Dr. Tom Holt, Dr. Rachel McNealey, and Dr. Taylor Fisher and sponsored by the MSU Center for Cybercrime Investigation and Training. Each episode is a deep dive into one of the many facets of cybercrime and features a unique researcher or practitioner in the field.