Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-
disciplinary, and some aspects of the topic are best understood through a social science lens.
This course addresses the social, political, legal, criminological, and economic dimensions of
cybersecurity through a social science framework. Students are introduced to a human-factors
approach to understanding cybersecurity threats. Attention is given to the social factors that
contribute to cyber incidents and the political and legal mechanisms that are developed to control
the behaviors of those who create risks in cybersecurity incidents. The class also explores how
social scientists in psychology, political science, criminology,
- Compare how basic psychological, sociological, criminological, political, economic, andLegal theories and models explain cybersecurity.
- Identify the strengths and weaknesses of those theories in understanding the connectionsbetween human behaviors and cybersecurity
- Define key concepts, including cybersecurity, cybercrime, cyber criminology, cyber law,digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar.
- Identify how professionals in various cybersecurity careers apply these multidisciplinaryconcepts in their daily routines
- Describe how hypotheses and research questions are formed in studies addressingcybersecurity through a social science lens
- Describe how data are collected, measured, and analyzed in studies addressingcybersecurity through a social science lens
- Identify how marginalized groups have confronted challenges and concerns related to cybersecurity as well as how these groups have contributed to our understanding aboutthe topic.
- Explain how the application of social science theories, principles, and research strategieshave contributed to our understanding of cybersecurity at the societal level.
Journal Entry #1
Journal-Entry-1Journal Entry #2
There-are-several-ways-that-the-principles-of-science-relate-to-and-inform-the-field-of-cybersecurity-1Journal Entry #3
The-site-maintains-a-comprehensive-database-of-data-breaches-reported-in-the-United-States-dating-back-to-2005Journal Entry #4
Module-4-eportJournal Entry #5
Here-is-my-ranking-and-explanation-of-the-motives-behind-hackingJournal Entry #6
Here-are-three-examples-of-fake-websites-along-with-three-real-websitesJournal Entry #7
PDF Embedder requires a url attributeJournal Entry #8
IJournal Entry #9
PDF Embedder requires a url attributeJournal #10
The-articleJournal #11
Based-on-the-data-breach-notification-letter-regarding-a-security-incident-at-glasswasherpart1Journal #12
One-of-the-most-severe-offenses-is-illegally-using-copyrighted-images-or-media-without-permission