CYSE 201S

Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-
disciplinary, and some aspects of the topic are best understood through a social science lens.
This course addresses the social, political, legal, criminological, and economic dimensions of
cybersecurity through a social science framework. Students are introduced to a human-factors
approach to understanding cybersecurity threats. Attention is given to the social factors that
contribute to cyber incidents and the political and legal mechanisms that are developed to control
the behaviors of those who create risks in cybersecurity incidents. The class also explores how
social scientists in psychology, political science, criminology,

Economics, sociology, international studies, and other social science disciplines study cybersecurity.

Learning Outcomes

After completing this class, students will be able to:

  • Compare how basic psychological, sociological, criminological, political, economic, and
    Legal theories and models explain cybersecurity.
  • Identify the strengths and weaknesses of those theories in understanding the connections
    between human behaviors and cybersecurity
  • Define key concepts, including cybersecurity, cybercrime, cyber criminology, cyber law,
    digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar.
  • Identify how professionals in various cybersecurity careers apply these multidisciplinary
    concepts in their daily routines
  • Describe how hypotheses and research questions are formed in studies addressing
    cybersecurity through a social science lens
  • Describe how data are collected, measured, and analyzed in studies addressing
    cybersecurity through a social science lens
  • Identify how marginalized groups have confronted challenges and concerns related to cybersecurity as well as how these groups have contributed to our understanding about
    the topic.
  • Explain how the application of social science theories, principles, and research strategieshave contributed to our understanding of cybersecurity at the societal level.

Journal Entry #1

Journal-Entry-1

Journal Entry #2

There-are-several-ways-that-the-principles-of-science-relate-to-and-inform-the-field-of-cybersecurity-1

Journal Entry #3

The-site-maintains-a-comprehensive-database-of-data-breaches-reported-in-the-United-States-dating-back-to-2005

Journal Entry #4

Module-4-eport

Journal Entry #5

Here-is-my-ranking-and-explanation-of-the-motives-behind-hacking

Journal Entry #6

Here-are-three-examples-of-fake-websites-along-with-three-real-websites

Journal Entry #7

PDF Embedder requires a url attribute

Journal Entry #8

I

Journal Entry #9

PDF Embedder requires a url attribute

Journal #10

The-article

Journal #11

Based-on-the-data-breach-notification-letter-regarding-a-security-incident-at-glasswasherpart1

Journal #12

One-of-the-most-severe-offenses-is-illegally-using-copyrighted-images-or-media-without-permission