{"id":279,"date":"2023-09-01T16:12:34","date_gmt":"2023-09-01T16:12:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/abrow174200t\/?page_id=279"},"modified":"2023-11-28T16:47:56","modified_gmt":"2023-11-28T16:47:56","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/abrow174200t\/it-cyse-200t\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<p class=\"has-text-align-left\">Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-<br>disciplinary, and some aspects of the topic are best understood through a social science lens.<br>This course addresses the social, political, legal, criminological, and economic dimensions of<br>cybersecurity through a social science framework. Students are introduced to a human-factors<br>approach to understanding cybersecurity threats. Attention is given to the social factors that<br>contribute to cyber incidents and the political and legal mechanisms that are developed to control<br>the behaviors of those who create risks in cybersecurity incidents. The class also explores how<br>social scientists in psychology, political science, criminology, <div>Economics, sociology, international studies, and other social science disciplines study cybersecurity.<br><\/div><\/p>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-left\"><div>Learning Outcomes<br><\/div><\/p>\n\n\n\n<p class=\"has-text-align-left\"><div>After completing this class, students will be able to:<br><\/div><\/p>\n\n\n\n<ul>\n<li><div> Compare how basic psychological, sociological, criminological, political, economic, and<\/div><div>Legal theories and models explain cybersecurity.<\/div><\/li>\n\n\n\n<li><div> Identify the strengths and weaknesses of those theories in understanding the connections<\/div><div>between human behaviors and cybersecurity<\/div><\/li>\n\n\n\n<li><div> Define key concepts, including cybersecurity, cybercrime, cyber criminology, cyber law,<\/div><div>digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar.<\/div><\/li>\n\n\n\n<li><div>Identify how professionals in various cybersecurity careers apply these multidisciplinary<\/div><div>concepts in their daily routines<\/div><\/li>\n\n\n\n<li><div>Describe how hypotheses and research questions are formed in studies addressing<\/div><div>cybersecurity through a social science lens<\/div><\/li>\n\n\n\n<li><div> Describe how data are collected, measured, and analyzed in studies addressing<\/div><div>cybersecurity through a social science lens<\/div><\/li>\n\n\n\n<li><div> Identify how marginalized groups have confronted challenges and concerns related to cybersecurity as well as how these groups have contributed to our understanding about<\/div><div>the topic.<\/div><\/li>\n\n\n\n<li><div> Explain how the application of social science theories, principles, and research strategieshave contributed to our understanding of cybersecurity at the societal level.<\/div><\/li>\n<\/ul>\n\n\n\n<p><strong>Journal Entry #1<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/09\/Journal-Entry-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-Entry-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Journal Entry #2<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/11\/There-are-several-ways-that-the-principles-of-science-relate-to-and-inform-the-field-of-cybersecurity-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">There-are-several-ways-that-the-principles-of-science-relate-to-and-inform-the-field-of-cybersecurity-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Journal Entry #3<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/11\/The-site-maintains-a-comprehensive-database-of-data-breaches-reported-in-the-United-States-dating-back-to-2005.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">The-site-maintains-a-comprehensive-database-of-data-breaches-reported-in-the-United-States-dating-back-to-2005<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Journal Entry #4<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/11\/Module-4-eport.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Module-4-eport<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Journal Entry #5 <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/11\/Here-is-my-ranking-and-explanation-of-the-motives-behind-hacking.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Here-is-my-ranking-and-explanation-of-the-motives-behind-hacking<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Journal Entry #6<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/11\/Here-are-three-examples-of-fake-websites-along-with-three-real-websites.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Here-are-three-examples-of-fake-websites-along-with-three-real-websites<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Journal Entry #7<\/p>\n\n\n<b>PDF Embedder requires a url attribute<\/b>\n\n\n<p>Journal Entry #8<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/11\/I.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">I<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Journal Entry #9<\/p>\n\n\n<b>PDF Embedder requires a url attribute<\/b>\n\n\n<p>Journal #10<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/11\/The-article.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">The-article<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Journal #11<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/11\/Based-on-the-data-breach-notification-letter-regarding-a-security-incident-at-glasswasherpart1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Based-on-the-data-breach-notification-letter-regarding-a-security-incident-at-glasswasherpart1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Journal #12<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/11\/One-of-the-most-severe-offenses-is-illegally-using-copyrighted-images-or-media-without-permission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">One-of-the-most-severe-offenses-is-illegally-using-copyrighted-images-or-media-without-permission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-disciplinary, and some aspects of the topic are best understood through a social science lens.This course addresses the social, political, legal, criminological, and economic dimensions ofcybersecurity through a social science framework. Students are introduced to a human-factorsapproach to understanding cybersecurity threats. Attention&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/it-cyse-200t\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":21507,"featured_media":0,"parent":91,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/pages\/279"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/users\/21507"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/pages\/279\/revisions"}],"predecessor-version":[{"id":310,"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/pages\/279\/revisions\/310"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/pages\/91"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/media?parent=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}