Cybersecurity, Technology, & Society
Course Description
Students will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains.
After completing this course, students will be able to…
- Describe how cyber technology creates opportunities for criminal behavior.
- Identify how cultural beliefs interact with technology to impact cybersecurity strategies.
- Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns.
- Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization.
- Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts produce for individuals, nations, societies, and the environment.
- Describe the costs and benefits of producing secure cyber technologies.
- Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes.
- Describe the role of cybersecurity in defining definitions of appropriate and inappropriate behavior.
- Describe how cybersecurity produces ideas of progress and modernism.
Course Readings
All readings will be available online. No book purchase needed.
Open Access materials will be used for the course. The books include:
- Floridi, L. (2015). The Onlife Manifesto: Being Human in a Hyperconnected Era. Springer-Verlag GmbH. https://link.springer.com/book/10.1007%2F978-3-319-04093-6.
- Van Ommeren, E., Borrett M., & Kuivenhoven, M. (2014). Staying Ahead in the Cyber Security Game. Sogeti. https://www.ict-books.com/topics/cyber-security-pdf-info.
All readings are listed in the Weekly Modules.
Grading
The final letter grade is based on the percentage of total points earned and will follow the suggested guidelines in the university catalog. Please reach out to me if you experience a medical or other type of emergency to work out a possible arrangement.
*Unsourced work is subject to be reported as an Academic Integrity violation to the University.
Analytical Paper
Below is my submission reagarding my end of semester Analytical Paper discussing the social meaning and impact of cybersecurity-related technical systems.
Analytical-Paper