{"id":318,"date":"2024-08-04T06:49:15","date_gmt":"2024-08-04T06:49:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/?page_id=318"},"modified":"2024-08-04T07:05:05","modified_gmt":"2024-08-04T07:05:05","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-text-align-center\">Cybersecurity and the Social Sciences<\/h1>\n\n\n\n<p>Students in\u00a0CYSE 201S\u00a0This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework. Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the behaviors of those who create risks and cybersecurity incidents.\u00a0The learning outcomes for this course are as follows:<\/p>\n\n\n\n<ol>\n<li>Compare how basic psychological, sociological, criminological, political, economic, and legal theories and models explain cybersecurity,<\/li>\n\n\n\n<li>Identify the strengths and weaknesses of those theories in understanding the connections between human behaviors and cybersecurity,<\/li>\n\n\n\n<li>Define key concepts including cybersecurity, cybercrime, cyber criminology, cyber law, digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar,<\/li>\n\n\n\n<li>Identify how professionals in various cybersecurity careers apply these multidisciplinary concepts in their daily routines,<\/li>\n\n\n\n<li>Describe how hypotheses and research questions are formed in studies addressing cybersecurity through a social science lens,<\/li>\n\n\n\n<li>Identify how marginalized groups have confronted challenges and concerns related to cybersecurity as well as how these groups have contributed to our understanding about the topic,<\/li>\n\n\n\n<li>Explain how the application of social science theories, principles, and research strategies have contributed to our understanding of cybersecurity at the societal level.<\/li>\n<\/ol>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p>Students in this course have completed a number of activities including weekly discussion boards, weekly technology and cybersecurity journal,\u00a0 article analysis, annotated bibliography, and several quizzes and exams.<\/p>\n\n\n\n<p>Here are the annotated bibliography, article analysis, career paper, and all the journal entries I completed.<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-4233ef31-30fe-4c49-b41e-801151e92d93\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/Annotated-Bibliography.docx\">Annotated-Bibliography<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/Annotated-Bibliography.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4233ef31-30fe-4c49-b41e-801151e92d93\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-c259a78e-f0a7-425a-a81d-af8470ab0878\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/Article-Analysis-1.docx\">Article-Analysis-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/Article-Analysis-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c259a78e-f0a7-425a-a81d-af8470ab0878\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-938e8953-c13d-43d2-b4c3-ea2999b5a967\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/Career-Paper.docx\">Career-Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/Career-Paper.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-938e8953-c13d-43d2-b4c3-ea2999b5a967\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-c6209413-826b-4bac-8ecf-8822b821a149\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-1.docx\">CYSE-201S-Journal-Module-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c6209413-826b-4bac-8ecf-8822b821a149\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-42db9a56-c286-40dc-ab61-124537034132\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-2.docx\">CYSE-201S-Journal-Module-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-42db9a56-c286-40dc-ab61-124537034132\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-ae03f578-9ae8-4d94-a269-3632a2c8a3ea\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-3.docx\">CYSE-201S-Journal-Module-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-3.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ae03f578-9ae8-4d94-a269-3632a2c8a3ea\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-e94c5ef4-9150-4ee4-a1c6-010161c28981\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-4.docx\">CYSE-201S-Journal-Module-4<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-4.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e94c5ef4-9150-4ee4-a1c6-010161c28981\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-fd147e26-ad10-45d7-97e9-1786dcf5a612\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-5.docx\">CYSE-201S-Journal-Module-5<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-5.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-fd147e26-ad10-45d7-97e9-1786dcf5a612\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-de9c1697-c943-45b0-950c-7fc65d29f810\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-6.docx\">CYSE-201S-Journal-Module-6<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-6.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-de9c1697-c943-45b0-950c-7fc65d29f810\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-a0f900d2-6544-48b0-814c-5814cf21925d\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-8-1.docx\">CYSE-201S-Journal-Module-8-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-8-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a0f900d2-6544-48b0-814c-5814cf21925d\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-25a171fd-537b-4f20-873d-8ee04dc2ad58\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-9.docx\">CYSE-201S-Journal-Module-9<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-9.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-25a171fd-537b-4f20-873d-8ee04dc2ad58\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-599e4c5b-f9f9-4fa0-ba93-5e20dbf8a362\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-10-1.docx\">CYSE-201S-Journal-Module-10-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-10-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-599e4c5b-f9f9-4fa0-ba93-5e20dbf8a362\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-5bcf939a-ed90-46af-bf58-dae8bee9bd98\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-10-2.docx\">CYSE-201S-Journal-Module-10-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-10-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5bcf939a-ed90-46af-bf58-dae8bee9bd98\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-68304a27-92b4-40d2-9c50-a450153761bc\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-11-1.docx\">CYSE-201S-Journal-Module-11-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-11-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-68304a27-92b4-40d2-9c50-a450153761bc\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-d396c98a-945b-4b05-88af-2a9b2dea3fdd\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-11-2.docx\">CYSE-201S-Journal-Module-11-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-11-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d396c98a-945b-4b05-88af-2a9b2dea3fdd\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-25382baf-8704-4ea9-97b5-82615f03b53d\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-12.docx\">CYSE-201S-Journal-Module-12<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-12.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-25382baf-8704-4ea9-97b5-82615f03b53d\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-0d1b6ae4-93e2-4113-9a40-a259fce67d6e\" href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-14.docx\">CYSE-201S-Journal-Module-14<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-content\/uploads\/sites\/29659\/2024\/08\/CYSE-201S-Journal-Module-14.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0d1b6ae4-93e2-4113-9a40-a259fce67d6e\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences Students in\u00a0CYSE 201S\u00a0This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework. Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the behaviors of those who create risks&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":24130,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-json\/wp\/v2\/pages\/318"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-json\/wp\/v2\/users\/24130"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-json\/wp\/v2\/pages\/318\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-json\/wp\/v2\/pages\/318\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandonjasontenn\/wp-json\/wp\/v2\/media?parent=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}