{"id":133,"date":"2025-09-09T16:37:36","date_gmt":"2025-09-09T16:37:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2026-04-25T03:44:27","modified_gmt":"2026-04-25T03:44:27","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/carterwakefield\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n<h1>Course Material<\/h1>\n<p>Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,\u00a0 and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.<\/p>\n<p class=\"p1\">Be sure to remove this instructional language when you have completed updating content on this page.<\/p>\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-8cde25de-2916-451c-aa79-9d1a6756eaf1\" href=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Article-1-review.docx\">Article-1-review<\/a><a href=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Article-1-review.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8cde25de-2916-451c-aa79-9d1a6756eaf1\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-ba974c7e-d76d-42d4-b1ea-76d11600b31b\" href=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Article-2-review.docx\">Article-2-review<\/a><a href=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Article-2-review.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ba974c7e-d76d-42d4-b1ea-76d11600b31b\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/career-paper-network-admin.pdf\" type=\"application\/pdf\" style=\"width:100%;height:200px\" aria-label=\"Embed of career-paper-network-admin.\"><\/object><a id=\"wp-block-file--media-139d0447-2e41-4b95-acc4-409654b96e9c\" href=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/career-paper-network-admin.pdf\">career-paper-network-admin<\/a><a href=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/career-paper-network-admin.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-139d0447-2e41-4b95-acc4-409654b96e9c\">Download<\/a><\/div>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"358\" data-id=\"318\" src=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Psychology-of-Cybersecurity-1210x423-1-1024x358.png\" alt=\"\" class=\"wp-image-318\" srcset=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Psychology-of-Cybersecurity-1210x423-1-1024x358.png 1024w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Psychology-of-Cybersecurity-1210x423-1-300x105.png 300w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Psychology-of-Cybersecurity-1210x423-1-768x268.png 768w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Psychology-of-Cybersecurity-1210x423-1-600x210.png 600w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Psychology-of-Cybersecurity-1210x423-1.png 1210w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<p>Human behavior of cybersecurity- cybersecurity isn&#8217;t just technical; human behavior and habits play a critical role in security.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Networking-Accessories-scaled-1-1024x683.jpg\" alt=\"\" class=\"wp-image-319\" srcset=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Networking-Accessories-scaled-1-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Networking-Accessories-scaled-1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Networking-Accessories-scaled-1-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Networking-Accessories-scaled-1-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Networking-Accessories-scaled-1-2048x1366.jpg 2048w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Networking-Accessories-scaled-1-960x640.jpg 960w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/Networking-Accessories-scaled-1-450x300.jpg 450w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Network Security <\/strong>&#8211; behind every security system is a network of humans.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/images.jpg\" alt=\"\" class=\"wp-image-320\" style=\"width:739px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/images.jpg 225w, https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/images-150x150.jpg 150w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/figure>\n\n\n\n<p>Cybercrime and criminology- cybercrime follows similar patterns found in criminological theories.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"275\" height=\"183\" src=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/images-1.jpg\" alt=\"\" class=\"wp-image-322\" \/><\/figure>\n\n\n\n<p>Teamwork: effective cybersecurity requires close collaboration with others and a shared understanding of good practices and fundamentals.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"275\" height=\"183\" src=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-content\/uploads\/sites\/39573\/2026\/04\/images-2.jpg\" alt=\"\" class=\"wp-image-324\" \/><\/figure>\n\n\n\n<p>Privacy- as technology advances, finding a balance between privacy and security has become increasingly difficult.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Applying the Science of Human Behavior to Cybersecurity\" width=\"1000\" height=\"750\" src=\"https:\/\/www.youtube.com\/embed\/73F3QxgI4tQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>The following idea connects cybersecurity and social science by showing how human behavior impacts secuity. It discusses issues cyber risk caused by a lack of awareness or poor decision-making. The video showcases how cybersecurity isn&#8217;t just about technology, but also about understanding human behavoir and how it plays a role in cybersecurity.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how cyber technology creates opportunities for criminal&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":31382,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/users\/31382"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":329,"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/pages\/133\/revisions\/329"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}