{"id":299,"date":"2026-02-03T14:43:28","date_gmt":"2026-02-03T14:43:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/coltoncorman1\/?page_id=299"},"modified":"2026-02-03T14:57:26","modified_gmt":"2026-02-03T14:57:26","slug":"cyse201s-cybersecurity-as-a-social-science","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/coltoncorman1\/cyse201s-cybersecurity-as-a-social-science\/","title":{"rendered":"CYSE201S Cybersecurity as a Social Science"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/truth-concept-arrangement-with-magnifier-683x1024.jpg\" alt=\"\" class=\"wp-image-303\" style=\"width:190px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/truth-concept-arrangement-with-magnifier-683x1024.jpg 683w, https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/truth-concept-arrangement-with-magnifier-200x300.jpg 200w, https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/truth-concept-arrangement-with-magnifier-768x1152.jpg 768w, https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/truth-concept-arrangement-with-magnifier-1024x1536.jpg 1024w, https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/truth-concept-arrangement-with-magnifier-1365x2048.jpg 1365w, https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/truth-concept-arrangement-with-magnifier-scaled.jpg 1706w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<p><em>Truth<\/em>. (n.d.). Freepik. https:\/\/www.freepik.com\/free-photo\/truth-concept-arrangement-with-magnifier_16691256.htm#fromView=keyword&amp;page=1&amp;position=10&amp;uuid=6325ee9e-e106-4a4f-9e86-1129f5b226e7&amp;query=Cyber+ethics<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"537\" height=\"542\" src=\"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/Screenshot-2026-02-03-095416.png\" alt=\"\" class=\"wp-image-305\" style=\"width:340px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/Screenshot-2026-02-03-095416.png 537w, https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/Screenshot-2026-02-03-095416-297x300.png 297w, https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/Screenshot-2026-02-03-095416-150x150.png 150w\" sizes=\"(max-width: 537px) 100vw, 537px\" \/><\/figure>\n\n\n\n<p><em>Server Rack Security Shield<\/em>. (n.d.). Freepik. https:\/\/www.freepik.com\/free-vector\/server-rack-security-shield-realistic-illustration_3907759.htm#fromView=search&amp;page=1&amp;position=1&amp;uuid=ff98d592-79ed-48b1-8688-ac684cb634bb&amp;query=secure+server<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"532\" height=\"541\" src=\"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/image-1.png\" alt=\"\" class=\"wp-image-307\" style=\"width:322px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/image-1.png 532w, https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-content\/uploads\/sites\/40504\/2026\/02\/image-1-295x300.png 295w\" sizes=\"(max-width: 532px) 100vw, 532px\" \/><\/figure>\n\n\n\n<p><em>Internet security background<\/em>. (n.d.). Freepik. http:\/\/freepik.com\/free-vector\/internet-security-background_1170142.htm#fromView=search&amp;page=1&amp;position=7&amp;uuid=b3090daa-7602-42a9-9e08-15c88b7aae1c&amp;query=social+science+of+cybersecurity <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Truth. (n.d.). Freepik. https:\/\/www.freepik.com\/free-photo\/truth-concept-arrangement-with-magnifier_16691256.htm#fromView=keyword&amp;page=1&amp;position=10&amp;uuid=6325ee9e-e106-4a4f-9e86-1129f5b226e7&amp;query=Cyber+ethics Server Rack Security Shield. (n.d.). Freepik. https:\/\/www.freepik.com\/free-vector\/server-rack-security-shield-realistic-illustration_3907759.htm#fromView=search&amp;page=1&amp;position=1&amp;uuid=ff98d592-79ed-48b1-8688-ac684cb634bb&amp;query=secure+server Internet security background. (n.d.). Freepik. http:\/\/freepik.com\/free-vector\/internet-security-background_1170142.htm#fromView=search&amp;page=1&amp;position=7&amp;uuid=b3090daa-7602-42a9-9e08-15c88b7aae1c&amp;query=social+science+of+cybersecurity<\/p>\n","protected":false},"author":31949,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-json\/wp\/v2\/pages\/299"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-json\/wp\/v2\/users\/31949"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-json\/wp\/v2\/pages\/299\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-json\/wp\/v2\/pages\/299\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/coltoncorman1\/wp-json\/wp\/v2\/media?parent=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}