{"id":394,"date":"2023-09-14T05:28:27","date_gmt":"2023-09-14T05:28:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/css003\/?page_id=394"},"modified":"2023-12-07T03:55:25","modified_gmt":"2023-12-07T03:55:25","slug":"cyse-201","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/css003\/cyse-201\/","title":{"rendered":"CYSE 201 : Cybersecurity and the Social Sciences"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Course Description:<\/h2>\n\n\n\n<p>This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework. Students are introduced to a human-factors approach to understanding cybersecurity threats. Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the behaviors of those who create risks and cybersecurity incidents. The class also explores how cybersecurity is studied by social scientists in various social science disciplines.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Examples of coursework<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Journal entry: Explain how the principles of science relate to cybersecurity.<\/h3>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/cyse201-journal-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of cyse201-journal-2.\"><\/object><a id=\"wp-block-file--media-4f854cbe-9b32-4f28-bb93-18fc0661a654\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/cyse201-journal-2.pdf\">cyse201-journal-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/cyse201-journal-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4f854cbe-9b32-4f28-bb93-18fc0661a654\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Journal: Visit&nbsp;PrivacyRights.org to&nbsp;see the types of publicly available information&nbsp;about data breaches. How might researchers use this information to&nbsp;study breaches? Enter a paragraph in your journal.<\/h3>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/journal3-cyse201-pdf.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of journal3-cyse201-pdf.\"><\/object><a id=\"wp-block-file--media-eddee519-c542-402a-928d-7b0a64acd8cc\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/journal3-cyse201-pdf.pdf\">journal3-cyse201-pdf<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/journal3-cyse201-pdf.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-eddee519-c542-402a-928d-7b0a64acd8cc\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Journal: Review the NICE Workforce Framework. Are there certain areas that you&nbsp;would want to focus your career on? Explain which areas would appeal&nbsp;the most to you and which would appeal the least.<\/h3>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-69e1ac3f-1551-4b9d-9355-7037092c6bb5\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/journal-1-cyse201-1.docx\">journal-1-cyse201-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/journal-1-cyse201-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-69e1ac3f-1551-4b9d-9355-7037092c6bb5\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Journal: Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.<\/h3>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/journal4-cyse201.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of journal4-cyse201.\"><\/object><a id=\"wp-block-file--media-f4b65111-35cc-4f9c-9601-433fb3021e70\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/journal4-cyse201.pdf\">journal4-cyse201<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/09\/journal4-cyse201.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f4b65111-35cc-4f9c-9601-433fb3021e70\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Journal: Review the articles linked with each individual motive in the presentation page or Slide #3.&nbsp; Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).&nbsp; Explain why you rank each motive the way you rank it.<\/h3>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/10\/Journal5-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal5-.\"><\/object><a id=\"wp-block-file--media-f4853213-6f36-4e3d-9e61-a51c0e8857cd\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/10\/Journal5-.pdf\">Journal5-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/10\/Journal5-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f4853213-6f36-4e3d-9e61-a51c0e8857cd\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Journal 6<\/h2>\n\n\n\n<p>Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?<\/p>\n\n\n\n<p>Upload this journal entry into your ePortfolio.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal207.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-journal207.docx.\"><\/object><a id=\"wp-block-file--media-cd33f848-d07a-494c-8bce-eb32dd825a8c\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal207.docx.pdf\">annotated-journal207.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal207.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cd33f848-d07a-494c-8bce-eb32dd825a8c\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Journal 8<\/h2>\n\n\n\n<p>Watch this video and pay attention to the way that movies distort hackers.<a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk\" target=\"_blank\" rel=\"noreferrer noopener\">Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? &#8211; YouTubeLinks to an external site.<\/a><a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=6BqpU4V0Ypk\"><\/a><\/p>\n\n\n\n<ul>\n<li>After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal208.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-journal208.docx.\"><\/object><a id=\"wp-block-file--media-4cabfb90-18d9-416a-a441-d4e8afab69fc\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal208.docx.pdf\">annotated-journal208.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal208.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4cabfb90-18d9-416a-a441-d4e8afab69fc\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Journal 9<\/h2>\n\n\n\n<p>Watch this Video:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=Zbqo7MGVElw\" target=\"_blank\" rel=\"noreferrer noopener\">Social media and cybersecurityLinks to an external site.<\/a><a href=\"https:\/\/www.youtube.com\/watch?v=Zbqo7MGVElw\"><\/a><\/p>\n\n\n\n<p>Complete the&nbsp;<a href=\"https:\/\/www.brieftherapyconference.com\/download\/handouts\/Tobi-Goldfus-Social-Media-Disorder-Scale.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Social Media Disorder scaleLinks to an external site.<\/a>.&nbsp; How did you score?&nbsp; What do you think about the items in the scale?&nbsp; Why do you think that different patterns are found across the world?<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal209.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-journal209.docx.\"><\/object><a id=\"wp-block-file--media-6ba22e4b-aeef-4a1b-9e1c-3cf1808ed352\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal209.docx.pdf\">annotated-journal209.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal209.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6ba22e4b-aeef-4a1b-9e1c-3cf1808ed352\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Journal 11<\/h2>\n\n\n\n<p>Watch this&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\" target=\"_blank\" rel=\"noreferrer noopener\">videoLinks to an external site.<\/a>.&nbsp; As you watch the video<a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0Links to an external site.<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0\"><img decoding=\"async\" src=\"https:\/\/canvas.odu.edu\/images\/play_overlay.png\" alt=\"\" \/><\/a><\/figure>\n\n\n\n<p>, think about how the description of the cybersecurity analyst job relates to social behaviors.\u00a0 Write a paragraph describing social themes that arise in the presentation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">entry:<\/h3>\n\n\n\n<p>A cybersecurity analyst must be a skilled communicator.\u00a0 One of the most important aspects of the job is their responsibility to report security threats back to their company.\u00a0 They also often work in teams so it becomes even more important that they can work well in a social environment.\u00a0 It is also important that a cybersecurity analyst is extremely alert, as their job is to closely monitor possible threats against the network.\u00a0 It&#8217;s also important that a cybersecurity analyst is efficient and can follow directions, so that they can take proper security protocols into account and follow procedure in the event of a cyber attack.\u00a0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journal 12<\/h2>\n\n\n\n<p>Read this\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\" target=\"_blank\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdfLinks to an external site.<\/a>\u00a0sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal209.docx-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-journal209.docx-1.\"><\/object><a id=\"wp-block-file--media-d96a451e-8964-48d1-b426-2e981683f96c\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal209.docx-1.pdf\">annotated-journal209.docx-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal209.docx-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d96a451e-8964-48d1-b426-2e981683f96c\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Journal 13<\/h2>\n\n\n\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\" target=\"_blank\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.<\/a>\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal12.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-journal12.docx.\"><\/object><a id=\"wp-block-file--media-4bbbb9ad-f04d-4f5f-877b-5b77e9bfc449\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal12.docx.pdf\">annotated-journal12.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-journal12.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4bbbb9ad-f04d-4f5f-877b-5b77e9bfc449\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Journal 14<\/h2>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\" target=\"_blank\">Andriy\u00a0Links to an external site.SlynchukLinks to an external site.\u00a0Links to an external site.<\/a>has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-Journal14.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Journal14.docx.\"><\/object><a id=\"wp-block-file--media-8b2d1c02-94ba-47fc-b9a7-c86df0949b8f\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-Journal14.docx.pdf\">annotated-Journal14.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-Journal14.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8b2d1c02-94ba-47fc-b9a7-c86df0949b8f\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Journal 15<\/h2>\n\n\n\n<ul>\n<li>Digital Forensics | Davin Teo | TEDxHongKongSalon<a href=\"https:\/\/www.youtube.com\/watch?v=Pf-JnQfAEew\" target=\"_blank\" rel=\"noreferrer noopener\">\u2013 YouTubeLinks to an external site.<\/a><a href=\"https:\/\/www.youtube.com\/watch?v=Pf-JnQfAEew\"><\/a>Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to his career.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-Journal15.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Journal15.docx.\"><\/object><a id=\"wp-block-file--media-7423ee7f-d4a5-4724-865d-291a098629ba\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-Journal15.docx.pdf\">annotated-Journal15.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-Journal15.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7423ee7f-d4a5-4724-865d-291a098629ba\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Article Review #1<\/h2>\n\n\n\n<p>The article review should focus on (1) how the topic relates to the principles of the social sciences; (2) the study&#8217;s research questions or hypotheses; (3) the types of research methods used; (4) the types of data and analysis done; (5) how concepts from the PowerPoint presentations relate to the article; (6) how the topic relates to the challenges, concerns and contributions of marginalized groups; and (7) the overall contributions of the studies to society.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cybercrimejournal.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.cybercrimejournal.com\/Links to an external site.<\/a>&nbsp; &nbsp;<a href=\"https:\/\/vc.bridgew.edu\/ijcic\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/vc.bridgew.edu\/ijcic\/Links to an external site.<\/a>&nbsp;&nbsp;&nbsp;&nbsp;<a href=\"https:\/\/academic.oup.com\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurity<\/a><\/p>\n\n\n\n<p>Please note the rubric that I will follow to grade your Article 1 Review is in the syllabus.&nbsp; &nbsp;<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-article20review201.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-article20review201.docx.\"><\/object><a id=\"wp-block-file--media-cce49858-52cb-44ef-9563-5e29df2a9389\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-article20review201.docx.pdf\">annotated-article20review201.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-article20review201.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cce49858-52cb-44ef-9563-5e29df2a9389\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Article review #2<\/h2>\n\n\n\n<p>We have completed Article Review #1 and now it&#8217;s the time for the Article Review #2. You have to select a different article from different Journal ensuring it is not the same as the one chosen for Article Review #1 and proceed with your review. Assignment will not be graded if the same article or Journal is chosen.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">The article review should focus on<\/h1>\n\n\n\n<ul>\n<li>Describe how the topic relates to the principles of the social sciences;<\/li>\n\n\n\n<li>Describe the study&#8217;s research questions or hypotheses;<\/li>\n\n\n\n<li>Describe the types of research methods used;<\/li>\n\n\n\n<li>Describe the types of data and analysis done;<\/li>\n\n\n\n<li>Describe how concepts from the PowerPoint presentations relate to the article;<\/li>\n\n\n\n<li>Describe how the topic relates to the challenges, concerns and contributions of marginalized groups; and<\/li>\n\n\n\n<li>Describe the overall contributions of the studies to society.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Journals:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cybercrimejournal.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.cybercrimejournal.com\/Links to an external site.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/vc.bridgew.edu\/ijcic\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/vc.bridgew.edu\/ijcic\/Links to an external site.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/academic.oup.com\/cybersecurity\">https:\/\/academic.oup.com\/cybersecurity<\/a><\/p>\n\n\n\n<p>Please note the rubric that I will follow to grade your Article Review is in the syllabus.&nbsp; &nbsp;<\/p>\n\n\n\n<p>Guidelines or Requirements:<\/p>\n\n\n\n<ol>\n<li>Your name and date must appear at the top of the page<\/li>\n\n\n\n<li>The article review must have a clear and meaningful title ( Article review #2 and Title)<\/li>\n\n\n\n<li>The article review must contain headings that guide the reader through your writing.<\/li>\n\n\n\n<li>The article review must contain a clearly labeled conclusion<\/li>\n\n\n\n<li>The article review must have references and corresponding in-text citations as needed &#8211; APA format preferred.<\/li>\n<\/ol>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-article20review20232.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-article20review20232.docx.\"><\/object><a id=\"wp-block-file--media-09e5eb41-9b2c-4418-88c2-c592df17c0a8\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-article20review20232.docx.pdf\">annotated-article20review20232.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-article20review20232.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-09e5eb41-9b2c-4418-88c2-c592df17c0a8\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Career Paper <\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-The20role20of20a20cybersecurity20consultant20in20relation20to20the20social20sciences.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-The20role20of20a20cybersecurity20consultant20in20relation20to20the20social20sciences.\"><\/object><a id=\"wp-block-file--media-db96e81c-3ef9-455a-b387-98b7c8b9eb04\" href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-The20role20of20a20cybersecurity20consultant20in20relation20to20the20social20sciences.pdf\">annotated-The20role20of20a20cybersecurity20consultant20in20relation20to20the20social20sciences<\/a><a href=\"https:\/\/sites.wp.odu.edu\/css003\/wp-content\/uploads\/sites\/30580\/2023\/12\/annotated-The20role20of20a20cybersecurity20consultant20in20relation20to20the20social20sciences.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-db96e81c-3ef9-455a-b387-98b7c8b9eb04\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Course Description: This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework. Students are introduced to a human-factors approach to understanding cybersecurity threats. Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/css003\/cyse-201\/\">Read More<\/a><\/div>\n","protected":false},"author":24918,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/css003\/wp-json\/wp\/v2\/pages\/394"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/css003\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/css003\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/css003\/wp-json\/wp\/v2\/users\/24918"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/css003\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/css003\/wp-json\/wp\/v2\/pages\/394\/revisions"}],"predecessor-version":[{"id":430,"href":"https:\/\/sites.wp.odu.edu\/css003\/wp-json\/wp\/v2\/pages\/394\/revisions\/430"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/css003\/wp-json\/wp\/v2\/media?parent=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}