{"id":302,"date":"2024-08-04T16:25:27","date_gmt":"2024-08-04T16:25:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/?page_id=302"},"modified":"2024-08-04T17:24:20","modified_gmt":"2024-08-04T17:24:20","slug":"cyse-201s-cybersecurity-and-the-social-sciences","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/cybersecurity-fundamentals\/cyse-201s-cybersecurity-and-the-social-sciences\/","title":{"rendered":"CYSE 201S \u2013 Cybersecurity and the Social Sciences"},"content":{"rendered":"\n<p>In this course, I look at how cybersecurity works and does not work from a social science perspective considering the social, political, legal, criminological, and economic view. The context shifts to the need to comprehend the factors surrounding cybersecurity within humans and the social domain of influence. I also review the political and legal measures that are put in place to control the actions of people who contribute to the generation of threats and cybersecurity occurrences. Furthermore, the subject enlightens students on how social scientists from various fields investigate and make sense of cybersecurity. <\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Journals<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document4.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Document4.\"><\/object><a id=\"wp-block-file--media-760d30c9-27d4-495a-a995-cecb3c5a15b9\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document4.pdf\">Document4<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document4.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-760d30c9-27d4-495a-a995-cecb3c5a15b9\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document-11-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Document-11-1.\"><\/object><a id=\"wp-block-file--media-82e4c536-9f01-4fcc-acb2-ed6271821e27\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document-11-1.pdf\">Document-11-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document-11-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-82e4c536-9f01-4fcc-acb2-ed6271821e27\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-13.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal-13.\"><\/object><a id=\"wp-block-file--media-4a92df96-14b0-4b29-bd94-b02cd799db60\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-13.pdf\">Journal-13<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-13.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4a92df96-14b0-4b29-bd94-b02cd799db60\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-12.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal-12.\"><\/object><a id=\"wp-block-file--media-71bfad1a-b645-4078-8a9d-3d79508eff1b\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-12.pdf\">Journal-12<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-12.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-71bfad1a-b645-4078-8a9d-3d79508eff1b\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-11.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal-11.\"><\/object><a id=\"wp-block-file--media-f5ece82c-df72-4afd-97f0-2018205bf202\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-11.pdf\">Journal-11<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-11.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f5ece82c-df72-4afd-97f0-2018205bf202\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-10.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal-10.\"><\/object><a id=\"wp-block-file--media-b1f048ee-ad09-4373-a97b-77fbbc59c4c9\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-10.pdf\">Journal-10<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-10.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b1f048ee-ad09-4373-a97b-77fbbc59c4c9\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-9-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal-9-1.\"><\/object><a id=\"wp-block-file--media-49b4f92c-8244-48ee-aa60-5efb83b2c6a9\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-9-1.pdf\">Journal-9-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-9-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-49b4f92c-8244-48ee-aa60-5efb83b2c6a9\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-8-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal-8-1.\"><\/object><a id=\"wp-block-file--media-14121743-0762-4dfe-a74d-e191913e4891\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-8-1.pdf\">Journal-8-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-8-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-14121743-0762-4dfe-a74d-e191913e4891\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-5.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal-5.\"><\/object><a id=\"wp-block-file--media-454daeed-4f84-4c81-ad9d-af570097245a\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-5.pdf\">Journal-5<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-5.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-454daeed-4f84-4c81-ad9d-af570097245a\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document-4.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Document-4.\"><\/object><a id=\"wp-block-file--media-4ca5d265-3bf4-4c78-af76-d13aeb5c7d57\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document-4.pdf\">Document-4<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document-4.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4ca5d265-3bf4-4c78-af76-d13aeb5c7d57\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal-3.\"><\/object><a id=\"wp-block-file--media-95e0fcc6-6290-4065-b36e-dd48481acaba\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-3.pdf\">Journal-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-95e0fcc6-6290-4065-b36e-dd48481acaba\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal-2.\"><\/object><a id=\"wp-block-file--media-5a8440f9-043a-4b37-930e-b1e863b3f0ac\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-2.pdf\">Journal-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5a8440f9-043a-4b37-930e-b1e863b3f0ac\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal-1-1.\"><\/object><a id=\"wp-block-file--media-03d43c01-30a4-49a3-af2a-d0e9770d7981\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-1-1.pdf\">Journal-1-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Journal-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-03d43c01-30a4-49a3-af2a-d0e9770d7981\">Download<\/a><\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong>Article Review Papers<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Document3.\"><\/object><a id=\"wp-block-file--media-9b8b1508-e76c-4734-bb21-524248e08ab3\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document3.pdf\">Document3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/Document3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9b8b1508-e76c-4734-bb21-524248e08ab3\">Download<\/a><\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong>Annotated Bibliography<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/annotated-Colton20Wilson20Annotated20Bibliography20CYSE201S20SUM24-1.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Colton20Wilson20Annotated20Bibliography20CYSE201S20SUM24-1.docx.\"><\/object><a id=\"wp-block-file--media-d26b4613-2533-48a4-8b3b-6039455f0a89\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/annotated-Colton20Wilson20Annotated20Bibliography20CYSE201S20SUM24-1.docx.pdf\">annotated-Colton20Wilson20Annotated20Bibliography20CYSE201S20SUM24-1.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/annotated-Colton20Wilson20Annotated20Bibliography20CYSE201S20SUM24-1.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d26b4613-2533-48a4-8b3b-6039455f0a89\">Download<\/a><\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong>Career Paper<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/CAREER-PAPER-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CAREER-PAPER-1.\"><\/object><a id=\"wp-block-file--media-fe67a176-b2d6-4bce-bd0b-35435ae7cd51\" href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/CAREER-PAPER-1.pdf\">CAREER-PAPER-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-content\/uploads\/sites\/35877\/2024\/08\/CAREER-PAPER-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-fe67a176-b2d6-4bce-bd0b-35435ae7cd51\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this course, I look at how cybersecurity works and does not work from a social science perspective considering the social, political, legal, criminological, and economic view. The context shifts to the need to comprehend the factors surrounding cybersecurity within humans and the social domain of influence. I also review the political and legal measures&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/cybersecurity-fundamentals\/cyse-201s-cybersecurity-and-the-social-sciences\/\">Read More<\/a><\/div>\n","protected":false},"author":28672,"featured_media":0,"parent":95,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/302"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/users\/28672"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/comments?post=302"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/302\/revisions"}],"predecessor-version":[{"id":329,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/302\/revisions\/329"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/pages\/95"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cw-cybersecurity-portfolio\/wp-json\/wp\/v2\/media?parent=302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}