{"id":319,"date":"2026-02-10T23:45:10","date_gmt":"2026-02-10T23:45:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/?page_id=319"},"modified":"2026-02-11T00:39:38","modified_gmt":"2026-02-11T00:39:38","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p>Cybersecurity is often viewed as a highly technical discipline; however, it is also deeply rooted in the social sciences. The effectiveness of cybersecurity practices depends not only on technology, but on human behavior, ethical decision-making, public policy, and legal frameworks that shape how digital systems are used and protected. Social factors such as privacy expectations, trust in technology, and societal responses to cyber threats play a critical role in cybersecurity outcomes. Understanding these social dimensions is essential to developing responsible, effective cybersecurity strategies that address both technical vulnerabilities and the human elements of the digital world. <\/p>\n\n\n\n<p>The following images further illustrate my perspective on cybersecurity as a social science by highlighting the importance of human behavior, policy, ethics, and societal influence in shaping secure digital environments.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><a href=\"https:\/\/cyberpro.global\/enrol\/index.php?id=11\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/Home-Cyberpro.jpg\" alt=\"\" class=\"wp-image-330\" style=\"width:436px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/Home-Cyberpro.jpg 1000w, https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/Home-Cyberpro-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/Home-Cyberpro-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/Home-Cyberpro-960x640.jpg 960w, https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/Home-Cyberpro-450x300.jpg 450w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Cyberpro Global. (2024). Cyberpro. Cyberpro.global; Cyberpro Global. https:\/\/cyberpro.global\/enrol\/index.php?id=11<\/em><\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><a href=\"https:\/\/www.energy.gov\/nnsa\/articles\/building-culture-cybersecurity-work\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/cyber_aware_culture_of_cybersecurity-01.png\" alt=\"\" class=\"wp-image-331\" style=\"width:428px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/cyber_aware_culture_of_cybersecurity-01.png 1024w, https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/cyber_aware_culture_of_cybersecurity-01-300x150.png 300w, https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/cyber_aware_culture_of_cybersecurity-01-768x384.png 768w, https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/cyber_aware_culture_of_cybersecurity-01-600x300.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Building a culture of cybersecurity at work. (2025). Energy.gov. https:\/\/www.energy.gov\/nnsa\/articles\/building-culture-cybersecurity-work<\/em><\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><a href=\"https:\/\/cybernoz.com\/ncscs-6-principles-to-build-strong-cybersecurity-culture\/\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"720\" src=\"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/ncsc-the-cyber-security-culture-iceberg-diagram.png\" alt=\"\" class=\"wp-image-332\" style=\"width:539px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/ncsc-the-cyber-security-culture-iceberg-diagram.png 960w, https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/ncsc-the-cyber-security-culture-iceberg-diagram-300x225.png 300w, https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/ncsc-the-cyber-security-culture-iceberg-diagram-768x576.png 768w, https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-content\/uploads\/sites\/38047\/2026\/02\/ncsc-the-cyber-security-culture-iceberg-diagram-400x300.png 400w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Cybernoz. (2025, June 6). NCSC\u2019s 6 Principles To Build Strong Cybersecurity Culture &#8211; Cybernoz &#8211; Cybersecurity News. Cybernoz &#8211; Cybersecurity News &#8211; Cybersecurity News. https:\/\/cybernoz.com\/ncscs-6-principles-to-build-strong-cybersecurity-culture\/<\/em><\/figcaption><\/figure><\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is often viewed as a highly technical discipline; however, it is also deeply rooted in the social sciences. The effectiveness of cybersecurity practices depends not only on technology, but on human behavior, ethical decision-making, public policy, and legal frameworks that shape how digital systems are used and protected. Social factors such as privacy expectations,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":30313,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-json\/wp\/v2\/pages\/319"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-json\/wp\/v2\/users\/30313"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-json\/wp\/v2\/comments?post=319"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-json\/wp\/v2\/pages\/319\/revisions"}],"predecessor-version":[{"id":333,"href":"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-json\/wp\/v2\/pages\/319\/revisions\/333"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-mbrow182\/wp-json\/wp\/v2\/media?parent=319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}