CYSE 201S: Cybersecurity and the Social Sciences

Cybersecurity and the Social Sciences

This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework. Students are introduced to a human-factors approach to understanding cybersecurity threats. Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the behaviors of those who create risks and cybersecurity incidents. The class also explores how cybersecurity is studied by social scientists in various social science disciplines.

Law and Regulation

As technology evolves, so does the laws and policies surrounding it

Legal frameworks are constantly adopting to the emerging issues that arise with the digital world, in particular with data security, privacy concerns, and cybercrime

Research

Social science research plays a critical role in understanding human behaviors that influence cybersecurity

Social Engineering

Social engineering has become a popular method for cyberattacks, in particular phishing scams, that exploits human trust to deceive them into giving away sensitive information

It has become prominent due to relying mainly on human behavior rather than exploiting a technical vulnerability to bring harm to an individual or an organization

Cybercrime

With the rise of the Internet, cybercrime has emerged as a significant threat and increases the need for cybersecurity

Ethics and Privacy

As technology is more integrated into our lives, our data is increasingly collected and shared across platforms, which raises ethical and privacy concerns

Image Sources:
https://www.istockphoto.com/photo/email-phishing-ransomware-malware-hacker-attack-gm1606690171-530607803?utm_campaign=srp_photos_limitedresults&utm_content=https%3A%2F%2Fwww.pexels.com%2Fsearch%2Fphishing%2F&utm_medium=affiliate&utm_source=pexels&utm_term=phishing
https://depositphotos.com/photos/cyber-law.html
https://www.pexels.com/photo/close-up-photo-of-survey-spreadsheet-590022/
https://www.pexels.com/photo/three-people-hacking-a-computer-system-5380643/
https://depositphotos.com/photos/data-privacy.html