{"id":315,"date":"2026-02-04T18:15:15","date_gmt":"2026-02-04T18:15:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dorian-jones\/?page_id=315"},"modified":"2026-02-05T15:34:36","modified_gmt":"2026-02-05T15:34:36","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dorian-jones\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p>Cybersecurity is not only a technical field but also a social science issue that focuses on how people interact with technology, systems, and information.  Many cyber threats succeed because they exploit human behavior, trust, and social structures rather than weaknesses in hardware or software.  The images below represent key social science concepts explored in CYSE 201S, including human factors, privacy, and the relationship between society and digital security.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"400\" src=\"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/phish-4.jpg\" alt=\"\" class=\"wp-image-325\" srcset=\"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/phish-4.jpg 612w, https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/phish-4-300x196.jpg 300w, https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/phish-4-459x300.jpg 459w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><figcaption class=\"wp-element-caption\">This image represents how cybersecurity attacks often rely on manipulating human behavior rather than breaking technical defenses.  Social engineering techniques such as phishing exploits trust, urgency, and lack of awareness, highlighting the importance of education and behavioral understanding in cybersecurity. <\/figcaption><\/figure>\n\n\n\n<p>Citation:<\/p>\n\n\n\n<p>Just_Super. (n.d.). <em>49,500+ phishing stock photos, pictures &amp; Royalty-Free images &#8211; iStock<\/em>. https:\/\/www.istockphoto.com\/photos\/phishing<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"408\" src=\"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/Teamwork.jpg\" alt=\"\" class=\"wp-image-326\" srcset=\"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/Teamwork.jpg 612w, https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/Teamwork-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/Teamwork-450x300.jpg 450w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><figcaption class=\"wp-element-caption\">This image emphasizes that cybersecurity is a collective, human-centered effort.  Effective cybersecurity depends on communication, policy development, and awareness among individuals and organizations, reinforcing the connection between cybersecurity and social science.<\/figcaption><\/figure>\n\n\n\n<p>Citation:<\/p>\n\n\n\n<p>Kindamorphic. (n.d.). <em>Kindamorphic<\/em>. https:\/\/www.gettyimages.com\/photos\/cybersecurity-team<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"840\" height=\"350\" src=\"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/digital-privacy.jpg\" alt=\"\" class=\"wp-image-327\" srcset=\"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/digital-privacy.jpg 840w, https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/digital-privacy-300x125.jpg 300w, https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/digital-privacy-768x320.jpg 768w, https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-content\/uploads\/sites\/39665\/2026\/02\/digital-privacy-600x250.jpg 600w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/figure>\n\n\n\n<p>This image reflects the social impact of cybersecurity on privacy and ethical responsibility.  As personal data becomes increasingly digitized, cybersecurity plays a critical role in protecting individual rights and maintaining public trust in organizations and governments.<\/p>\n\n\n\n<p>Citation:<\/p>\n\n\n\n<p>Vecteezy (n.d.). <em>Safeguarding digital assets and personal information with cybersecurity and data protection measures\u2026<\/em> Photo by Sutthiphong Chandaeng.https:\/\/www.vecteezy.com\/photo\/26268054-safeguarding-digital-assets-and-personal-information-with-cybersecurity-and-data-protection-measures-to-ensure-privacy-security-and-trust-online-securing-digital-systems-protecting-data<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is not only a technical field but also a social science issue that focuses on how people interact with technology, systems, and information. Many cyber threats succeed because they exploit human behavior, trust, and social structures rather than weaknesses in hardware or software. The images below represent key social science concepts explored in CYSE&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dorian-jones\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":31440,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-json\/wp\/v2\/pages\/315"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-json\/wp\/v2\/users\/31440"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-json\/wp\/v2\/comments?post=315"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-json\/wp\/v2\/pages\/315\/revisions"}],"predecessor-version":[{"id":328,"href":"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-json\/wp\/v2\/pages\/315\/revisions\/328"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dorian-jones\/wp-json\/wp\/v2\/media?parent=315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}