{"id":231,"date":"2024-02-12T19:45:01","date_gmt":"2024-02-12T19:45:01","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=231"},"modified":"2025-04-25T14:15:30","modified_gmt":"2025-04-25T14:15:30","slug":"ece-416","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dtayl079\/ece-416\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h3 class=\"wp-block-heading has-text-align-center\">CYBERSECURITY &amp; SOCIAL SCIENCE<\/h3>\n\n\n\n<p class=\"has-text-align-center\"><strong>Where Technology Meets Human Behavior<\/strong><\/p>\n\n\n\n<p>Cybersecurity isn&#8217;t just about code and infrastructure. It&#8217;s also about people. Our work at the intersection of cybersecurity and social science focuses on how human behavior, decision-making, culture, and social systems influence digital security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Why It Matters<\/h3>\n\n\n\n<p>Many security challenges originate not from technical flaws but from the ways people interact with technology. Understanding how individuals and communities think about risk, trust, and responsibility is essential to building secure and sustainable systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">What We Explore<\/h3>\n\n\n\n<ul>\n<li><strong>Human-Centered Security:<\/strong> Exploring how users engage with security tools and systems<\/li>\n\n\n\n<li><strong>Behavioral Insights:<\/strong> Investigating what shapes digital habits and choices<\/li>\n\n\n\n<li><strong>Trust &amp; Influence:<\/strong> Understanding how people build confidence in digital spaces<\/li>\n\n\n\n<li><strong>Policy &amp; Ethics:<\/strong> Examining the role of governance, ethics, and social values in shaping cybersecurity outcomes<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Bridging the Gap<\/h3>\n\n\n\n<p>Our approach brings together insights from psychology, sociology, political science, and computer science to address cybersecurity challenges from both technical and human angles. It&#8217;s not just about protecting systems. It&#8217;s about supporting the people who use them.<\/p>\n\n\n\n<p><\/p>\n\n\n<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-content\/uploads\/sites\/35860\/2025\/04\/R-1024x640-1.jpg\" alt=\"\" class=\"wp-image-324\" srcset=\"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-content\/uploads\/sites\/35860\/2025\/04\/R-1024x640-1.jpg 1024w, https:\/\/sites.wp.odu.edu\/dtayl079\/wp-content\/uploads\/sites\/35860\/2025\/04\/R-1024x640-1-300x188.jpg 300w, https:\/\/sites.wp.odu.edu\/dtayl079\/wp-content\/uploads\/sites\/35860\/2025\/04\/R-1024x640-1-768x480.jpg 768w, https:\/\/sites.wp.odu.edu\/dtayl079\/wp-content\/uploads\/sites\/35860\/2025\/04\/R-1024x640-1-480x300.jpg 480w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>CYBERSECURITY &amp; SOCIAL SCIENCE Where Technology Meets Human Behavior Cybersecurity isn&#8217;t just about code and infrastructure. It&#8217;s also about people. Our work at the intersection of cybersecurity and social science focuses on how human behavior, decision-making, culture, and social systems influence digital security. Why It Matters Many security challenges originate not from technical flaws but&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dtayl079\/ece-416\/\">Read More<\/a><\/div>\n","protected":false},"author":28663,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/231"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/users\/28663"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/231\/revisions"}],"predecessor-version":[{"id":328,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/231\/revisions\/328"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/media?parent=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}