{"id":417,"date":"2025-01-21T15:57:09","date_gmt":"2025-01-21T15:57:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/?page_id=417"},"modified":"2025-02-03T22:25:21","modified_gmt":"2025-02-03T22:25:21","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Social Science and Cybersecurity <\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/hands_world-1024x536.png\" alt=\"\" class=\"wp-image-528 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/hands_world-1024x536.png 1024w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/hands_world-300x157.png 300w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/hands_world-768x402.png 768w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/hands_world-573x300.png 573w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/hands_world.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Cybersecurity is not just the security of information, it is also the security of people as well. When social science is included into the conversation, people from several areas work together to understand the human aspects of cybercrime. <\/p>\n<\/div><\/div>\n\n\n\n<ul>\n<li>Figure 3: People involved in cybersecurity and social science<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber awareness helps prevent attacks<\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>By spreading cyber hygiene to more than just cyber professionals, more cyber attacks can be prevented. Developing new and simple methods to mitigate and help others learn about cybersecurity is helpful as well.   <\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"596\" src=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/bubble_map-1024x596.jpg\" alt=\"\" class=\"wp-image-527 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/bubble_map-1024x596.jpg 1024w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/bubble_map-300x175.jpg 300w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/bubble_map-768x447.jpg 768w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/bubble_map-515x300.jpg 515w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/bubble_map.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<ul>\n<li>Figure 5: Help mitigations through cyber awareness to people<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Interwoven bonds between Cybersecurity and Social Science<\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"604\" src=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/Interconnected_image-1024x604.jpeg\" alt=\"\" class=\"wp-image-529 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/Interconnected_image-1024x604.jpeg 1024w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/Interconnected_image-300x177.jpeg 300w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/Interconnected_image-768x453.jpeg 768w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/Interconnected_image-509x300.jpeg 509w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/Interconnected_image.jpeg 1204w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Cybersecurity is already an interwoven field, but adding social science to the mix greatly widens it as well. This will help mitigation techniques by considering the human behavior, economy, environment, and changes in the world. <\/p>\n<\/div><\/div>\n\n\n\n<ul>\n<li>Figure 1: Interwoven between cyber and social science<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">One example of cybersecurity and social science<\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>Social Engineering is one aspect of cybersecurity that can be connected and useful with social science. The attacker&#8217;s and victim&#8217;s behaviors are both useful in creating a strategy to help defend against other social engineering attacks. <\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"685\" height=\"298\" src=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/chart_images-1.jpeg\" alt=\"\" class=\"wp-image-531 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/chart_images-1.jpeg 685w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/chart_images-1-300x131.jpeg 300w, https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-content\/uploads\/sites\/37299\/2025\/02\/chart_images-1-600x261.jpeg 600w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/figure><\/div>\n\n\n\n<ul>\n<li>Figure 4: Social engineering, cybersecurity, and social science<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entries<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/journal-entries\/\">Click here to view journal entries <\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Article Reviews<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/article-reviews\/\">Click here to view article reviews<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Career Paper<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-layout-3 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/career-paper\/\">Click here to view the career paper<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Social Science and Cybersecurity Cybersecurity is not just the security of information, it is also the security of people as well. When social science is included into the conversation, people from several areas work together to understand the human aspects of cybercrime. Cyber awareness helps prevent attacks By spreading cyber hygiene to more than just&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":29810,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-json\/wp\/v2\/pages\/417"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-json\/wp\/v2\/users\/29810"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-json\/wp\/v2\/comments?post=417"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-json\/wp\/v2\/pages\/417\/revisions"}],"predecessor-version":[{"id":534,"href":"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-json\/wp\/v2\/pages\/417\/revisions\/534"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/elizabethsimpkinsesimp003\/wp-json\/wp\/v2\/media?parent=417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}