{"id":93,"date":"2023-02-12T18:39:21","date_gmt":"2023-02-12T18:39:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=93"},"modified":"2025-02-02T16:10:54","modified_gmt":"2025-02-02T16:10:54","slug":"law-ethics","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/enimo\/law-ethics\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">               Cybersecurity and the Social Sciences<\/h1>\n\n\n\n<p>This course explains and teaches Cybersecurity from a psychological, sociological, criminological, political, economical and legal angles<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p><a href=\"https:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1002&amp;context=oa_textbooks\" target=\"_blank\" rel=\"noreferrer noopener\">Social Science Research: Principles, Methods, PracticesLinks to an external site.<\/a><\/p>\n\n\n\n<p><strong>School of Cybersecurity Old Dominion University<\/strong><\/p>\n\n\n\n<p><strong>Assignments Spring 2024<\/strong><\/p>\n\n\n\n<p><strong>Instructor<\/strong>&nbsp;<strong>Email<\/strong><\/p>\n\n\n\n<p>Diwakar Yalpi&nbsp;vyalpi@odu.edu<\/p>\n\n\n\n<p><strong>Course Outline&nbsp;<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Week<\/td><td>Topic<\/td><td>Readings and Assignments<\/td><\/tr><tr><td>1<\/td><td>Introduction to CourseIntroduction to the Social Sciences<\/td><td>Bhattacherjee (2012)&nbsp;<a href=\"https:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1002&amp;context=oa_textbooks\">(ch. 1-2)<\/a>Post to Discussion Board (slide 3 and slide 8)Begin working on individualized ePortfolioJournal entry (page\/slide 28)to be&nbsp;<strong>uploaded in ePortfolio<\/strong><strong>Make an appointment with the ODU ePortfolio team if you do not already have an ePortfolio set up in WordPress or WIX&nbsp;<\/strong><\/td><\/tr><tr><td>2<\/td><td>Principles of Social Sciences and CybersecurityDiversity and Cybersecurity<\/td><td>Mountrouidou et al. (2019).&nbsp;&nbsp;Securing the human: A review of literature on broadening diversity in cybersecurity educationNational Academies Press. (2019).&nbsp;&nbsp;<a href=\"https:\/\/www.nap.edu\/read\/25335\/chapter\/10\">Integrating Social and Behavioral Research to Enhance Security in Cyberspace<\/a>&nbsp;Post to Discussion Board&nbsp;&nbsp;(page\/slide 14)Journal entry #2 (slide 16) \u2013 upload to ePortfolio<\/td><\/tr><tr><td>3<\/td><td>Strategies to Study Cybersecurity through an Interdisciplinary Social Sciences Lens<strong>ePortfolio LINK IS DUE Sunday, 28 Jan before 11:59 pm [End of third week]<\/strong><\/td><td>Bhattacherjee (2012)&nbsp;<a href=\"https:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1002&amp;context=oa_textbooks\">(ch. 3)<\/a>No Discussion BoardJournal #3 (page\/slide&nbsp;12) \u2013 upload to ePortfolio<\/td><\/tr><tr><td>4<\/td><td>Cybersecurity and Human Factors<\/td><td>Bhattacherjee (2012)&nbsp;<a href=\"https:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1002&amp;context=oa_textbooks\">(ch. 4)<\/a>Back &amp; LaPrade (2019).&nbsp;<a href=\"https:\/\/vc.bridgew.edu\/ijcic\/vol2\/iss2\/1\/\">The future of cybercrime prevention strategies: Human factors and a holistic approach to cyber intelligence<\/a>Post to Discussion Board (page\/slide 14)Journal #4 (page\/slide 22) upload to ePortfolio<\/td><\/tr><tr><td>5<\/td><td>Applying Psychological Principles of Cyber Offending, Victimization, and Professionals&nbsp;&nbsp;<strong>Article 1 review is due Sunday, 11 Feb before 11:59 pm [End of 5<\/strong><strong>th<\/strong><strong>&nbsp;Week]<\/strong><\/td><td>Whitty (2018).&nbsp;<a href=\"https:\/\/www.liebertpub.com\/doi\/pdfplus\/10.1089\/cyber.2016.0729\">Do You Love Me? Psychological Characteristics of Romance Scam Victims (liebertpub.com)<\/a>Post to Discussion Board (page\/slide 13)Journal #5 (page\/slide 4) upload to ePortfolio<\/td><\/tr><tr><td>6<\/td><td>Psychology Research, Human Factors, and Cybersecurity<\/td><td>Nobles, (2018).&nbsp;&nbsp;<a href=\"https:\/\/sciendo.com\/pdf\/10.2478\/hjbpa-2018-0024\">Botching Human Factors in Cybersecurity in Business Organizations.<\/a>Post to Discussion Board (page\/slide 15)Journal #6 (page\/slide 22) upload to ePortfolio<\/td><\/tr><tr><td>7<\/td><td>Cybersecurity and the Social Dimensions of Data Science<strong>QUIZ #1 is released \u2013 due by Sunday, 25 Feb before 11:59 pm&nbsp;<\/strong><\/td><td>Wilner, A. (2018).&nbsp;<a href=\"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0020702018782496\">Cybersecurity and its discontents: Artificial intelligence, the Internet of Things, and digital misinformation.<\/a>No post to Discussion Board&nbsp;Journal #7 (page\/slide 20) upload to ePortfolio<\/td><\/tr><tr><td>8<\/td><td>Social dynamics, social structures, and cybersecurity<strong>TEST #1 is released \u2013 Due by Sunday, 3 Mar before 11:59 pm&nbsp;<\/strong><\/td><td>Debb et al. (2020).&nbsp;<a href=\"https:\/\/vc.bridgew.edu\/ijcic\/vol3\/iss1\/4\/\">A reverse digital divide: Comparing information security behavior of Generation Y and Generation Z adults<\/a>Payne, May, &amp; Hadzhidimova (2012).&nbsp;&nbsp;<a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/1478601X.2018.1532420\">America\u2019s most wanted criminals: Comparing cybercriminals and traditional criminals<\/a>No post to Discussion Board&nbsp;Journal #8 (page\/slide 27) upload to ePortfolio<\/td><\/tr><tr><td>9<\/td><td><strong>SPRING BREAK<\/strong><\/td><td><strong>MARCH 4 \u2013 9 \u2013 Happy Spring Break!&nbsp;<\/strong><\/td><\/tr><tr><td>10<\/td><td>Culture, Social Media and Cybersecurity&nbsp;&nbsp;<\/td><td>Jethwani et al. (2017).&nbsp;&nbsp;<a href=\"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0735633116651971\">I can actually be a cyber sleuth: Engaging adolescent girls in cybersecurity<\/a>Post to Discussion Board (page\/slide 20)Journal #9 (page\/slide 38) upload to ePortfolio<\/td><\/tr><tr><td>11<\/td><td>Social Cybersecurity<strong>Article 2 review is due Sunday, 24th&nbsp; Mar before 11:59 pm<\/strong><\/td><td>Beskow &amp; Karley, (2019).&nbsp;<a href=\"http:\/\/www.casos.cs.cmu.edu\/events\/summer_institute\/2020\/si_portal\/pubs\/Beskow-Carley-Social-Cyber.pdf\">Social Cybersecurity.<\/a>Post to Discussion Board (slide 21)Journal #10 (page\/slide 6) upload to ePortfolioJournal #11 (page\/slide 32) upload to ePortfolio<\/td><\/tr><tr><td>12<\/td><td>The Economics of Cybersecurity<\/td><td>Moore, T. (2010).&nbsp;<a href=\"https:\/\/www.nap.edu\/read\/12997\/chapter\/3\">The economics of cybersecurity: Principles and policy options<\/a>Post to Discussion Board (page\/slide 8)Journal #12 (page\/slide 19) upload to ePortfolioJournal #13 (page\/slide 28) upload to ePortfolio<\/td><\/tr><tr><td>13<\/td><td>Conceptualizing cybersecurity as a crime \u2013 Part 1<strong>CAREER paper is due by 11:59 on&nbsp; Sunday, 7 Apr<\/strong><\/td><td>Payne &amp; Hadzhimova (2018).&nbsp;<a href=\"https:\/\/www.ijcjs.com\/pdfs\/Payne&amp;HadzhidimovaVol13Issue2IJCJS.pdf\">Cybersecurity and Criminal Justice Programs in the United States: Exploring the Intersections.<\/a>&nbsp;Payne &amp; Hadzhimova (2020).&nbsp;<a href=\"https:\/\/www.cybercrimejournal.com\/PayneHadzhidimovaVol14Issue1IJCC2020.pdf\">Disciplinary and Interdisciplinary Trends in Cybercrime Research: An Examination<\/a>No post to Discussion BoardJournal #14 (page\/slide 7) upload to ePortfolio<\/td><\/tr><tr><td>14<\/td><td>Conceptualizing cyber behaviors as crime \u2013 Part 2<\/td><td>Payne (2019).&nbsp;&nbsp;<a href=\"https:\/\/ccjls.scholasticahq.com\/article\/6329-white-collar-cybercrime-white-collar-crime-cybercrime-or-both\">White-Collar Cybercrime: White-Collar Crime, Cybercrime, or Both?<\/a>Post to Discussion Board (page\/slide 33)No Journal entry&nbsp;Upload Career paper to Assignment and ePortfolio<\/td><\/tr><tr><td>15<\/td><td>Studying and Addressing Cyber Harm through a Criminological and Political Framework<strong>QUIZ #2 is released \u2013 due by 11:59 pm on Sunday, 21 Apr<\/strong><strong>All artifacts uploaded to Final ePortfolio due by 11:59 pm on Sunday, 21 Apr<\/strong><\/td><td>Finnemore &amp; Hollis, (2018).&nbsp;&nbsp;<a href=\"https:\/\/www.jstor.org\/stable\/pdf\/10.5305\/amerjintelaw.110.3.0425.pdf\">Constructing Norms for Global Cybersecurity<\/a>&nbsp;Post to Discussion Board (page\/slide 19)Journal #15 (page\/slide 28) upload to ePortfolioePortfolio is&nbsp;<strong>graded<\/strong>&nbsp;by instructorAll Article reviews, Journal entries, and Career paper uploaded by end of Week 15 (Sun, April 21, 2024 before 11:59pm)&nbsp;<\/td><\/tr><tr><td>16<\/td><td><strong>Final Exam<\/strong><\/td><td><strong>Watch for Announcements- Final exam released April 24 and closes by 11:59 pm on April 28, 2024<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences This course explains and teaches Cybersecurity from a psychological, sociological, criminological, political, economical and legal angles Course Material Social Science Research: Principles, Methods, PracticesLinks to an external site. School of Cybersecurity Old Dominion University Assignments Spring 2024 Instructor&nbsp;Email Diwakar Yalpi&nbsp;vyalpi@odu.edu Course Outline&nbsp; Week Topic Readings and Assignments 1 Introduction to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/enimo\/law-ethics\/\">Read More<\/a><\/div>\n","protected":false},"author":26278,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/pages\/93"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/users\/26278"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/comments?post=93"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/pages\/93\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/pages\/93\/revisions\/370"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/enimo\/wp-json\/wp\/v2\/media?parent=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}