{"id":553,"date":"2023-12-30T23:39:02","date_gmt":"2023-12-30T23:39:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/epres010\/?p=553"},"modified":"2025-04-17T21:55:48","modified_gmt":"2025-04-17T21:55:48","slug":"cyse-201s-cybersecurity-cultures","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/epres010\/2023\/12\/30\/cyse-201s-cybersecurity-cultures\/","title":{"rendered":"CYSE 201S &#8211;  Cybersecurity Cultures"},"content":{"rendered":"\n<p><strong>Watch<a href=\"https:\/\/www.youtube.com\/watch?app=desktop&amp;v=7TpsYofbAPA\" target=\"_blank\" rel=\"noreferrer noopener\"> this video<\/a> about a 12-year-old cyber security expert.\u00a0 Pay attention to how he has embedded himself into the cybersecurity culture.\u00a0 Also, pay attention to how the ideas of knowledge, technology, and secrecy relate to his expertise.\u00a0Talk about how the video relates to something you read for this class \u2013 either from the readings or this module.<\/strong><\/p>\n\n\n\n<p>This video relates to the module via the hacker and professional subcultures of cybersecurity and how culture can create cybersecurity behavior. With Reuben, he has parents that are a part of the tech industry, and they influenced him to be interested in cybersecurity. Furthermore, being a digital native makes him more informed about technology and cybersecurity. This knowledge shows how he\u2019s part of the hacker subculture when he was able to hack and get into a profile using public Wi-Fi and when he said that he would never use public Wi-Fi unless he were entirely sure it was safe, showing skepticism. These behaviors in the video show how the subcultures of cybersecurity play a part in people&#8217;s interest in the topic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Watch this video about a 12-year-old cyber security expert.\u00a0 Pay attention to how he has embedded himself into the cybersecurity culture.\u00a0 Also, pay attention to how the ideas of knowledge, technology, and secrecy relate to his expertise.\u00a0Talk about how the video relates to something you read for this class \u2013 either from the readings or &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/epres010\/2023\/12\/30\/cyse-201s-cybersecurity-cultures\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 201S &#8211;  Cybersecurity Cultures<\/span><\/a><\/p>\n","protected":false},"author":24915,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/553"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/users\/24915"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/comments?post=553"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/553\/revisions"}],"predecessor-version":[{"id":656,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/553\/revisions\/656"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/media?parent=553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/categories?post=553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/tags?post=553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}