IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,  and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.

Be sure to remove this instructional language when you have completed updating content on this page.

Journal #13

The implementation and development of cyber-related policies and cyberinfrastructure present a unique problem given the often short sighted nature of humanity’s predictive knowledge capabilities. We can not just look at the immediate splash of new technological advancements, instead, we must consider the ripple effects that will come after. Today we have great potential to change…

Posted in CYSE 200T, Uncategorized | Leave a comment

Journal #12

The advances made in cyber technology have been nothing short of revolutionary, though it is not without its dark side. An example of this is the way it impacted the interactions between offenders and victims of cybercrimes. For example, there are the cybercrimes of cyberstalking and cyber harassment. Unfortunately, these are two very serious situations,…

Posted in CYSE 200T, Uncategorized | Leave a comment

Journal #11

Criminal justice is the study of crime, and cybercrime is a specific area of focus within criminal justice. This focus has been given the term cybercriminology. Criminal justice looks for ways to detect and handle criminal acts, how crimes should be punished judicially, and if the crimes can be prevented if possible. Cybercriminology is the…

Posted in CYSE 200T, Uncategorized | Leave a comment

Journal #10

System engineers lie at the very heart of the complex problem of managing large-scale operations. A well put together and maintained system is essential for key industries to operate safely, efficiently, and with reduced errors. Ultimately, a system engineer protects the assets of a network through the “engineering of security functions; addressing the security aspects…

Posted in CYSE 200T, Uncategorized | Leave a comment

Journal #9

Computers have completely changed nearly every facets of our lives. Though with such revolutionary changes comes both positive and negative impacts. In some ways computers have made the world a much safer place, but on the other hand there are ways such technology have made the world less safe. One way that computers have made…

Posted in CYSE 200T, Uncategorized | Leave a comment

Journal #8

Knowing that your computer safe is a multistage process. It involves taking preventive measures, checking that your defenses are in proper order, and being able to recognize and handle any security problems that do arise. There are multitude of ways to keep the security of your daily devices from being compromised. One of the easiest…

Posted in CYSE 200T, Uncategorized | Leave a comment

Journal #7

Every business has a unique cybersecurity situation. For this reason, there truly is no simple one size fits all approach for protecting a business’s assets. Developing a cybersecurity plan in the workplace is a balancing act between budget and situation specific risks. The two factors of cyberattack risk and budgetary constraints are what will determine…

Posted in CYSE 200T, Uncategorized | Leave a comment

Journal #6

In an article from the Journal of Management Information Systems the research team defines cyber-deviance as the “use of IT in the workplace that is contrary to the explicit and implicit norms of the organization, and that threatens the well-being of the organization and/or its members” (Venkatraman et al.). A more boiled down version of…

Posted in CYSE 200T, Uncategorized | Leave a comment

Journal #5

Legal ways to make money in cybersecurity: Code an intrusion detection system software YouTube channel on technology w/ ad revenue & sponsors Build an app for tracking companies that have suffered breaches Engineer computer hardware Ransomware recovery services Start a cybersecurity firm Entry level job in cybersecurity field Create an online cybersecurity course Use cyber…

Posted in CYSE 200T, Uncategorized | Leave a comment

Journal #4

The United States and the Kingdom of Denmark are two very seemingly different nations. The United States has a much larger population, larger land mass, and carry two completely different geopolitical roles. One area in which they do have something in common is that, depending on the source and metrics used, the two are often…

Posted in CYSE 200T, Uncategorized | Leave a comment