{"id":133,"date":"2024-01-08T16:42:21","date_gmt":"2024-01-08T16:42:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-08-30T15:16:11","modified_gmt":"2024-08-30T15:16:11","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n<h1>Course Material<\/h1>\n<p>Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,\u00a0 and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.<\/p>\n<p class=\"p1\">Be sure to remove this instructional language when you have completed updating content on this page.<\/p>\n\n\n<p><span style=\"font-family: Consolas, Monaco, monospace;font-size: 13px\">\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/04\/17\/journal-13\/\">Journal #13<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>The implementation and development of cyber-related policies and cyberinfrastructure present a unique problem given the often short sighted nature of humanity&#8217;s predictive knowledge capabilities. We can not just look at the immediate splash of new technological advancements, instead, we must consider the ripple effects that will come after. Today we have great potential to change&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/04\/17\/journal-13\/\">Read More<\/a><\/div>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/200t\/\" rel=\"category tag\">CYSE 200T<\/a>, <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/04\/17\/journal-13\/#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/04\/12\/journal-12\/\">Journal #12<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>The advances made in cyber technology have been nothing short of revolutionary, though it is not without its dark side. An example of this is the way it impacted the interactions between offenders and victims of cybercrimes. For example, there are the cybercrimes of cyberstalking and cyber harassment. Unfortunately, these are two very serious situations,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/04\/12\/journal-12\/\">Read More<\/a><\/div>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/200t\/\" rel=\"category tag\">CYSE 200T<\/a>, <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/04\/12\/journal-12\/#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/04\/05\/journal-11\/\">Journal #11<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>Criminal justice is the study of crime, and cybercrime is a specific area of focus within criminal justice. This focus has been given the term cybercriminology. Criminal justice looks for ways to detect and handle criminal acts, how crimes should be punished judicially, and if the crimes can be prevented if possible. Cybercriminology is the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/04\/05\/journal-11\/\">Read More<\/a><\/div>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/200t\/\" rel=\"category tag\">CYSE 200T<\/a>, <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/04\/05\/journal-11\/#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/29\/journal-10\/\">Journal #10<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>System engineers lie at the very heart of the complex problem of managing large-scale operations. A well put together and maintained system is essential for key industries to operate safely, efficiently, and with reduced errors. Ultimately, a system engineer protects the assets of a network through the &#8220;engineering of security functions; addressing the security aspects&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/29\/journal-10\/\">Read More<\/a><\/div>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/200t\/\" rel=\"category tag\">CYSE 200T<\/a>, <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/29\/journal-10\/#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/22\/journal-9\/\">Journal #9<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>Computers have completely changed nearly every facets of our lives. Though with such revolutionary changes comes both positive and negative impacts. In some ways computers have made the world a much safer place, but on the other hand there are ways such technology have made the world less safe. One way that computers have made&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/22\/journal-9\/\">Read More<\/a><\/div>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/200t\/\" rel=\"category tag\">CYSE 200T<\/a>, <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/22\/journal-9\/#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/14\/journal-8\/\">Journal #8<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>Knowing that your computer safe is a multistage process. It involves taking preventive measures, checking that your defenses are in proper order, and being able to recognize and handle any security problems that do arise. There are multitude of ways to keep the security of your daily devices from being compromised. One of the easiest&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/14\/journal-8\/\">Read More<\/a><\/div>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/200t\/\" rel=\"category tag\">CYSE 200T<\/a>, <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/14\/journal-8\/#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/02\/journal-7\/\">Journal #7<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>Every business has a unique cybersecurity situation. For this reason, there truly is no simple one size fits all approach for protecting a business&#8217;s assets. Developing a cybersecurity plan in the workplace is a balancing act between budget and situation specific risks. The two factors of cyberattack risk and budgetary constraints are what will determine&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/02\/journal-7\/\">Read More<\/a><\/div>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/200t\/\" rel=\"category tag\">CYSE 200T<\/a>, <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/03\/02\/journal-7\/#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/02\/16\/journal-6\/\">Journal #6<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>In an article from the Journal of Management Information Systems the research team defines cyber-deviance as the &#8220;use of IT in the workplace that is contrary to the explicit and implicit norms of the organization, and that threatens the well-being of the organization and\/or its members&#8221; (Venkatraman et al.). A more boiled down version of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/02\/16\/journal-6\/\">Read More<\/a><\/div>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/200t\/\" rel=\"category tag\">CYSE 200T<\/a>, <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/02\/16\/journal-6\/#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/02\/05\/journal-5\/\">Journal #5<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>Legal ways to make money in cybersecurity: Code an intrusion detection system software YouTube channel on technology w\/ ad revenue &amp; sponsors Build an app for tracking companies that have suffered breaches Engineer computer hardware Ransomware recovery services Start a cybersecurity firm Entry level job in cybersecurity field Create an online cybersecurity course Use cyber&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/02\/05\/journal-5\/\">Read More<\/a><\/div>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/200t\/\" rel=\"category tag\">CYSE 200T<\/a>, <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/02\/05\/journal-5\/#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/02\/02\/journal-4\/\">Journal #4<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>The United States and the Kingdom of Denmark are two very seemingly different nations. The United States has a much larger population, larger land mass, and carry two completely different geopolitical roles. One area in which they do have something in common is that, depending on the source and metrics used, the two are often&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/02\/02\/journal-4\/\">Read More<\/a><\/div>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/200t\/\" rel=\"category tag\">CYSE 200T<\/a>, <a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/02\/02\/journal-4\/#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how cyber technology creates opportunities for criminal&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/2024\/02\/02\/journal-4\/\">Read More<\/a><\/div>\n","protected":false},"author":28201,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/users\/28201"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/pages\/133\/revisions\/370"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/evan-ejenk015\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}