{"id":141,"date":"2025-09-04T22:46:17","date_gmt":"2025-09-04T22:46:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-12-06T03:44:52","modified_gmt":"2025-12-06T03:44:52","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity and the Social Sciences<\/h1>\n<p>Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-disciplinary, and some aspects of the topic are best understood through a social science lens.\u00a0 This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework.\u00a0 Students are introduced to a human-factors approach to understanding cybersecurity threats.\u00a0 Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the behaviors of those who create risks in cybersecurity incidents.\u00a0 The class also explores how cybersecurity is studied by social scientists in psychology, political science, criminology, economics, sociology, international studies, and other social science disciplines.<\/p>\n<p>The course objectives are:<\/p>\n<ul>\n<li>Compare how basic psychological, sociological, criminological, political, economic, and legal theories and models explain cybersecurity<\/li>\n<li>Identify the strengths and weaknesses of those theories in understanding the connections between human behaviors and cybersecurity<\/li>\n<li>Define key concepts including cybersecurity, cybercrime, cyber criminology, cyber law, digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar.<\/li>\n<li>Identify how professionals in various cybersecurity careers apply these multidisciplinary concepts in their daily routines<\/li>\n<li>Describe how hypotheses and research questions are formed in studies addressing cybersecurity through a social science lens<\/li>\n<li>Describe how data are collected, measured, and analyzed in studies addressing cybersecurity through a social science lens<\/li>\n<li>Identify how marginalized groups have confronted challenges and concerns related to cybersecurity as well as how these groups have contributed to our understanding about the topic.<\/li>\n<li>Explain how the application of social science theories, principles, and research strategies have contributed to our understanding of cybersecurity at the societal level.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Here are some pictures I added that I think relate to this class:<\/p>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/cyse-300\/image-1-2\/\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"469\" src=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-1-2.png\" alt=\"\" class=\"wp-image-327\" style=\"width:588px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-1-2.png 936w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-1-2-300x150.png 300w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-1-2-768x385.png 768w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-1-2-600x300.png 600w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/cyse-300\/image-2-1\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-2-1-1024x1024.jpeg\" alt=\"\" class=\"wp-image-329\" style=\"width:447px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-2-1-1024x1024.jpeg 1024w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-2-1-300x300.jpeg 300w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-2-1-150x150.jpeg 150w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-2-1-768x768.jpeg 768w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-2-1.jpeg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/cyse-300\/image-3-1\/\"><img loading=\"lazy\" decoding=\"async\" width=\"760\" height=\"740\" src=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-3-1.jpg\" alt=\"\" class=\"wp-image-330\" style=\"width:498px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-3-1.jpg 760w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-3-1-300x292.jpg 300w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-3-1-308x300.jpg 308w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/cyse-300\/image-4-1\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"841\" src=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-4-1-1024x841.png\" alt=\"\" class=\"wp-image-333\" style=\"width:528px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-4-1-1024x841.png 1024w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-4-1-300x246.png 300w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-4-1-768x631.png 768w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-4-1-365x300.png 365w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-4-1.png 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/cyse-300\/image-5-1\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"752\" src=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-5-1-1024x752.jpg\" alt=\"\" class=\"wp-image-331\" style=\"width:512px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-5-1-1024x752.jpg 1024w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-5-1-300x220.jpg 300w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-5-1-768x564.jpg 768w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-5-1-1536x1128.jpg 1536w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-5-1-409x300.jpg 409w, https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-content\/uploads\/sites\/39495\/2025\/09\/Image-5-1.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-disciplinary, and some aspects of the topic are best understood through a social science lens.\u00a0 This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework.\u00a0 Students are introduced to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":31326,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-json\/wp\/v2\/users\/31326"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":337,"href":"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-json\/wp\/v2\/pages\/141\/revisions\/337"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/harding-eportfolio\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}