{"id":133,"date":"2025-09-29T02:26:41","date_gmt":"2025-09-29T02:26:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2026-05-05T16:48:53","modified_gmt":"2026-05-05T16:48:53","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaredpeel\/it-cyse-200t-2\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity and Social Sciences<\/h1>\n<p style=\"text-align: center\">Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-<br \/>\ndisciplinary, and some aspects of the topic are best understood through a social science<br \/>\nlens. This course addresses the social, political, legal, criminological, and economic<br \/>\ndimensions of cybersecurity through a social science framework. Students are introduced<br \/>\nto a human-factors approach to understanding cybersecurity threats. Attention is given to<br \/>\nthe social factors that contribute to cyber incidents and the political and legal mechanisms<br \/>\nthat are developed to control the behaviors of those who create risks in cybersecurity<br \/>\nincidents. The class also explores how cybersecurity is studied by social scientists in<br \/>\npsychology, political science, criminology, economics, sociology, international studies, and<br \/>\nother social science disciplines.<\/p>\n\n\n<h2 class=\"wp-block-heading\">Article Review #1<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-15.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Document-15.\"><\/object><a id=\"wp-block-file--media-bd26bea5-3826-4758-a3ae-f1f9affa1a85\" href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-15.pdf\">Document-15<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-15.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-bd26bea5-3826-4758-a3ae-f1f9affa1a85\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Article Review #2<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-17.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Document-17.\"><\/object><a id=\"wp-block-file--media-8fe80449-c73c-4aeb-a490-9d255b794de4\" href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-17.pdf\">Document-17<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-17.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8fe80449-c73c-4aeb-a490-9d255b794de4\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Professional Career Paper<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-18.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Document-18.\"><\/object><a id=\"wp-block-file--media-01409ba7-012c-41b7-ba78-7e826f4faede\" href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-18.pdf\">Document-18<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-18.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-01409ba7-012c-41b7-ba78-7e826f4faede\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Presentation<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Presentation-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Presentation-3.\"><\/object><a id=\"wp-block-file--media-f68b3577-bf46-4c7c-bf04-e80fb47f9cd6\" href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Presentation-3.pdf\">Presentation-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Presentation-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f68b3577-bf46-4c7c-bf04-e80fb47f9cd6\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Case Study<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-19.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Document-19.\"><\/object><a id=\"wp-block-file--media-aa6048d4-9d50-48a2-b820-cace7d8eb16f\" href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-19.pdf\">Document-19<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-content\/uploads\/sites\/40003\/2026\/05\/Document-19.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-aa6048d4-9d50-48a2-b820-cace7d8eb16f\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and Social Sciences Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi- disciplinary, and some aspects of the topic are best understood through a social science lens. This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework. Students are introduced to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jaredpeel\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":31621,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-json\/wp\/v2\/users\/31621"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":312,"href":"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-json\/wp\/v2\/pages\/133\/revisions\/312"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaredpeel\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}