{"id":1220,"date":"2025-04-26T18:31:25","date_gmt":"2025-04-26T22:31:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?page_id=1220"},"modified":"2025-05-05T17:57:32","modified_gmt":"2025-05-05T21:57:32","slug":"law-and-ethics","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/law-and-ethics\/","title":{"rendered":"Law and Ethics"},"content":{"rendered":"\n<p>This Law and Ethics section focuses on courses that explore the legal, ethical, and theoretical foundations of cybersecurity and criminal justice. These classes strengthened my understanding of digital law, ethical decision-making, and criminological theory within professional practice.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>CRJS\/CYSE 404 \u2013 Law and Digital Forensics<\/strong><\/h3>\n\n\n\n<p>This course explored legal frameworks governing digital evidence and forensic investigations. I completed class discussions and a major writing assignment analyzing legal issues in digital forensics.<\/p>\n\n\n\n<p>You can view examples of my class discussion responses <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/category\/crjs-cyse-404-discussions\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/category\/crjs-cyse-404-discussions\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p>You can also view my writing assignment on <em>Cybercrime and Cyberterrorism<\/em> <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/crjs-cyse-404-writing-assignment\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/crjs-cyse-404-writing-assignment\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>CRJS 426W \u2013 Criminological Theory<\/strong><\/h3>\n\n\n\n<p>This course examines major criminological theories and their application to modern criminal justice issues.<\/p>\n\n\n\n<p>You can view my theory selection, current policy summary, and final policy proposal on domestic violence and reintegrative shaming <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/crjs-426w\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/crjs-426w\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>CYSE 406 \u2013 Cyber Law<\/strong><\/h3>\n\n\n\n<p>This course addressed major legal and regulatory issues in cybersecurity, including data privacy, intellectual property, and cybercrime jurisdiction. I completed discussions and writing assignments on real-world cyber law cases.<\/p>\n\n\n\n<p>You can view examples of my class discussion responses <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/category\/cyse-406\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/category\/cyse-406\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p>You can also view my writing assignments on a <em>Digital Privacy Memorandum<\/em> and <em>Cyber Awareness<\/em> <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/writing-assignment-1\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/writing-assignment-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>CYSE 425W \u2013 Cybersecurity Strategy and Policy<\/strong><\/h3>\n\n\n\n<p>This course focused on cybersecurity strategy development and national security policy planning.<\/p>\n\n\n\n<p>You can view examples of my class discussion responses <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/category\/cyse-425w-discussions\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/category\/cyse-425w-discussions\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p>You can also view my series of cybersecurity policy analysis papers on <em>Digital Self-Defense: Hacking Back<\/em>, <em>Political Views on Hacking Back<\/em>, <em>Ethical Considerations of Hacking Back<\/em>, and <em>Social Impacts of Hacking Back<\/em> <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cyse-425w\/policy-analysis-papers\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cyse-425w\/policy-analysis-papers\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This Law and Ethics section focuses on courses that explore the legal, ethical, and theoretical foundations of cybersecurity and criminal justice. These classes strengthened my understanding of digital law, ethical decision-making, and criminological theory within professional practice. CRJS\/CYSE 404 \u2013&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/law-and-ethics\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1220"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=1220"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1220\/revisions"}],"predecessor-version":[{"id":1309,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1220\/revisions\/1309"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=1220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}