{"id":607,"date":"2024-03-04T23:43:36","date_gmt":"2024-03-05T04:43:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?page_id=607"},"modified":"2025-04-26T19:55:33","modified_gmt":"2025-04-26T23:55:33","slug":"policy-analysis-papers","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cyse-425w\/policy-analysis-papers\/","title":{"rendered":"Policy Analysis Papers"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<p>This page highlights four structured policy analysis papers I completed for <strong>CYSE 425W: Cybersecurity Strategy and Policy<\/strong>. Each paper explores different aspects of a selected cybersecurity policy \u2014 &#8220;Hacking Back&#8221; as a method of digital self-defense \u2014 by examining its definition, political implications, ethical considerations, and social impacts. Together, these papers demonstrate my ability to research cybersecurity strategies, apply critical analysis, and evaluate cybersecurity policies from multiple professional perspectives.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Paper 1 \u2013 Overview of Digital Self-Defense: Hacking Back<\/h3>\n\n\n\n<p>This paper provides an overview of hacking back as a cybersecurity strategy. It explains why the policy was developed, how it is implemented, and how it fits within national and international cybersecurity frameworks. The analysis includes references to scholarly sources discussing the advantages and challenges of adopting hacking-back strategies.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2024\/02\/Policy-Analysis-Paper-1_CYSE-425W_Wilhelm.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Policy-Analysis-Paper-1_CYSE-425W_Wilhelm<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Paper 2 \u2013 Political Implications of Hacking Back<\/h3>\n\n\n\n<p>This paper analyzes the political ramifications associated with hacking-back policies. It examines how lawmakers and policymakers have responded to the strategy, the reasons behind their positions, and the outcomes of political decisions regarding the legality and risks of hacking back.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2024\/02\/Policy-Analysis-Paper-2_CYSE-425W_Wilhelm.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Policy-Analysis-Paper-2_CYSE-425W_Wilhelm<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Paper 3 \u2013 Ethical Implications of Hacking Back<\/h3>\n\n\n\n<p>This paper explores the ethical debates surrounding hacking back as a cybersecurity defense strategy. It discusses the costs and benefits, evaluates how individual rights are affected, and questions whether the strategy appropriately balances security needs with ethical concerns.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2024\/04\/Policy-Analysis-Paper-3_CYSE-425W_Wilhelm.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Policy-Analysis-Paper-3_CYSE-425W_Wilhelm<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Paper 4 \u2013 Social Implications of Hacking Back<\/h3>\n\n\n\n<p>This paper examines the societal factors that influenced the development of hacking-back policies and the social consequences of implementing them. It highlights how cultural attitudes toward cybersecurity and retaliation have shaped public acceptance and regulatory challenges around digital self-defense strategies.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2024\/04\/Policy-Analysis-Paper-4_CYSE-425W_Wilhelm.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Policy-Analysis-Paper-4_CYSE-425W_Wilhelm<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page highlights four structured policy analysis papers I completed for CYSE 425W: Cybersecurity Strategy and Policy. Each paper explores different aspects of a selected cybersecurity policy \u2014 &#8220;Hacking Back&#8221; as a method of digital self-defense \u2014 by examining its&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cyse-425w\/policy-analysis-papers\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"parent":493,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/607"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=607"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/607\/revisions"}],"predecessor-version":[{"id":1260,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/607\/revisions\/1260"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/493"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}