{"id":133,"date":"2025-02-09T21:23:13","date_gmt":"2025-02-09T21:23:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-05-04T19:30:38","modified_gmt":"2025-05-04T19:30:38","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p><span class=\"citation-0 recitation citation-end-0\">This course, IT\/CYSE 200T, examines the intersection of technology and cybersecurity through an interdisciplinary lens. <\/span><span class=\"citation-1 recitation citation-end-1\">We&#8217;ll explore cybercrime opportunities, the influence of cultural beliefs on security, and the inherent security concerns within cyber systems.<sup class=\"superscript visible\" data-turn-source-index=\"2\">\u00a0<\/sup><\/span>Furthermore, we will analyze technology&#8217;s impact on crime experiences, ethical dilemmas arising from cybersecurity, the economics of secure tech, global cybersecurity dynamics, its role in shaping behavior norms, and its connection to progress.<span class=\"button-container hide-from-message-actions ng-star-inserted\"> \u00a0 <button class=\"mat-mdc-tooltip-trigger button image-fade-on button-selected hide-from-message-actions\" aria-label=\"Learn More\" aria-controls=\"sources\" aria-expanded=\"true\" aria-describedby=\"cdk-describedby-message-ng-1-40\"><\/button><\/span><\/p>\n<div class=\"container ng-tns-c3908347124-24\">\n<div class=\"carousel-container ng-tns-c3908347124-24\">\n<div class=\"carousel-content ng-tns-c3908347124-24\">\n<div class=\"sources-carousel-source ng-tns-c3908347124-24 ng-star-inserted\" data-test-id=\"sources-carousel-source\">\n<div class=\"source-card-container\">\n<div class=\"source-card-content\">\n<div class=\"source-card-body\">\n<div class=\"source-card-header\">\n<div class=\"source-card-title\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/CIA-Triad.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CIA-Triad.\"><\/object><a id=\"wp-block-file--media-833a0ab9-0e7c-4981-9aac-3f98f8634371\" href=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/CIA-Triad.pdf\">CIA-Triad<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/CIA-Triad.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-833a0ab9-0e7c-4981-9aac-3f98f8634371\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/Write-up-Human-factor.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write-up-Human-factor.\"><\/object><a id=\"wp-block-file--media-184dd521-d0fd-4639-b673-e3f7a6bb77e5\" href=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/Write-up-Human-factor.pdf\">Write-up-Human-factor<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/Write-up-Human-factor.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-184dd521-d0fd-4639-b673-e3f7a6bb77e5\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/Write-up-SCADA-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write-up-SCADA-1.\"><\/object><a id=\"wp-block-file--media-a856b8db-ed86-49f5-a739-df67c4151b3a\" href=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/Write-up-SCADA-1.pdf\">Write-up-SCADA-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/Write-up-SCADA-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a856b8db-ed86-49f5-a739-df67c4151b3a\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/Tambe-Analytical-paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Tambe-Analytical-paper.\"><\/object><a id=\"wp-block-file--media-5d8fd9d0-65b0-49e4-91d2-1d7277af1177\" href=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/Tambe-Analytical-paper.pdf\">Tambe-Analytical-paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-content\/uploads\/sites\/38592\/2025\/05\/Tambe-Analytical-paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5d8fd9d0-65b0-49e4-91d2-1d7277af1177\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society This course, IT\/CYSE 200T, examines the intersection of technology and cybersecurity through an interdisciplinary lens. We&#8217;ll explore cybercrime opportunities, the influence of cultural beliefs on security, and the inherent security concerns within cyber systems.\u00a0Furthermore, we will analyze technology&#8217;s impact on crime experiences, ethical dilemmas arising from cybersecurity, the economics of secure&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27560,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-json\/wp\/v2\/users\/27560"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":361,"href":"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-json\/wp\/v2\/pages\/133\/revisions\/361"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaytambeportfolio\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}