{"id":133,"date":"2022-01-29T02:22:30","date_gmt":"2022-01-29T02:22:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2023-12-03T23:41:34","modified_gmt":"2023-12-03T23:41:34","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/johnpeck\/it-cyse-200t-2\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"<p><strong>Learning Outcomes<\/strong><\/p>\n<p>After completing this class, students will be able to:<\/p>\n<ol>\n<li>Compare how basic psychological, sociological, criminological, political, economic, and legal theories and models explain cybersecurity.<\/li>\n<li>Identify the strengths and weaknesses of those theories in understanding the connections between human behaviors and cybersecurity.<\/li>\n<li>Define key concepts including cybersecurity, cybercrime, cyber criminology, cyber law, digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar.<\/li>\n<li>Identify how professionals in various cybersecurity careers apply these multidisciplinary concepts in their daily routines.<\/li>\n<li>Describe how hypotheses and research questions are formed in studies addressing cybersecurity through a social science lens.<\/li>\n<li>Describe how data are collected, measured, and analyzed in studies addressing cybersecurity through a social science lens.<\/li>\n<li>Identify how marginalized groups have confronted challenges and concerns related to cybersecurity as well as how these groups have contributed to our understanding about the topic.<\/li>\n<li>Explain how the application of social science theories, principles, and research strategies have contributed to our understanding of cybersecurity at the societal level.<\/li>\n<\/ol>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-content\/uploads\/sites\/28394\/2023\/12\/Journal-Entries.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Journal Entries.\"><\/object><a id=\"wp-block-file--media-f34475b1-577b-4603-aa85-ebb9d0bac2d9\" href=\"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-content\/uploads\/sites\/28394\/2023\/12\/Journal-Entries.pdf\">Journal Entries<\/a><a href=\"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-content\/uploads\/sites\/28394\/2023\/12\/Journal-Entries.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f34475b1-577b-4603-aa85-ebb9d0bac2d9\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-content\/uploads\/sites\/28394\/2023\/10\/annotated-Article20120review.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Article Reviews 1 and 2.\"><\/object><a id=\"wp-block-file--media-0158e694-236a-4166-a857-bdd964149b5a\" href=\"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-content\/uploads\/sites\/28394\/2023\/10\/annotated-Article20120review.pdf\">Article Reviews 1 and 2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-content\/uploads\/sites\/28394\/2023\/10\/annotated-Article20120review.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0158e694-236a-4166-a857-bdd964149b5a\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-content\/uploads\/sites\/28394\/2023\/12\/CYSE-201S-Career-Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cybersecurity Career Professional Paper.\"><\/object><a id=\"wp-block-file--media-e0d0c64c-2764-4c04-b6cb-66b318506d12\" href=\"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-content\/uploads\/sites\/28394\/2023\/12\/CYSE-201S-Career-Paper.pdf\">Cybersecurity Career Professional Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-content\/uploads\/sites\/28394\/2023\/12\/CYSE-201S-Career-Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e0d0c64c-2764-4c04-b6cb-66b318506d12\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learning Outcomes After completing this class, students will be able to: Compare how basic psychological, sociological, criminological, political, economic, and legal theories and models explain cybersecurity. Identify the strengths and weaknesses of those theories in understanding the connections between human behaviors and cybersecurity. Define key concepts including cybersecurity, cybercrime, cyber criminology, cyber law, digital forensics,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/johnpeck\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":23376,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-json\/wp\/v2\/users\/23376"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":401,"href":"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-json\/wp\/v2\/pages\/133\/revisions\/401"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/johnpeck\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}