{"id":212,"date":"2023-01-17T19:15:14","date_gmt":"2023-01-17T19:15:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jwxng2\/?page_id=212"},"modified":"2023-01-20T00:01:47","modified_gmt":"2023-01-20T00:01:47","slug":"cyse201s-social-sciences","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jwxng2\/cyse201s-social-sciences\/","title":{"rendered":"CYSE201S- Social Sciences"},"content":{"rendered":"\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"is-flex-container columns-3 wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-258 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/jwxng2\/2023\/04\/21\/journal-13-201s\/\" target=\"_self\" >Journal #13 &#8211; 201s<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Digital Forensics | Davin Teo | TEDxHongKongSalon \u2013 YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to&#8230; Continue Reading &rarr; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-21T19:18:51+00:00\">April 21, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-255 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/jwxng2\/2023\/04\/11\/journal-11-part-2-201s\/\" target=\"_self\" >Journal #11 part 2 &#8211; 201s<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">&gt; A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber&#8230; Continue Reading &rarr; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-11T19:34:59+00:00\">April 11, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-253 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/jwxng2\/2023\/04\/11\/journal-12-201s\/\" target=\"_self\" >Journal #12 &#8211; 201s<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. Andriy Slynchuk&#8217;s article describes&#8230; Continue Reading &rarr; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-11T19:30:51+00:00\">April 11, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-251 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/jwxng2\/2023\/04\/11\/journal-11-201s\/\" target=\"_self\" >Journal #11 &#8211; 201s<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Read this https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf sample breach letter\u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter. The theory of adverse selection and the theory of moral hazard are two economic&#8230; Continue Reading &rarr; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-11T19:24:35+00:00\">April 11, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-249 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/jwxng2\/2023\/04\/11\/journal-10-201s\/\" target=\"_self\" >Journal #10 &#8211; 201s<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Read this and write a journal entry summarizing your response to the article on social cybersecurityhttps:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117 Cybersecurity\/b\/ After reading the article on social cybersecurity, I realized how critical it is to take a holistic approach to cybersecurity that considers both&#8230; Continue Reading &rarr; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-11T19:20:48+00:00\">April 11, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-247 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/jwxng2\/2023\/04\/11\/journal-9-201s\/\" target=\"_self\" >Journal #9 &#8211; 201s<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world? I scored a 0.0. I think the patterns&#8230; Continue Reading &rarr; <\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-11T19:13:05+00:00\">April 11, 2023<\/time><\/div><\/div><\/div>\n\n<\/li><\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":25174,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jwxng2\/wp-json\/wp\/v2\/pages\/212"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jwxng2\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jwxng2\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwxng2\/wp-json\/wp\/v2\/users\/25174"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwxng2\/wp-json\/wp\/v2\/comments?post=212"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jwxng2\/wp-json\/wp\/v2\/pages\/212\/revisions"}],"predecessor-version":[{"id":226,"href":"https:\/\/sites.wp.odu.edu\/jwxng2\/wp-json\/wp\/v2\/pages\/212\/revisions\/226"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jwxng2\/wp-json\/wp\/v2\/media?parent=212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}