{"id":123,"date":"2023-01-31T10:38:39","date_gmt":"2023-01-31T10:38:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2023-05-08T02:19:03","modified_gmt":"2023-05-08T02:19:03","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/cyse-201s\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity as a Social Science (CYSE 201S)<\/h1>\n<p><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">disciplinary, and some aspects of the topic are best understood through a social science lens.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This course addresses the social, political, legal, criminological, and economic dimensions of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity through a social science framework. Students are introduced to a human-factors<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">approach to understanding cybersecurity threats. Attention is given to the social factors that<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">contribute to cyber incidents and the political and legal mechanisms that are developed to control<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the behaviors of those who create risks cybersecurity incidents. The class also explores how<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity is studied by social scientists in psychology, political science, criminology,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">economics, sociology, international studies, and other social science disciplines.<\/span><\/p>\n<p><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Learning Outcomes<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">After completing this class, students will be able to:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Compare how basic psychological, sociological, criminological, political, economic, and<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">legal theories and models explain cybersecurity<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Identify the strengths and weaknesses of those theories in understanding the connections<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">between human behaviors and cybersecurity<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Define key concepts including cybersecurity, cybercrime, cyber criminology, cyber law,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Identify how professionals in various cybersecurity careers apply these multidisciplinary<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">concepts in their daily routines<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Describe how hypotheses and research questions are formed in studies addressing<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity through a social science lens<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Describe how data are collected, measured, and analyzed in studies addressing<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity through a social science lens<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Identify how marginalized groups have confronted challenges and concerns related to<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity as well as how these groups have contributed to our understanding about<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the topic.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\uf0b7<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Explain how the application of social science theories, principles, and research strategies<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">have contributed to our understanding of cybersecurity at the societal level.<\/span><\/p>\n<h1>Course Material<\/h1>\n<p>Journal Entries By Week<\/p>\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">NIce Framework &#8211; I think that the Oversee and Governance branch of the NICE Framework is the discipline of Cyber Security that I am most interested in. I think it would be interesting to balance the different sides of cyber security, such as overseeing the utilization of data, policies, procedures, and to gain the knowledge to develop plans or to manage plans already in place. It allows you to dip into different pots, so to speak. I\u2019ve never been one with a narrow perspective, and I would dislike a job that has such requirements, such as data administration in the Operate and Maintain branch of Cyber Security. I would quickly get bored of that in my opinion.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Scientific Principles in Cyber Security &#8211; Social Scientists in relation to Cyber Security use several different principles of science to conduct their research and come to their conclusions about several different topics and to several different questions. Principles such as determinism, objectivity, parsimony, and relativism are a few examples of the principles used in cyber security research to keep the results objective, free of opinions, ethical, and as simple as possible to explain.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Diversity in Cyber Security &#8211; I believe that it is important to have a diverse cyber security workforce because it is a big motivator and influence to the onlooking generation. It is important to promote a field as vast and steadily growing as cyber security as welcoming to all genders and ethnicities. It can also dissolve any notions of discrimination and prejudice towards cyber crimes and offenders as they can have workers in the field from all backgrounds and keep any work objective.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Maslow\u2019s hierarchy of needs and technology &#8211; I believe that technology does definitely serve all of the needs on Maslow\u2019s hierarchy. My first physiological need is met by being able to use apps and services on my phone to order food, drinks, and to socialize and speak to people. My safety needs are met by being able to apply for jobs and seek employment through websites and using internet services to protect my information and personal data. Loving and belonging is met through the use of social media, such as facebook. My family posts pictures of my cousins and my old friends show glimpses of their life so I can see how they\u2019re doing. Self-esteem is met by posting my accomplishments online. I make music, so getting props for my skills definitely boost my ego. Self-actualization is met by being motivated by everyone else posting their goals and accomplishments. There are also all sorts of planning apps that can help keep track of goal progress and keep me accountable.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ranking reasons for cyber crimes &#8211; 1. Multiple reasons- I think that many cyber criminals can have multiple reasons and motives for their crimes, so I think that looking at it from a multi-faceted perspective makes the most sense. 2. Money &#8211; I think the best and most understandable reason for any crime is for monetary gain. 3. Political &#8211; many of the biggest crimes in history were perpetrated for political reasons, as many people are willing to go to radical lengths for what they believe. 4. Revenge &#8211; humans have an intrinsic desire to get even when they feel like they\u2019ve been hurt or wronged. 5. Recognition &#8211; some people want to have a name in history, be it for positive or negative reasons. 6. Entertainment and 7. Boredom.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">I wasn\u2019t able to find any fake website myself, but a couple things that can alert someone to a fake website are the domain name, domain age, and deals that seem too good to be true. Most fake websites are designed to take advantage of social engineering and manipulate people. Many people won\u2019t look to closely at the legitimacy of a website when they believe they are receiving a great value.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Humans Systems Integration memes &#8211; <\/span><a href=\"https:\/\/imgflip.com\/i\/7kwu25?herp=1683509003779\"><span style=\"font-weight: 400\">https:\/\/imgflip.com\/i\/7kwu25?herp=1683509003779<\/span><\/a><span style=\"font-weight: 400\">, <\/span><a href=\"https:\/\/imgflip.com\/i\/7kwuc3\"><span style=\"font-weight: 400\">https:\/\/imgflip.com\/i\/7kwuc3<\/span><\/a><span style=\"font-weight: 400\">, <\/span><a href=\"https:\/\/imgflip.com\/i\/7kwuir\"><span style=\"font-weight: 400\">https:\/\/imgflip.com\/i\/7kwuir<\/span><\/a><span style=\"font-weight: 400\">, <\/span><a href=\"https:\/\/imgflip.com\/i\/7kwupc\"><span style=\"font-weight: 400\">https:\/\/imgflip.com\/i\/7kwupc<\/span><\/a><span style=\"font-weight: 400\">, <\/span><a href=\"https:\/\/imgflip.com\/i\/7kwuwz\"><span style=\"font-weight: 400\">https:\/\/imgflip.com\/i\/7kwuwz<\/span><\/a><span style=\"font-weight: 400\">, <\/span><a href=\"https:\/\/imgflip.com\/i\/7kwv2a\"><span style=\"font-weight: 400\">https:\/\/imgflip.com\/i\/7kwv2a<\/span><\/a><span style=\"font-weight: 400\">, <\/span><a href=\"https:\/\/imgflip.com\/i\/7kwv7y\"><span style=\"font-weight: 400\">https:\/\/imgflip.com\/i\/7kwv7y<\/span><\/a><span style=\"font-weight: 400\">, my memes represent either naive people, cyber bullies, or people who aren\u2019t naive participating in either allowing cyber crime or not becoming victims.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Media influencing perception of cyber crime &#8211; I believe that in most movies and shows, cyber crime are depicted as grand gestures almost. It\u2019s always a shady looking hacker typing their keyboard a lot and live hacking someone\u2019s computer or camera maybe for black mail. Or they tap a few buttons on their phone and hack public electronics, or they plug in a usb drive and take control of a whole network. It almost makes these huge operations look easy, and also totally neglects the sometimes simple cyber attacks that do a lot of damage due to social engineering.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Social media scale &#8211; I scored about a 2\/9 on the scale. I think the items on the scale are more about people who use social media enough to let it control a portion of their lives and have a hard time stepping away from it to tend to other things. Around the world, the scored would differ because of the inherent values of people in those countries as well as the changing culture of the younger generation clashing with their parents.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Social Cybersecurity &#8211; I agree with the article. It is kind of reminiscent to yellow plagiarism used during WWII I believe. With the spreading of fake news and people gullible enough to believe it, a country\u2019s unity can be weakened by people who can be influenced to believe otherwise. Social cyber security can very much hack humans and manipulate them to achieve any desired effect on a larger scale, such as people believing that Donald Trump won the election and feeling motivated enough to storm the capitol.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Social and economic theories &#8211; I believe that rational choice theorists relate to the letter because the rational choice after an incident such as this would be to contact the card company and mitigate any damage that might be done or to prevent further damage from being done. Marxian theory would probably feel a bit betrayed by the company for allowing such activities to take place for so long and only now being notified. The conflict perspective would view the attack negatively and probably no longer trust the provider while the functionalist perspective would probably appreciate the notice.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">5 most illegal violations &#8211; I think that bullying, using copyrighted images, sharing addresses, collecting information about children, and recording calls are the biggest violations that people my make on the internet. These are harmful or extreme violations of privacy and clear neglect of consent. Using someone\u2019s copyrighted images robs them of money and other compensation and basically makes someone out to be a thief.\u00a0<\/span><\/li>\n<\/ol>\n<ol start=\"14\">\n<li><span style=\"font-weight: 400\"> Ted Talk &#8211; I think that the speaker\u2019s pathway into his field is\u00a0 a very relatable one. Working at a dental practice myself, I have seen positions be created and careers being opened up due to a need arising and the management not wanting to outsource, and instead wanting to utilize current human resources. Having been able to dabble in his interest as an official work project, piquing his interest and also allowing him to gain more experience is pretty cool.<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity as a Social Science (CYSE 201S) Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-disciplinary, and some aspects of the topic are best understood <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/khaleelgraham\/cyse-201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26113,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/users\/26113"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/pages\/123\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}