IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,  and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.

Be sure to remove this instructional language when you have completed updating content on this page.

Course Discussion Boards

Cybersecurity in the Biological Sciences Industry

Some of the mitigation strategies I would use would be to simply not digitize DNA in my lab.  It sounds as if digitizing DNA is too much of a high risk for someone to find a breach in my system.  In the Hacking Humans article, it explains that people will always be prone to hacks.  If we do not present DNA in a way that is capable of being hacked (digitized) then it will not be in the hackers playing field to sell on the black market.

Opportunities for Workplace Deviances

Cyber technology has created opportunities for workplace deviance due to the cyber world having so many vulnerabilities.  Workplace deviance occurs on the day to day basis as we all may do it subconsciously; however, the risk of workplace deviance with cyber technology opens up new doors of vulnerabilities.  The cyber technology is how we protect our valuable data, and with cyber deviance of an employee prompting a breach or an attack because they are having a rough time in the work place is crucial.  They can easily set the organization at risk, because employees a lot of the power in their hands with the access to the data. In all, cyber technology should be highly trusted and emphasized in the workplace, and should produce consequences when deviance occurs.

The Short Arm of Predictive Knowledge

We should always consider cyber-policies and infrastructures.  A part of the “short arm” is having limited knowledge on what is actually capable.  In the reading, they talked about physical conflicts compared to those we cannot physically secure ourselves from, which would be our cyber world.  A risk of not using cyber-policy and infrastructure at any point could cause a business or organization much more than hardly using it at all.  The development of it all, can only be obtained through experiences in our cyber-world.  We should take into consideration what’s already done, and keep building to make these policies and infrastructures better.

Course Write-Ups