{"id":303,"date":"2023-01-18T22:30:49","date_gmt":"2023-01-18T22:30:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/lashantig\/?page_id=303"},"modified":"2025-04-28T22:05:53","modified_gmt":"2025-04-28T22:05:53","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/lashantig\/cyse-201s\/","title":{"rendered":""},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity and Social Science<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">Course Overview<\/h2>\n\n\n\n<p>This course explores how social science theories and methods apply to cybersecurity. Students learn to compare psychological, sociological, criminological, political, economic, and legal theories in explaining cybersecurity issues. The course emphasizes understanding human behaviors related to cybersecurity, as well as identifying the strengths and weaknesses of these theories. Key concepts covered include cybersecurity, cybercrime, cyber criminology, cyber law, digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar. Below are various article reviews on this topic. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2023\/04\/Article-1-Review.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Article-1-Review.\"><\/object><a id=\"wp-block-file--media-c455c119-3fd4-4e2c-a4bf-0f56418fda73\" href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2023\/04\/Article-1-Review.pdf\">Article-1-Review<\/a><a href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2023\/04\/Article-1-Review.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c455c119-3fd4-4e2c-a4bf-0f56418fda73\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Article Review 2<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2023\/04\/Article-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Article-2.\"><\/object><a id=\"wp-block-file--media-15cfb759-2443-4dce-b884-8e294cdad7b8\" href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2023\/04\/Article-2.pdf\">Article-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2023\/04\/Article-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-15cfb759-2443-4dce-b884-8e294cdad7b8\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Career Paper<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2023\/04\/Career-Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Career-Paper.\"><\/object><a id=\"wp-block-file--media-10f7c336-cbaf-4d3b-90b0-23b1654f02ba\" href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2023\/04\/Career-Paper.pdf\">Career-Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2023\/04\/Career-Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-10f7c336-cbaf-4d3b-90b0-23b1654f02ba\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and Social Science Course Overview This course explores how social science theories and methods apply to cybersecurity. Students learn to compare psychological, sociological, criminological, political, economic, and legal theories in explaining cybersecurity issues. The course emphasizes understanding human behaviors related to cybersecurity, as well as identifying the strengths and weaknesses of these theories. Key&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/lashantig\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":25172,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/pages\/303"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/users\/25172"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/comments?post=303"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/pages\/303\/revisions"}],"predecessor-version":[{"id":551,"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/pages\/303\/revisions\/551"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/media?parent=303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}