{"id":123,"date":"2024-01-26T19:38:28","date_gmt":"2024-01-26T19:38:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2024-11-17T17:57:22","modified_gmt":"2024-11-17T17:57:22","slug":"cyse-200t","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/lf\/cyse-200t\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"<h1 style=\"text-align: center\">CYBERSECURITY-TECHNICAL-SOCIETY<\/h1>\n<p><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Students will explore how technology is related to cybersecurity from an interdisciplinary<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">orientation. Attention is given to the way that<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">technologically driven<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity issues<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">are connected to cultural, political, legal, ethical, and business domains.<\/span><\/p>\n<p class=\"p1\">After completing this course, students will be able to&#8230;<br \/>\n1. Describe how cyber technology creates opportunities for criminal behavior.<br \/>\n2. Identify how cultural beliefs interact with technology to impact cybersecurity<br \/>\nstrategies.<br \/>\n3. Understand and describe how cyber systems&#8217; components, mechanisms, and<br \/>\nfunctions produce security concerns.<br \/>\n4. Discuss cyber technology&#8217;s impact on individuals\u2019 experiences with crime and<br \/>\nvictimization.<br \/>\n5. Understand and describe both intended and unintended ethical dilemmas that<br \/>\ncybersecurity efforts produce for individuals, nations, societies, and the environment.<br \/>\n6. Describe the costs and benefits of producing secure cyber technologies.<br \/>\n7. Understand and describe the global nature of cybersecurity and the way that<br \/>\ncybersecurity efforts have produced and inhibited global changes.<br \/>\n8. Describe the role of cybersecurity in defining appropriate and inappropriate behavior.<br \/>\n9. Describe how cybersecurity produces ideas of progress and modernism.<\/p>\n<p>Work completed in class:<\/p>\n<ul>\n<li>Write up #1: <a href=\"https:\/\/docs.google.com\/document\/d\/1Suxd_MF0QW163W_5fM6F86pRgBOeWDzpAlXkJtiDnnE\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1Suxd_MF0QW163W_5fM6F86pRgBOeWDzpAlXkJtiDnnE\/edit?usp=sharing<\/a><\/li>\n<li>Write up #2: <a href=\"https:\/\/docs.google.com\/document\/d\/1PSF6D7JPZTVg_7jaYaVYuWBzbRe-ugju3O6pGXDFcYw\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1PSF6D7JPZTVg_7jaYaVYuWBzbRe-ugju3O6pGXDFcYw\/edit?usp=sharing<\/a><\/li>\n<li>Write up #3: <a href=\"https:\/\/docs.google.com\/document\/d\/1aC5rBpCAbmLZzRO8SIW_mwVlQW1f88b5z7M0iC2JZW0\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1aC5rBpCAbmLZzRO8SIW_mwVlQW1f88b5z7M0iC2JZW0\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>CYBERSECURITY-TECHNICAL-SOCIETY Students will explore how technology is related to cybersecurity from an interdisciplinaryorientation. Attention is given to the way that technologically driven cybersecurity issuesare connected to cultural, political, legal, ethical, and business domains. After completing this course, students will be able to&#8230; 1. Describe how cyber technology creates opportunities for criminal behavior. 2. Identify how&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/lf\/cyse-200t\/\">Read More<\/a><\/div>\n","protected":false},"author":28274,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/users\/28274"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":332,"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/pages\/123\/revisions\/332"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}