{"id":133,"date":"2025-01-03T16:21:45","date_gmt":"2025-01-03T16:21:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-01-23T21:49:20","modified_gmt":"2025-01-23T21:49:20","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/matthewburd\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<p>Students in&nbsp;IT\/CYSE 200T&nbsp;will explore how technology is related to cybersecurity from an interdisciplinary orientation.&nbsp; Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n\n\n\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n\n\n\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n\n\n\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n\n\n\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n\n\n\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n\n\n\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n\n\n\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n\n\n\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n\n\n\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p>Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,\u00a0 and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.<\/p>\n\n\n\n<p><strong>ARTICLES<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyberexperts-com wp-block-embed-cyberexperts-com\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"0XiinFjYnY\"><a href=\"https:\/\/cyberexperts.com\/history-of-cybersecurity\/\">The Quick and Dirty History of Cybersecurity<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;The Quick and Dirty History of Cybersecurity&#8221; &#8212; CyberExperts.com\" src=\"https:\/\/cyberexperts.com\/history-of-cybersecurity\/embed\/#?secret=2CFZrDhvhA#?secret=0XiinFjYnY\" data-secret=\"0XiinFjYnY\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Students in&nbsp;IT\/CYSE 200T&nbsp;will explore how technology is related to cybersecurity from an interdisciplinary orientation.&nbsp; Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Course Material Students in this course have completed a number of activities&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/matthewburd\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30247,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/matthewburd\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/matthewburd\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/matthewburd\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matthewburd\/wp-json\/wp\/v2\/users\/30247"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matthewburd\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/matthewburd\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/matthewburd\/wp-json\/wp\/v2\/pages\/133\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/matthewburd\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}