{"id":8,"date":"2024-09-04T18:43:25","date_gmt":"2024-09-04T18:43:25","guid":{"rendered":"https:\/\/wp.pprd.odu.edu\/spring2017-met330-template\/?page_id=8"},"modified":"2024-12-08T23:44:43","modified_gmt":"2024-12-08T23:44:43","slug":"assignments","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/assignments\/","title":{"rendered":"Course Work"},"content":{"rendered":"\n<p><strong>CYSE 201S &#8211; Cybersecurity and the Social Sciences<\/strong><\/p>\n\n\n\n<p>The course work section of my Portfolio allows viewers to witness a more in-depth look into my knowledge of cybersecurity principles and skill sets that I have obtained through my classes. This section also displays the different research papers and course projects that I have completed throughout my curriculum. Continue to scroll down to see the different courses!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"436\" height=\"192\" src=\"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-content\/uploads\/sites\/36799\/2024\/09\/image.png\" alt=\"\" class=\"wp-image-81\" style=\"width:299px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-content\/uploads\/sites\/36799\/2024\/09\/image.png 436w, https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-content\/uploads\/sites\/36799\/2024\/09\/image-300x132.png 300w\" sizes=\"(max-width: 436px) 100vw, 436px\" \/><\/figure>\n\n\n\n<ul>\n<li>&nbsp;Wk 1 NICE Workforce Framework Journal Entry:\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1jbUuBC-siUxBiuwkreoAHEzMrGTWiR9HWcnsLXMEvVc\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1jbUuBC-siUxBiuwkreoAHEzMrGTWiR9HWcnsLXMEvVc\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Wk 2 Cybersecurity: Principle of Science:\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1rSRudep2qqDuLDZYElT5xXGpTX7-C2K34ug_cnw5ljk\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1rSRudep2qqDuLDZYElT5xXGpTX7-C2K34ug_cnw5ljk\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Wk 3 Initial Cybersecurity: About Me:\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1AGACtR1I4yfCHOAee8z8sdvx4NYuxrkopUh1uzBj1No\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1AGACtR1I4yfCHOAee8z8sdvx4NYuxrkopUh1uzBj1No\/edit?usp=sharing<\/a>                                                                                                                                                          .<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Wk 3 Cybersecurity: Studying Breaches: \n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1yzdjE75JdZAyv-En4QF7Dm_FZRmILZLFjYzEPk1CKfw\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1yzdjE75JdZAyv-En4QF7Dm_FZRmILZLFjYzEPk1CK:fw\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul>\n<li>Wk 4 Cybersecurity: Maslow\u2019s Hierarchy of Need:\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1vOZdQPp8gNCzf7Sj0CcxrevO-KhQNJXiXABLaEbf1nY\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1vOZdQPp8gNCzf7Sj0CcxrevO-KhQNJXiXABLaEbf1nY\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Wk 5 Cybersecurity: Individual Motives of performing Cybercrimes:\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/176ODr0KhEM9WAYnwJR72gt7kvIvkI9VRD_8-DzzeYHo\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/176ODr0KhEM9WAYnwJR72gt7kvIvkI9VRD_8-DzzeYHo\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul>\n<li>Wk 6 Cybersecurity: Spotting Fake \/Real Websites\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/11nanc5o487IsTSMJrrHcLelbxyMpo6uS3v7jAktIpEo\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/11nanc5o487IsTSMJrrHcLelbxyMpo6uS3v7jAktIpEo\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Wk 7 Cybersecurity: Memes relating to Human-centered cybersecurity\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1bqB-6OjU8vCaPJxJz03_DGCQEY-YGKF3bUgqwdDgBX0\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1bqB-6OjU8vCaPJxJz03_DGCQEY-YGKF3bUgqwdDgBX0\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Wk 8 Cybersecurity: How Media Influences the understanding of Cybersecurity&nbsp;\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1wZWmZBR2YyIwNFonVXKV3azSARXgFR6vUK3mOEMDkFQ\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1wZWmZBR2YyIwNFonVXKV3azSARXgFR6vUK3mOEMDkFQ\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Wk 9 Cybersecurity: Social Media Disorder scale\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1ubrPTjU4MCm2UudLEO9R4Z4ldLBaR_7vpwS0x_eMG6g\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1ubrPTjU4MCm2UudLEO9R4Z4ldLBaR_7vpwS0x_eMG6g\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Wk 10 Cybersecurity: Social Cybersecurity an Emerging National Security Requirement\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1AubdhZAJS8RZxAclo8jRo5KCQKYHeNm_Sf0wm41RyqU\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1AubdhZAJS8RZxAclo8jRo5KCQKYHeNm_Sf0wm41RyqU\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Wk 11 Cybersecurity: The description of the cybersecurity analyst job relates to social behaviors &amp; Social Themes \n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1xZYmDkZgR-fDdQ2gGPIlSikdsT222fMK7Skd1YcdqGM\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1xZYmDkZgR-fDdQ2gGPIlSikdsT222fMK7Skd1YcdqGM\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Wk 12 Cybersecurity: SAMPLE DATA BREACH\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1OzOxxUQGlQGlrna6R3CkAlE4yxNewgXtvgR_mLkxERQ\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1OzOxxUQGlQGlrna6R3CkAlE4yxNewgXtvgR_mLkxERQ\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Wk 12 cybersecurity ~ Social Cybersecurity Journal Entry 14\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1w8FmFFqYO_gZrpR5Vf1VKWWK9HN9jTCWS_BB1mlcu1s\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1w8FmFFqYO_gZrpR5Vf1VKWWK9HN9jTCWS_BB1mlcu1s\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Wk 13 Cybersecurity: Social science framework<\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1dgb6ca9m203lNyEythdKabR2w5L4aGXSb352cTtxEFo\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1dgb6ca9m203lNyEythdKabR2w5L4aGXSb352cTtxEFo\/edit?usp=sharing<\/a><\/li>\n\n\n\n<li>Wk 15 cybersecurity ~ Social Cybersecurity Journal Entry 15\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1eCyNDVemWYXP7FEOxIEKdavhcOkAdU0tHBJSjaCgfsE\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1eCyNDVemWYXP7FEOxIEKdavhcOkAdU0tHBJSjaCgfsE\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Article Review 1: International Journal of Cyber Criminology\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1L92Z5vsDwWp1NpS-Bqw9Q1YfDY2cegYX3V3DqiuNIxE\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1L92Z5vsDwWp1NpS-Bqw9Q1YfDY2cegYX3V3DqiuNIxE\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Article Review 2: Understanding the Integrated Model of Cybercrime Dynamics\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1c25L4ypOZZO3WqtFKkgxXU2v41GQp_CuugT8uYWtsFI\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1c25L4ypOZZO3WqtFKkgxXU2v41GQp_CuugT8uYWtsFI\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Career Paper: The Role of Social Science in Cybersecurity \n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/100FVnHJgVelPq1x2SNY5A-9_CjSXS1Eaguf9yLXRgWo\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/100FVnHJgVelPq1x2SNY5A-9_CjSXS1Eaguf9yLXRgWo\/edit?usp=sharing<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 201S &#8211; Cybersecurity and the Social Sciences The course work section of my Portfolio allows viewers to witness a more in-depth look into my knowledge of cybersecurity principles and skill sets that I have obtained through my classes. This&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/assignments\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29509,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"[]"},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-json\/wp\/v2\/pages\/8"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-json\/wp\/v2\/users\/29509"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":174,"href":"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-json\/wp\/v2\/pages\/8\/revisions\/174"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/michaeldoylelll\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}