{"id":125,"date":"2023-09-18T15:12:21","date_gmt":"2023-09-18T15:12:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=125"},"modified":"2025-04-29T01:04:15","modified_gmt":"2025-04-29T01:04:15","slug":"cyse-406","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/cyse-406\/","title":{"rendered":"CRJS 406 Cyber Law"},"content":{"rendered":"\n<p>While taking this course it explores the legal and regulatory landscape surrounding cybercrime, digital privacy, intellectual property, and information security. I also learned how laws apply to computer systems, data breaches, and networks. Through case studies and analysis I was able to discuss different topics that include cyber ethics, cybercrime legislation, emerging legal issues in different areas like Artificial Intelligence. While taking this course I gain an understanding of how the justice system addresses crimes committed in the digital space.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p>In this analysis, I discussed the freedom of expression and privacy in the digital world. With writing this analysis and doing my research on different platforms that millions of people use everyday, I came to the realization that I am very concerned with how platforms properly assess content moderation and its inconsistencies, the collection of personal data, and privacy concerns.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-Cyber20Law2040620Writing20Assignment20.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Cyber20Law2040620Writing20Assignment20.docx.\"><\/object><a id=\"wp-block-file--media-5864ee9b-f333-48b5-9155-f6197d7bd071\" href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-Cyber20Law2040620Writing20Assignment20.docx.pdf\">annotated-Cyber20Law2040620Writing20Assignment20.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-Cyber20Law2040620Writing20Assignment20.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5864ee9b-f333-48b5-9155-f6197d7bd071\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>While taking this course it explores the legal and regulatory landscape surrounding cybercrime, digital privacy, intellectual property, and information security. I also learned how laws apply to computer systems, data breaches, and networks. Through case studies and analysis I was able to discuss different topics that include cyber ethics, cybercrime legislation, emerging legal issues in&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/cyse-406\/\">Read More<\/a><\/div>\n","protected":false},"author":27534,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages\/125"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/users\/27534"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/comments?post=125"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages\/125\/revisions"}],"predecessor-version":[{"id":357,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages\/125\/revisions\/357"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/media?parent=125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}