{"id":133,"date":"2025-09-29T00:52:16","date_gmt":"2025-09-29T00:52:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-11-26T22:35:43","modified_gmt":"2025-11-26T22:35:43","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/pierrerj\/it-cyse-200t-2\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>in CYSE 200T I explored how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n<h1>Course Material<\/h1>\n<p>Here, I will include the free response and discussion board posts from the class.<\/p>\n<p class=\"p1\">\u00a0<\/p>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">From Verbeek&#8217;s writing (Mod 6, Reading 4) Designing the Public Sphere: Information Technologies and the Politics of Mediation<\/h2>\n\n\n\n<p><strong>TOPIC QUESTION<\/strong><\/p>\n\n\n\n<p>How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world?<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>RESPONSE: <\/strong><\/p>\n\n\n\n<p>Verbeek shows how smart, connected technology now shapes our behavior in ways the state can\u2019t fully control, so we need new limits on how businesses and individuals use it. Regulation has to be shared across governments and tech creators to keep things balanced. Without that, intelligent systems could start guiding decisions more than people do.<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">The &#8220;Short Arm&#8221; of Predictive Knowledge<\/h2>\n\n\n\n<p>From this week&#8217;s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge?<\/p>\n\n\n\n<p>Jonas writes about this concept throughout the article. Here is a synopsis of what we mean by &#8220;The Short Arm of Predictive Knowledge.&#8221;<\/p>\n\n\n\n<p>The \u201cshort arm of predictive knowledge\u201d refers to the limited foresight humans historically needed when acting in the world. In the absence of global technological platforms such as the Internet and social media, and of ubiquitous networking, traditional actions had small, local, and short-term effects. People only needed to predict immediate outcomes to act ethically. Long-range consequences were either unknowable or irrelevant.<\/p>\n\n\n\n<p>However, modern technology breaks this pattern! Our actions now have global, long-term, and irreversible effects\u2014so the old, short predictive horizon is no longer adequate for responsible decision-making.<\/p>\n\n\n\n<p><strong>TOPIC QUESTION<\/strong><\/p>\n\n\n\n<p>So, are we *really* thinking through the long-term consequences of modern technology?<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>RESPONSE<\/strong>:<\/p>\n\n\n\n<p>Jonas made me realize that modern technology has its consequences, and these consequences stretch far beyond here and now, so our old short-term way of thinking doesn\u2019t work anymore. In cyber-policy, most the time we look for the quick fix, not thinking of the effects in the long term. In reality, those choices can shape the digital world in ways we wouldn&#8217;t dream of for years. The challenge is slowing down and thinking ahead so we don\u2019t create problems for the future while also adapting to the changes were currently facing now.<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h2 class=\"wp-block-heading\">Write-Up: The CIA Triad<\/h2>\n\n\n\n<p>Using the&nbsp;<a href=\"https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">Chai Article&nbsp;(Links to an external site.)<\/a>, along with additional research you will conduct on your own, describe the CIA Triad, and the differences between Authentication &amp; Authorization, including an example.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>RESPONSE: <\/strong><\/p>\n\n\n\n<p><strong>CIA Triad<br><\/strong>The CIA Triad, standing for Confidentiality, Integrity, and Accessibility, Is the main guideline for information security in all organizations and companies. Confidentiality stands for a company\u2019s privacy in their data, making sure all attempts at accessing a company\u2019s data are within employee roles. Then we have integrity, making sure all data<br>is trustworthy and consistent and that data is not changed or altered by unauthorized people. Finally, Availability, meaning information is ready to be accessed when it is needed for people with clearance, and keeping systems up to date that hold that data.<\/p>\n\n\n\n<p><br><strong>Authentication VS. Authorization<\/strong><br>Authentication is basically how a system makes sure you are really who you say you are. For example, when you log into your bank\u2019s app with your username and password, or even your fingerprint, the system checks that information against what it has on file (Microsoft, 2023). Authorization comes right after that, deciding what you\u2019re allowed to do once you\u2019re logged in (IBM, 2022). Using the same bank example, you might only be able to see your own account details, while a bank employee with special access could view multiple customer accounts.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society in CYSE 200T I explored how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how cyber technology creates opportunities&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pierrerj\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30657,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pierrerj\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pierrerj\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pierrerj\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierrerj\/wp-json\/wp\/v2\/users\/30657"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierrerj\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/pierrerj\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/pierrerj\/wp-json\/wp\/v2\/pages\/133\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pierrerj\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}