{"id":141,"date":"2026-01-28T23:53:18","date_gmt":"2026-01-28T23:53:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2026-02-02T00:43:04","modified_gmt":"2026-02-02T00:43:04","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/racquelmccray\/cyse-300\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"<h2>\u00a0\u00a0<span class=\"text detail-title margin--tiny text--semibold text--big\"><strong>Cybersecurity, Technology, and Society<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400\">Students will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains.<\/span><\/p>\n<p><i><span style=\"font-weight: 400\">Specifically, we will explore how the disciplines of business, technology, criminal justice, sociology, psychology, and philosophy contribute to cybersecurity.<\/span><\/i><\/p>\n<p>The course objectives are:<\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Describe how cyber technology creates opportunities for criminal behavior;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Identify how cultural beliefs interact with technology to impact cybersecurity strategies;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts produce for individuals, nations, societies, and the environment;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Describe the costs and benefits of producing secure cyber technologies;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Describe the role of cybersecurity in defining definitions of appropriate and inappropriate behavior;\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Describe how cybersecurity produces ideas of progress and modernism.\u00a0<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0\u00a0Cybersecurity, Technology, and Society Students will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. Specifically, we will explore how the disciplines of business, technology, criminal justice, sociology, psychology, and philosophy contribute to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/racquelmccray\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":31974,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/racquelmccray\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/racquelmccray\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/racquelmccray\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/racquelmccray\/wp-json\/wp\/v2\/users\/31974"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/racquelmccray\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/racquelmccray\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/racquelmccray\/wp-json\/wp\/v2\/pages\/141\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/racquelmccray\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}