{"id":329,"date":"2025-12-06T01:15:43","date_gmt":"2025-12-06T01:15:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rollinson\/?page_id=329"},"modified":"2025-12-06T16:02:08","modified_gmt":"2025-12-06T16:02:08","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/rollinson\/cyse-201s\/","title":{"rendered":"CYSE 201s"},"content":{"rendered":"\n<p>While cybersecurity is frequently only seen as a technical issue, this course takes a multi-disciplinary perspective to illustrate how it is related to social, political, legal, criminological, and economic dimensions. To understand the impetus of a cybersecurity threat relating human factors to social behaviors and environmental circumstances is central to the course. Societies also have a range of mechanisms to regulate harmful behaviors online, including law and policing, which will also be examined, before bringing together this interdisciplinary subject from the perspective of social science more generally, including psychology, sociology, criminology, political science, economics, and international studies; this holistic view will provide students with a broad and integrated paradigm for analysis.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" src=\"https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/security-science_900x600.jpg\" alt=\"\" class=\"wp-image-310\" style=\"width:325px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/security-science_900x600.jpg 900w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/security-science_900x600-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/security-science_900x600-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/security-science_900x600-450x300.jpg 450w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/computer-science-110-introduction-to-cybersecurity_775203_large.jpeg\" alt=\"\" class=\"wp-image-311\" style=\"width:396px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/computer-science-110-introduction-to-cybersecurity_775203_large.jpeg 800w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/computer-science-110-introduction-to-cybersecurity_775203_large-300x169.jpeg 300w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/computer-science-110-introduction-to-cybersecurity_775203_large-768x432.jpeg 768w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/computer-science-110-introduction-to-cybersecurity_775203_large-533x300.jpeg 533w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/1200x800-1024x683.jpg\" alt=\"\" class=\"wp-image-313\" style=\"width:426px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/1200x800-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/1200x800-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/1200x800-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/1200x800-960x640.jpg 960w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/1200x800-450x300.jpg 450w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/1200x800.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Social networking, internet and cyber security concept<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/Combatting-Social-Engineering-%E2%80%93-The-Invisible-Threat-1200x900-1-1024x768.jpg\" alt=\"\" class=\"wp-image-314\" style=\"width:359px;height:auto\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"507\" src=\"https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/fig01-fortinet-cybersecurity-challenges-1024x507.jpg\" alt=\"\" class=\"wp-image-315\" style=\"width:323px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/fig01-fortinet-cybersecurity-challenges-1024x507.jpg 1024w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/fig01-fortinet-cybersecurity-challenges-300x149.jpg 300w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/fig01-fortinet-cybersecurity-challenges-768x380.jpg 768w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/fig01-fortinet-cybersecurity-challenges-600x297.jpg 600w, https:\/\/sites.wp.odu.edu\/rollinson\/wp-content\/uploads\/sites\/37356\/2025\/09\/fig01-fortinet-cybersecurity-challenges.jpg 1254w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>While cybersecurity is frequently only seen as a technical issue, this course takes a multi-disciplinary perspective to illustrate how it is related to social, political, legal, criminological, and economic dimensions. To understand the impetus of a cybersecurity threat relating human factors to social behaviors and environmental circumstances is central to the course. Societies also have&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rollinson\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":29865,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rollinson\/wp-json\/wp\/v2\/pages\/329"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rollinson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rollinson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rollinson\/wp-json\/wp\/v2\/users\/29865"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rollinson\/wp-json\/wp\/v2\/comments?post=329"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/rollinson\/wp-json\/wp\/v2\/pages\/329\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/rollinson\/wp-json\/wp\/v2\/pages\/329\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rollinson\/wp-json\/wp\/v2\/media?parent=329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}