{"id":316,"date":"2023-04-20T01:01:14","date_gmt":"2023-04-20T01:01:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rwilh002\/?p=316"},"modified":"2023-04-20T01:01:14","modified_gmt":"2023-04-20T01:01:14","slug":"cyse-201s","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rwilh002\/2023\/04\/20\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p>Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-<br>disciplinary, and some aspects of the topic are best understood through a social science lens.<br>This course addresses the social, political, legal, criminological, and economic dimensions of<br>cybersecurity through a social science framework. Students are introduced to a human-factors<br>approach to understanding cybersecurity threats. Attention is given to the social factors that<br>contribute to cyber incidents and the political and legal mechanisms that are developed to control<br>the behaviors of those who create risks cybersecurity incidents. The class also explores how<br>cybersecurity is studied by social scientists in psychology, political science, criminology,<br>economics, sociology, international studies, and other social science disciplines.<br>Learning Outcomes<br>After completing this class, students will be able to:<br>\uf0b7 Compare how basic psychological, sociological, criminological, political, economic, and<br>legal theories and models explain cybersecurity<br>\uf0b7 Identify the strengths and weaknesses of those theories in understanding the connections<br>between human behaviors and cybersecurity<br>\uf0b7 Define key concepts including cybersecurity, cybercrime, cyber criminology, cyber law,<br>digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar.<br>\uf0b7 Identify how professionals in various cybersecurity careers apply these multidisciplinary<br>concepts in their daily routines<br>\uf0b7 Describe how hypotheses and research questions are formed in studies addressing<br>cybersecurity through a social science lens<br>\uf0b7 Describe how data are collected, measured, and analyzed in studies addressing<br>cybersecurity through a social science lens<br>\uf0b7 Identify how marginalized groups have confronted challenges and concerns related to<br>cybersecurity as well as how these groups have contributed to our understanding about<br>the topic.<br>\uf0b7 Explain how the application of social science theories, principles, and research strategies<br>have contributed to our understanding of cybersecurity at the societal level.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-disciplinary, and some aspects of the topic are best understood through a social science lens.This course addresses the social, political, legal, criminological, and economic dimensions ofcybersecurity through a social science framework. Students are introduced to a human-factorsapproach to understanding cybersecurity threats. Attention&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rwilh002\/2023\/04\/20\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":24917,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rwilh002\/wp-json\/wp\/v2\/posts\/316"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rwilh002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rwilh002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwilh002\/wp-json\/wp\/v2\/users\/24917"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwilh002\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/rwilh002\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"predecessor-version":[{"id":318,"href":"https:\/\/sites.wp.odu.edu\/rwilh002\/wp-json\/wp\/v2\/posts\/316\/revisions\/318"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rwilh002\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwilh002\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwilh002\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}