{"id":286,"date":"2024-09-17T20:32:04","date_gmt":"2024-09-17T20:32:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/?page_id=286"},"modified":"2025-08-09T23:36:15","modified_gmt":"2025-08-09T23:36:15","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/sample-page-2\/cyse-201s\/","title":{"rendered":"Cybersecurity &amp; The Social Sciences"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-text-align-center\">CYSE 201S<\/h1>\n\n\n\n<p>In this course, students analyze the topic of cybersecurity through the multi-disciplinary lens of the social sciences.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Article Reviews:<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\">Papers reviewing different articles and connecting them to the social sciences.<\/h4>\n\n\n\n<ul>\n<li>A Study in Ransomware Severity and the Effect on Organizations: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/a-study-in-ransomware-severity-and-the-effect-on-organizations\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/a-study-in-ransomware-severity-and-the-effect-on-organizations\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>The Social Impact of Cybercrime Risk Among University Students: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-social-impact-of-cybercrime-risk-among-university-students\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-social-impact-of-cybercrime-risk-among-university-students\/<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Professional Career Paper:<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\">A professionally written paper detailing the penetration testing career and its connection with the social sciences.<\/h4>\n\n\n\n<p><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-role-of-the-social-sciences-in-penetration-testing\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-role-of-the-social-sciences-in-penetration-testing\/<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left\">Journal Entries: <\/h2>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-left\">Short (100 -150 word) entries on various topics in the cybersecurity field and its relation to the social sciences.<\/h4>\n\n\n\n<ul>\n<li>NICE Workplace Framework: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/10\/01\/nice-workplace-framework\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/10\/01\/nice-workplace-framework\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Application of the Principles of Science: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/10\/01\/application-of-the-principles-of-science\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/10\/01\/application-of-the-principles-of-science\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Benefits of the Study of Data: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/10\/01\/benefits-of-the-study-of-data-breaches\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/10\/01\/benefits-of-the-study-of-data-breaches\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Maslow&#8217;s Hierarchy of Needs and Cybersecurity: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/10\/01\/maslows-hierarchy-of-needs-and-cybersecurity\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/10\/01\/maslows-hierarchy-of-needs-and-cybersecurity\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Ranked Individual Motivators for Cybercrime: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/10\/01\/ranked-individual-motivators-for-cybercrime\/ \">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/10\/01\/ranked-individual-motivators-for-cybercrime\/ <\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Fake vs. Real Websites: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/fake-vs-real-websites\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/fake-vs-real-websites\/<\/a> <\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Hacking Scenes in Movies Compared to Reality: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/hacking-scenes-in-movies-compared-to-reality\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/hacking-scenes-in-movies-compared-to-reality\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>The Social Media Disorder Scale: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-social-media-disorder-scale\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-social-media-disorder-scale\/<\/a> <\/li>\n<\/ul>\n\n\n\n<ul>\n<li>The Increasing Need for Social Cybersecurity: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-increasing-need-for-social-cybersecurity\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-increasing-need-for-social-cybersecurity\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>The Cybersecurity Analyst Career: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-cybersecurity-analyst-career\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-cybersecurity-analyst-career\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Data Breaches and Economic Theories: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/data-breaches-and-economic-theories\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/data-breaches-and-economic-theories\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Analyzing Bug Bounties: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/analyzing-bug-bounties\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/analyzing-bug-bounties\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>The Severity of Potentially Unknown Internet Uses: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-severity-of-potentially-unknown-internet-uses\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-severity-of-potentially-unknown-internet-uses\/<\/a><\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Digital Forensics as A Career: <a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/digital-forensics-as-a-career\/\">https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/digital-forensics-as-a-career\/<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 201S In this course, students analyze the topic of cybersecurity through the multi-disciplinary lens of the social sciences. Article Reviews: Papers reviewing different articles and connecting them to the social sciences. Professional Career Paper: A professionally written paper detailing the penetration testing career and its connection with the social sciences. https:\/\/sites.wp.odu.edu\/samantha-riggs\/2024\/12\/09\/the-role-of-the-social-sciences-in-penetration-testing\/ Journal Entries: Short&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/sample-page-2\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":29392,"featured_media":0,"parent":120,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/286"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/users\/29392"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/comments?post=286"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/286\/revisions"}],"predecessor-version":[{"id":460,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/286\/revisions\/460"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/120"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/media?parent=286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}