{"id":501,"date":"2026-04-18T20:37:43","date_gmt":"2026-04-18T20:37:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/?page_id=501"},"modified":"2026-04-21T21:00:34","modified_gmt":"2026-04-21T21:00:34","slug":"cyse-425w-cybersecurity-strategy-and-policy","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/cyse-425w-cybersecurity-strategy-and-policy\/","title":{"rendered":"CYSE 425W &#8211; Cybersecurity Strategy and Policy"},"content":{"rendered":"\n<p class=\"has-text-align-center\">This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Analysis Papers<\/h2>\n\n\n\n<p><strong>Short papers analyzing different aspects of cybersecurity policy regarding information systems.<\/strong><\/p>\n\n\n\n<p><strong>Political Implications of Information Systems Security Policies:<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-425W-Policy-Analysis-Paper-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-425W-Policy-Analysis-Paper-2.pdf\" class=\"wp-block-file__button wp-element-button\" download><\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Ethical Implications of IT Security Policies:<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-425W-Policy-Paper-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-425W-Policy-Paper-3.pdf\" class=\"wp-block-file__button wp-element-button\" download><\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>The Social Implications of Information Systems Security Policies:<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-425W-Policy-Paper-4.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-425W-Policy-Paper-4.pdf\" class=\"wp-block-file__button wp-element-button\" download><\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>IT Security Policy Effectiveness:<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-425W-Policy-Analysis-5.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-425W-Policy-Analysis-5.pdf\" class=\"wp-block-file__button wp-element-button\" download><\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">National Cybersecurity Strategy Research Paper<\/h2>\n\n\n\n<p><strong>A paper examining the National Cybersecurity Strategy.<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-425W-Midterm-Assignment.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-425W-Midterm-Assignment.pdf\" class=\"wp-block-file__button wp-element-button\" download><\/a><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Analysis Papers Short papers analyzing different aspects of cybersecurity policy regarding information systems. Political Implications of Information Systems Security Policies: Ethical Implications of IT Security Policies: The Social Implications of Information Systems Security Policies:&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/cyse-425w-cybersecurity-strategy-and-policy\/\">Read More<\/a><\/div>\n","protected":false},"author":29392,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/501"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/users\/29392"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/comments?post=501"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/501\/revisions"}],"predecessor-version":[{"id":603,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/501\/revisions\/603"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/media?parent=501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}