{"id":331,"date":"2025-09-06T23:05:58","date_gmt":"2025-09-06T23:05:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sgros\/?page_id=331"},"modified":"2025-12-04T01:53:38","modified_gmt":"2025-12-04T01:53:38","slug":"cyse201s-cybersecurity-and-the-social-sciences","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sgros\/it-cyse-200t\/cyse201s-cybersecurity-and-the-social-sciences\/","title":{"rendered":"CYSE201S &#8211; Cybersecurity and the Social Sciences"},"content":{"rendered":"\n<p>This course provides an overview of Cybersecurity through a Social Science Lens. Cybersecurity is typically conceived as a technical topic. In reality, the topic is fundamentally a multi-disciplinary and interdisciplinary area, and some aspects of the topic are best understood through a social science lens. This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework. Students are introduced to a human-factors approach to understanding cybersecurity threats. Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the behaviors of those who create risks and cybersecurity incidents. The class also explores how cybersecurity is studied by social scientists in various social science disciplines.<\/p>\n\n\n\n<p><strong>Cybersecurity and the Social Sciences<\/strong><\/p>\n\n\n\n<p>Cybersecurity is an inherently social field given it deals with cybercrime, and crime is inherently a social matter.<\/p>\n\n\n\n<p>Social Sciences and interdisciplinary fields are amongst the most common fields of cybersecurity as seen in this 2019 chart where the node size represents its prominence.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/sites.wp.odu.edu\/sgros\/wp-content\/uploads\/sites\/38690\/2025\/09\/10588_2020_9322_Fig1_HTML-1024x577.png\" alt=\"\" class=\"wp-image-342\" style=\"width:562px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/sgros\/wp-content\/uploads\/sites\/38690\/2025\/09\/10588_2020_9322_Fig1_HTML-1024x577.png 1024w, https:\/\/sites.wp.odu.edu\/sgros\/wp-content\/uploads\/sites\/38690\/2025\/09\/10588_2020_9322_Fig1_HTML-300x169.png 300w, https:\/\/sites.wp.odu.edu\/sgros\/wp-content\/uploads\/sites\/38690\/2025\/09\/10588_2020_9322_Fig1_HTML-768x433.png 768w, https:\/\/sites.wp.odu.edu\/sgros\/wp-content\/uploads\/sites\/38690\/2025\/09\/10588_2020_9322_Fig1_HTML-533x300.png 533w, https:\/\/sites.wp.odu.edu\/sgros\/wp-content\/uploads\/sites\/38690\/2025\/09\/10588_2020_9322_Fig1_HTML.png 1381w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: https:\/\/link.springer.com\/article\/10.1007\/s10588-020-09322-9\/figures\/1<\/figcaption><\/figure>\n\n\n\n<p>Geopolitics and military action is a social matter of nations, and cybersecurity helps protect important information in these interactions.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"450\" src=\"https:\/\/sites.wp.odu.edu\/sgros\/wp-content\/uploads\/sites\/38690\/2025\/09\/air-force-cyber.jpg\" alt=\"\" class=\"wp-image-344\" style=\"width:396px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/sgros\/wp-content\/uploads\/sites\/38690\/2025\/09\/air-force-cyber.jpg 625w, https:\/\/sites.wp.odu.edu\/sgros\/wp-content\/uploads\/sites\/38690\/2025\/09\/air-force-cyber-300x216.jpg 300w, https:\/\/sites.wp.odu.edu\/sgros\/wp-content\/uploads\/sites\/38690\/2025\/09\/air-force-cyber-417x300.jpg 417w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><figcaption class=\"wp-element-caption\">Source: https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/<\/figcaption><\/figure>\n\n\n\n<p>Cybersecurity intersects with politics, which is why I think we need societal leaders aware of cybersecurity challenges and willing to work with cybersecurity specialists on it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/cdn.cfr.org\/sites\/default\/files\/styles\/slide_3_2\/public\/image\/2015\/02\/RTR4LBOL-POTUS-NCCIC.webp\" alt=\"\" style=\"width:467px;height:auto\" \/><figcaption class=\"wp-element-caption\">Source: https:\/\/www.cfr.org\/blog\/cybersecurity-legislation-congress-three-things-know<\/figcaption><\/figure>\n\n\n\n<p>Economics is a major field of social sciences and the interplay between economic and cybersecurity goes both ways. Economic policies and uncertainties impact how cybersecurity teams operate.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/assets.techrepublic.com\/uploads\/2023\/05\/hero_hackerone-cybersecurity-teams-economic-impact-770x508.jpeg\" alt=\"\" style=\"width:481px;height:auto\" \/><figcaption class=\"wp-element-caption\">Source: https:\/\/www.techrepublic.com\/article\/hackerone-cybersecurity-teams-economic-impact\/<\/figcaption><\/figure>\n\n\n\n<p>Spearfishing, a mix of social engineering and directed phishing, has grown exponentially more dangerous due to the rise of AI. Learning social behaviors and how it influences cybersecurity can help a person prevent themselves from falling to AI Spearfishing.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/phishing_header.jpg\" alt=\"\" style=\"width:487px;height:auto\" \/><figcaption class=\"wp-element-caption\">Source: https:\/\/www.malwarebytes.com\/blog\/news\/2025\/01\/ai-supported-spear-phishing-fools-more-than-50-of-targets<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Article Reviews<\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-sgros wp-block-embed-sgros\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Kv9jjmyF4f\"><a href=\"https:\/\/sites.wp.odu.edu\/sgros\/it-cyse-200t\/cyse201s-cybersecurity-and-the-social-sciences\/cyse201s-article-reviews\/\">Article #1 Review: Exploring the Psychological Profile of Cybercriminals: A Comprehensive Review for Improved Cybercrime Prevention<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Article #1 Review: Exploring the Psychological Profile of Cybercriminals: A Comprehensive Review for Improved Cybercrime Prevention&#8221; &#8212; sgros\" src=\"https:\/\/sites.wp.odu.edu\/sgros\/it-cyse-200t\/cyse201s-cybersecurity-and-the-social-sciences\/cyse201s-article-reviews\/embed\/#?secret=szSA72cVgV#?secret=Kv9jjmyF4f\" data-secret=\"Kv9jjmyF4f\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n<\/div><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-sgros wp-block-embed-sgros\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"7hyNFhfonb\"><a href=\"https:\/\/sites.wp.odu.edu\/sgros\/it-cyse-200t\/cyse201s-cybersecurity-and-the-social-sciences\/article-review-2-development-of-a-new-human-cyber-resilience-scale\/\">Article Review #2 &#8211; Development of a New \u2018Human Cyber-Resilience Scale\u2019<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Article Review #2 &#8211; Development of a New \u2018Human Cyber-Resilience Scale\u2019&#8221; &#8212; sgros\" src=\"https:\/\/sites.wp.odu.edu\/sgros\/it-cyse-200t\/cyse201s-cybersecurity-and-the-social-sciences\/article-review-2-development-of-a-new-human-cyber-resilience-scale\/embed\/#?secret=JscOGZigZ8#?secret=7hyNFhfonb\" data-secret=\"7hyNFhfonb\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Professional Career Paper<\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-sgros wp-block-embed-sgros\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"rbbIThEelq\"><a href=\"https:\/\/sites.wp.odu.edu\/sgros\/cyse-201s-the-identity-and-access-manager-a-social-science-perspective\/\">CYSE 201S &#8211; The Identity and Access Manager: A Social Science Perspective<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 201S &#8211; The Identity and Access Manager: A Social Science Perspective&#8221; &#8212; sgros\" src=\"https:\/\/sites.wp.odu.edu\/sgros\/cyse-201s-the-identity-and-access-manager-a-social-science-perspective\/embed\/#?secret=Uh5BttAFP5#?secret=rbbIThEelq\" data-secret=\"rbbIThEelq\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Presentation<\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-sgros wp-block-embed-sgros\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"uRjsvNhcl3\"><a href=\"https:\/\/sites.wp.odu.edu\/sgros\/cyse201s-cybersecurity-and-social-engineering-presentation\/\">CYSE201S &#8211; Cybersecurity and Social Engineering Presentation<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE201S &#8211; Cybersecurity and Social Engineering Presentation&#8221; &#8212; sgros\" src=\"https:\/\/sites.wp.odu.edu\/sgros\/cyse201s-cybersecurity-and-social-engineering-presentation\/embed\/#?secret=jdJ7wJIUYl#?secret=uRjsvNhcl3\" data-secret=\"uRjsvNhcl3\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>This course provides an overview of Cybersecurity through a Social Science Lens. Cybersecurity is typically conceived as a technical topic. In reality, the topic is fundamentally a multi-disciplinary and interdisciplinary area, and some aspects of the topic are best understood through a social science lens. This course addresses the social, political, legal, criminological, and economic&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sgros\/it-cyse-200t\/cyse201s-cybersecurity-and-the-social-sciences\/\">Read More<\/a><\/div>\n","protected":false},"author":30648,"featured_media":0,"parent":91,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/pages\/331"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/users\/30648"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/comments?post=331"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/pages\/331\/revisions"}],"predecessor-version":[{"id":421,"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/pages\/331\/revisions\/421"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/pages\/91"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/media?parent=331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}