{"id":284,"date":"2024-09-18T20:57:36","date_gmt":"2024-09-18T20:57:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/swood\/?page_id=284"},"modified":"2024-12-08T19:22:59","modified_gmt":"2024-12-08T19:22:59","slug":"cyse-201s-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/swood\/cyse-201s-2\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Course Introduction :-<\/strong><\/h3>\n\n\n\n<p>Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-disciplinary, and some aspects of the topic are best understood through a social science lens.&nbsp; This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework.&nbsp; Students are introduced to a human-factors approach to understanding cybersecurity threats.&nbsp; Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the behaviors of those who create risks in cybersecurity incidents.&nbsp; The class also explores how cybersecurity is studied by social scientists in psychology, political science, criminology, economics, sociology, international studies, and other social science disciplines.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Learning Outcomes :-&nbsp;<\/strong><\/h3>\n\n\n\n<p>After completing this class, students will be able to:<\/p>\n\n\n\n<ul>\n<li>Compare how basic psychological, sociological, criminological, political, economic, and legal theories and models explain cybersecurity&nbsp;<\/li>\n\n\n\n<li>Identify the strengths and weaknesses of those theories in understanding the connections between human behaviors and cybersecurity<\/li>\n\n\n\n<li>Define key concepts including cybersecurity, cybercrime, cyber criminology, cyber law, digital forensics, human factors, cyber policy, cyber risk, cyber threats, and cyberwar.<\/li>\n\n\n\n<li>Identify how professionals in various cybersecurity careers apply these multidisciplinary concepts in their daily routines<\/li>\n\n\n\n<li>Describe how hypotheses and research questions are formed in studies addressing cybersecurity through a social science lens<\/li>\n\n\n\n<li>Describe how data are collected, measured, and analyzed in studies addressing cybersecurity through a social science lens<\/li>\n\n\n\n<li>Identify how marginalized groups have confronted challenges and concerns related to cybersecurity as well as how these groups have contributed to our understanding about the topic.<\/li>\n\n\n\n<li>Explain how the application of social science theories, principles, and research strategies have contributed to our understanding of cybersecurity at the societal level.<\/li>\n<\/ul>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">Journal Entries<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><em><strong>Journal Entry: 1<\/strong><\/em><\/h2>\n\n\n\n<p>Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"140\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk1-1024x140.png\" alt=\"\" class=\"wp-image-343\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk1-1024x140.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk1-300x41.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk1-768x105.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk1-600x82.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk1.png 1304w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><em><strong>Journal Entry: 2<\/strong><\/em><\/h2>\n\n\n\n<p>Explain how the principles of science relate to cybersecurity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"147\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk2-1024x147.png\" alt=\"\" class=\"wp-image-344\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk2-1024x147.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk2-300x43.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk2-768x111.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk2-600x86.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk2.png 1299w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><em><strong>Journal Entry: 3 <\/strong><\/em><\/h2>\n\n\n\n<p>Visit\u00a0PrivacyRights.org to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches? Enter a paragraph in your journal.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"138\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk3-1024x138.png\" alt=\"\" class=\"wp-image-345\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk3-1024x138.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk3-300x40.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk3-768x103.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk3-600x81.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk3.png 1294w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 4<\/em><\/strong><\/h2>\n\n\n\n<p>Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"112\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk4-1024x112.png\" alt=\"\" class=\"wp-image-346\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk4-1024x112.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk4-300x33.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk4-768x84.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk4-600x66.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk4.png 1288w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 5<\/em><\/strong><\/h2>\n\n\n\n<p>Review the articles linked with each individual motive in the presentation page or Slide #4.\u00a0 Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).\u00a0 Explain why you rank each motive the way you rank it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"301\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk5-1024x301.png\" alt=\"\" class=\"wp-image-347\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk5-1024x301.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk5-300x88.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk5-768x225.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk5-600x176.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk5.png 1291w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 6<\/em><\/strong><\/h2>\n\n\n\n<p>Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Note: Don\u2019t generate\/access or click on any unwanted\/fake websites on your web browsers. Showcase with examples, what makes the fake websites fake.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"235\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_1-1024x235.png\" alt=\"\" class=\"wp-image-348\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_1-1024x235.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_1-300x69.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_1-768x176.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_1-600x138.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_1.png 1291w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 7<\/em><\/strong><\/h2>\n\n\n\n<p>Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"732\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk7.png\" alt=\"\" class=\"wp-image-349\" style=\"width:808px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk7.png 819w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk7-300x268.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk7-768x686.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk7-336x300.png 336w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 8<\/em><\/strong><\/h2>\n\n\n\n<p>Watch this video and pay attention to the way that movies distort hackers.<br>Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? <\/p>\n\n\n\n<p>After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"202\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk8-1024x202.png\" alt=\"\" class=\"wp-image-350\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk8-1024x202.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk8-300x59.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk8-768x151.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk8-600x118.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk8.png 1356w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 9 <\/em><\/strong><\/h2>\n\n\n\n<p>Watch this Video:<\/p>\n\n\n\n<p>Social media and cybersecurity.<\/p>\n\n\n\n<p>Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"120\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk9-1024x120.png\" alt=\"\" class=\"wp-image-351\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk9-1024x120.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk9-300x35.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk9-768x90.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk9-600x70.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk9.png 1293w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 10<\/em><\/strong><\/h2>\n\n\n\n<p>Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/p>\n\n\n\n<p>https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"118\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk10-1024x118.png\" alt=\"\" class=\"wp-image-352\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk10-1024x118.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk10-300x34.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk10-768x88.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk10-600x69.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk10.png 1306w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 11<\/em><\/strong><\/h2>\n\n\n\n<p>Watch this video. As you watch the video<br>https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"91\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk11-1024x91.png\" alt=\"\" class=\"wp-image-353\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk11-1024x91.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk11-300x27.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk11-768x68.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk11-600x53.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk11.png 1293w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 12<\/em><\/strong><\/h2>\n\n\n\n<p>Read this https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf. sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"169\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk12-1024x169.png\" alt=\"\" class=\"wp-image-354\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk12-1024x169.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk12-300x49.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk12-768x127.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk12-600x99.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk12.png 1287w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 13<\/em><\/strong><\/h2>\n\n\n\n<p>A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost\/benefits principles. Read this article https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"164\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk13-1024x164.png\" alt=\"\" class=\"wp-image-355\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk13-1024x164.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk13-300x48.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk13-768x123.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk13-600x96.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wk13.png 1296w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 14<\/em><\/strong><\/h2>\n\n\n\n<p>Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"120\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_2-1024x120.png\" alt=\"\" class=\"wp-image-356\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_2-1024x120.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_2-300x35.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_2-768x90.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_2-600x71.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_2.png 1302w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Journal Entry: 15<\/em><\/strong><\/h2>\n\n\n\n<p>Digital Forensics | Davin Teo | TEDxHongKongSalon<br>\u2013 YouTube<\/p>\n\n\n\n<p>Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to his career.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"142\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_3-1024x142.png\" alt=\"\" class=\"wp-image-357\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_3-1024x142.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_3-300x42.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_3-768x106.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_3-600x83.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/Screenshot_3.png 1292w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">Article Reviews<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><em><strong>Article Review #1<\/strong><\/em><\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-Article20Review2023120-20SW2028129.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Article20Review2023120-20SW2028129.\"><\/object><a id=\"wp-block-file--media-43f87f25-3c9c-45e3-97b3-6b73df55947b\" href=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-Article20Review2023120-20SW2028129.pdf\">annotated-Article20Review2023120-20SW2028129<\/a><a href=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-Article20Review2023120-20SW2028129.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-43f87f25-3c9c-45e3-97b3-6b73df55947b\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Article Review #2<\/em><\/strong><\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-Article20Review20232.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Article20Review20232.\"><\/object><a id=\"wp-block-file--media-f7198c8c-cddb-4691-a97d-8d8b0152d8c3\" href=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-Article20Review20232.pdf\">annotated-Article20Review20232<\/a><a href=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-Article20Review20232.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f7198c8c-cddb-4691-a97d-8d8b0152d8c3\">Download<\/a><\/div>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">Career Paper<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-Career20Paper20-20Samuel20Woodruff.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Career20Paper20-20Samuel20Woodruff.\"><\/object><a id=\"wp-block-file--media-abf65fee-ad83-4755-8b98-db4d48bd59ea\" href=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-Career20Paper20-20Samuel20Woodruff.pdf\">annotated-Career20Paper20-20Samuel20Woodruff<\/a><a href=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-Career20Paper20-20Samuel20Woodruff.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-abf65fee-ad83-4755-8b98-db4d48bd59ea\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Course Introduction :- Cybersecurity is typically conceived as a technical topic. In reality, the topic is multi-disciplinary, and some aspects of the topic are best understood through a social science lens.&nbsp; This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework.&nbsp; Students are introduced to a human-factors&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/swood\/cyse-201s-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29383,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/pages\/284"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/users\/29383"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/pages\/284\/revisions"}],"predecessor-version":[{"id":341,"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/pages\/284\/revisions\/341"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/media?parent=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}