{"id":374,"date":"2024-06-01T16:58:14","date_gmt":"2024-06-01T16:58:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/thein001\/?page_id=374"},"modified":"2024-08-02T00:09:37","modified_gmt":"2024-08-02T00:09:37","slug":"cyuse-201s-cybersecurity-and-social-science","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/thein001\/cyuse-201s-cybersecurity-and-social-science\/","title":{"rendered":"CYSE 201S &#8211; Cybersecurity and Social Science"},"content":{"rendered":"\n<p>Course Description:<br>The course will provide a comprehensive overview of how social, psychological, economic, and political factors influence and are influenced by cybersecurity practices, policies, and technologies.<\/p>\n\n\n\n<p><strong>JOURNALS<\/strong><\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-b2429419-3238-43cf-a705-3db56abd53a3\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/06\/Journal-Entry-1-1.docx\" target=\"_blank\" rel=\"noreferrer noopener\">Journal Entry Module 1: NICE Workforce Framework<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/06\/Journal-Entry-1-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b2429419-3238-43cf-a705-3db56abd53a3\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-972d90a0-d7af-4710-911d-f134cf0e4ff7\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/06\/Journal-Entry-2-1.docx\">Journal Entry Module 2: Principles of Science<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/06\/Journal-Entry-2-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-972d90a0-d7af-4710-911d-f134cf0e4ff7\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-6af885e4-456a-416e-b6ce-543b0fdcf05c\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/06\/Journal-Entry-3.docx\">Journal Entry Module 3: PrivacyRights.Org<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/06\/Journal-Entry-3.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6af885e4-456a-416e-b6ce-543b0fdcf05c\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-c3aceb0c-2e09-4e73-ac57-1187d9d7e83a\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/06\/Journal-Entry-4.docx\">Journal Entry Module 4: Maslow&#8217;s Hierarchy of Needs<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/06\/Journal-Entry-4.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c3aceb0c-2e09-4e73-ac57-1187d9d7e83a\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-d27e58b7-1dd5-4846-911b-73c7b0b40223\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/06\/Journal-Entry-5.docx\">Journal Entry Module 5: Motivators of Cyber-Offenders<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/06\/Journal-Entry-5.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d27e58b7-1dd5-4846-911b-73c7b0b40223\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-f6d75141-230c-4e98-9422-b6b8aedf96ab\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-6.docx\">Journal Entry Module 6: Misconceptions of Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-6.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f6d75141-230c-4e98-9422-b6b8aedf96ab\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-28ac3316-317b-4f73-98c3-e8389c747b0a\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-Module-8.docx\">Journal Entry Module 8: Media and Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-Module-8.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-28ac3316-317b-4f73-98c3-e8389c747b0a\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-86857223-84c3-46b9-a7ca-d6ef9c832c87\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-10-part-2.docx\">Journal Entry Module 10 Part 2: Social Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-10-part-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-86857223-84c3-46b9-a7ca-d6ef9c832c87\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-376aa79d-8b73-4317-8974-61a2a5ea777a\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-entry-10-part-1.docx\">Journal Entry Module 10 Part  1: Cybersecurity Job Analysis <\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-entry-10-part-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-376aa79d-8b73-4317-8974-61a2a5ea777a\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-bd8a806e-c078-4497-96c8-84fb9a289362\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-11-Part-1.docx\">Journal Entry Module 11 Part 1: Sample Data Breach<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-11-Part-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-bd8a806e-c078-4497-96c8-84fb9a289362\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-874c6fdd-17f5-47f0-b4b9-055d9921bee0\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-11-Part-2.docx\">Journal Entry Module 11 Part 2: HackerOne Bug Bounties<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-11-Part-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-874c6fdd-17f5-47f0-b4b9-055d9921bee0\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-4c65c6ac-c133-4df2-9e7e-cc423f996112\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-12.docx\">Journal Entry Module 12: Internet Activities Which May be Illegal<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/07\/Journal-Entry-12.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4c65c6ac-c133-4df2-9e7e-cc423f996112\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-da5078cf-f805-46a2-8c49-aad61d7a4afa\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/08\/Journal-Entry-14.docx\">Journal Entry Module 14: David Teo&#8217;s Ted Talk<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/08\/Journal-Entry-14.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-da5078cf-f805-46a2-8c49-aad61d7a4afa\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-81a9980a-cc05-4813-9e86-7267f15ab3eb\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/08\/Annotated-Bibliography-Finished-Product.docx\">Annotated Bibliography<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/08\/Annotated-Bibliography-Finished-Product.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-81a9980a-cc05-4813-9e86-7267f15ab3eb\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-e0aa2f72-554b-4790-a9db-1870370d32e3\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/08\/Article-Analysis.docx\">Article Analysis: Exploring The Global Geography of Cybercrime and its Driving Forces<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/08\/Article-Analysis.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e0aa2f72-554b-4790-a9db-1870370d32e3\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-22cf496a-35de-4e0e-84fa-6ff051f6512c\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/08\/Career-Paper.docx\">Career Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/08\/Career-Paper.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-22cf496a-35de-4e0e-84fa-6ff051f6512c\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-a866f255-899d-4a31-a71f-f176bdd91fd3\" href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/08\/Journal-Entry-9.docx\">Journal Entry Module 9: Patterns and Social Media<\/a><a href=\"https:\/\/sites.wp.odu.edu\/thein001\/wp-content\/uploads\/sites\/33795\/2024\/08\/Journal-Entry-9.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a866f255-899d-4a31-a71f-f176bdd91fd3\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Course Description:The course will provide a comprehensive overview of how social, psychological, economic, and political factors influence and are influenced by cybersecurity practices, policies, and technologies. JOURNALS<\/p>\n","protected":false},"author":27231,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/thein001\/wp-json\/wp\/v2\/pages\/374"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/thein001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/thein001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thein001\/wp-json\/wp\/v2\/users\/27231"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thein001\/wp-json\/wp\/v2\/comments?post=374"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/thein001\/wp-json\/wp\/v2\/pages\/374\/revisions"}],"predecessor-version":[{"id":454,"href":"https:\/\/sites.wp.odu.edu\/thein001\/wp-json\/wp\/v2\/pages\/374\/revisions\/454"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/thein001\/wp-json\/wp\/v2\/media?parent=374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}