{"id":234,"date":"2024-12-05T17:01:53","date_gmt":"2024-12-05T17:01:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aladj\/?p=234"},"modified":"2024-12-05T17:01:53","modified_gmt":"2024-12-05T17:01:53","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aladj\/2024\/12\/05\/career-paper\/","title":{"rendered":"Career paper"},"content":{"rendered":"\n<p>Cybersecurity and Social Science Principles: Protecting Marginalized Groups and Society<br>Name: Aladj Redwood<br>Date: 11\/23\/24<br>Introduction<br>Cybersecurity professionals are supposed to protect digital assets, data, and networks from<br>malicious activities. However, their roles extend beyond the technical ability in information<br>systems, requiring substantial knowledge in human behavior and social dynamics. The<br>effectiveness of cybersecurity professionals in performing their mandates is influenced by a<br>substantial number of social science research and principles, specially within sociology,<br>psychology, and communication studies. This paper will discuss how cybersecurity<br>careers rely on research and principles of social science, with particular reference to the plight<br>of marginalized groups and society as a whole. Key concepts from social science include social<br>influence, group dynamics, and trust; these will be related to the day-to-day work of<br>cybersecurity professionals.<br>The Role of Social Science in Cybersecurity<br>Cybersecurity is often regarded as a technical domain concerned with programming, encryption,<br>and network defense. However, an increasing focus on human behavior has shifted cybersecurity<br>toward a more interdisciplinary approach. Professionals in the field must understand how people<br>interact with technology, how social structures influence behavior, and how societal norms affect<br>digital interactions. These insights are often grounded in social science research, which is critical<br>to mitigating risks posed by human actions, whether intentional (e.g., insider threats) or<br>accidental (e.g., human error).<br>The Influence of Social Sciences Principles in Cybersecurity<br>Understanding User Behavior: Psychology<br>The most important ways in which cybersecurity borrows from the theories of social science<br>relates to an understanding of human psychology. An example is how cybersecurity professionals apply knowledge of social sciences in defending against forms of attack premised on the manipulation of human vulnerabilities,<br>referred to as &#8220;social engineering&#8221;. Social engineers manipulate people in a way that allows<br>them to access systems, and they do this using various psychological means to create urgency, ga<br>in trust, or instill fear. Knowing such psychological triggers also helps cybersecurity<br>professionals train employees on how to recognize phishing attempts or manipulative tactics.<br>The cybersecurity awareness and training also draws extensively from psychological research to<br>understand what motivates users to follow best security practices such<br>as password creation and updating of software. By applying these principles of behavioral<br>psychology, cybersecurity professionals could design more effective training programs that<br>influence user behavior in ways that reduce the chances of security breaches.<br>Sociological Insights into Group Dynamics and Trust<br>Social science, particularly sociology, provides valuable insights into group dynamics and trust.<\/p>\n\n\n\n<p>Trust is essential in any organization, and cybersecurity professionals must ensure that trust in<br>digital environments is maintained. For example, in an organizational setting, employees must<br>trust that their cybersecurity policies and IT systems are secure, while also ensuring that they<br>follow those policies diligently.<br>This also helps sociologists understand how certain groups-<br>a marginalized community, for example-might be targeted by cybercriminals or<br>face particular vulnerabilities. Some groups, such as low-<br>income or elderly populations, have less access to cybersecurity education or<br>technology. Because of this, they could be easy marks for things like identity theft, fraud, or<br>online exploitation. In turn, this understanding allows cybersecurity professionals to<br>design effective interventions and policies protecting those vulnerable populations.<br>Communication and Conflict Resolution<br>Cybersecurity professionals also rely on the ways of communication and conflict resolution<br>strategies, which are core principles in social science. For example, during a data breach<br>or a cyberattack, communicating with the public and affected stakeholders is necessary.<br>Miscommunication leads to mistrust, causing legal consequences and added damage to the<br>reputation an organization would like to uphold.<br>Incident cybersecurity professionals operate within complex social and<br>organizational configurations. This may include how to communicate sensitive<br>information with the intended audience: senior management, affected users, law<br>enforcement, and others, while maintaining transparency without compromising the integrity of<br>the investigation. Conflicts that arise during a cybersecurity crisis should be sorted out by a<br>conflict resolution skill when managing disagreement or tension among stakeholders.<br>Cybersecurity and Marginalized Groups<br>Cybersecurity experts need to be<br>especially considerate of the impact cyber threats have on marginalized groups. Inequity in techn<br>ology access, cybersecurity education, and digital literacy exposes certain<br>populations more than others to online threats. For example, there are racial minorities,<br>immigrants, and people with lower incomes who could fall victim to all forms of cyber<br>exploitation, including data breaches and online fraud. Furthermore, marginalized groups<br>may not report cybercrimes due to fear of discrimination or their lack of confidence in law<br>enforcement.<br>It helps cybersecurity professionals understand such social and cultural vulnerabilities<br>and adopt a more inclusive approach in practice. Policies and interventions to advance digital<br>equity help in setting up an inclusive cybersecurity environment. By applying theories of social<br>science, namely critical theory and social justice, cybersecurity professionals can assert the<br>need for systemic changes that put protection at the forefront for vulnerable groups.<br>Conclusion<\/p>\n\n\n\n<p>For this, cybersecurity needs to be underpinned by knowledge of social science principles.<br>From the psychological insights of human behavior to the sociological research on group<br>dynamics and trust, social sciences enrich the technical area of cybersecurity.<br>By embedding these principles within their practice, cybersecurity<br>professionals are better equipped to protect society against cyber threats, especially the most<br>vulnerable groups. Social sciences also underpin the basis for cybersecurity practices<br>that are considerate of access and education disparities. Since technology is likely to keep<br>changing, integrating social sciences into cybersecurity is going<br>to remain important in ensuring digital environments remain safe, secure, and equitable for all.<br>References<br>Anderson, R., &amp; Moore, T. (2006). The economics of information security. Science, 314(5799), 610-<br>613.<br>Bada, M., Sasse, M. A., &amp; Nurse, J. R. (2019). The role of human behavior in cybersecurity: A<br>systematic review. Computers &amp; Security, 83, 171-187.<br>Solove, D. J. (2007). The Digital Person: Technology and Privacy in the Information Age. NYU Press.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and Social Science Principles: Protecting Marginalized Groups and SocietyName: Aladj RedwoodDate: 11\/23\/24IntroductionCybersecurity professionals are supposed to protect digital assets, data, and networks frommalicious activities. However, their roles extend beyond the technical ability in informationsystems, requiring substantial knowledge in human&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/aladj\/2024\/12\/05\/career-paper\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28242,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts\/234"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/users\/28242"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/comments?post=234"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts\/234\/revisions"}],"predecessor-version":[{"id":235,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts\/234\/revisions\/235"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/media?parent=234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/categories?post=234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/tags?post=234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}