{"id":414,"date":"2025-11-30T00:46:22","date_gmt":"2025-11-30T00:46:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/?page_id=414"},"modified":"2025-11-30T00:46:22","modified_gmt":"2025-11-30T00:46:22","slug":"cybersecurity-professional-career-paper-cybersecurity-analysts-applying-social-science-research-and-principles","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/cybersecurity-professional-career-paper-cybersecurity-analysts-applying-social-science-research-and-principles\/","title":{"rendered":"Cybersecurity Professional Career Paper: Cybersecurity Analysts Applying Social Science Research and Principles"},"content":{"rendered":"\n<p style=\"font-size:14px\"><strong>Introduction<\/strong><br>The Cybersecurity industry has various career roles designed to protect digital systems<br>and networks. As cyber attacks have become more frequent, the role of a cybersecurity analyst is<br>increasingly vital in protecting systems and networks. Cybersecurity analyst, a role involved in<br>monitoring networks, maintaining software, checking for security vulnerabilities, and developing<br>security standards. The purpose of this paper is to analyze how cybersecurity analysts apply<br>social science research and principles to their daily professional routine, focusing on key<br>concepts such as Objectivity and Ethical Neutrality, Human Factors, and Cyberpsychology.<\/p>\n\n\n\n<p style=\"font-size:14px\"><strong>Social Science Principles<\/strong><br>Social science principles are a significant aspect of a cybersecurity analyst&#8217;s career, as<br>they help them understand and recognize human factors in cyberspace. Analysts regularly apply<br>behavioral analysis to understand hacking motivations, such as financial gain or thrill-seeking, as<br>well as ethical issues, such as balancing surveillance with privacy rights, relating to ethical<br>Neutrality. Understanding cognitive biases from behavioral economics helps analysts understand<br>and predict why employees might bypass protocols or abandon them entirely.<br>Analysts utilize social science principles, such as Objectivity, to make objective decisions<br>based on facts and evidence rather than opinions. Objectivity is central to the role of a<br>cybersecurity analyst, as it requires objectively analyzing incidents, auditing systems, monitoring<br>networks, and responding to attacks. The incorporation of Objectivity improves cybersecurity<br>professionals&#8217; ability to validate information by using established methods and standards to<br>verify its accuracy and reliability before accepting it as factual. (Gauth, 2025).<\/p>\n\n\n\n<p style=\"font-size:14px\"><strong>Application of Key Concepts<\/strong><\/p>\n\n\n\n<p style=\"font-size:14px\">Concepts from modules 2 and 4 relate to the daily duties of a cybersecurity analyst and to<br>the principles of social sciences and cybersecurity (module 2: Objectivity and Ethical<br>Neutrality). Objectivity is essential to this profession because it enables fact-based decisions in<br>creating adequate security measures. Ethical Neutrality aligns with Objectivity because it focuses<br>on fairness and impartiality to uphold security and privacy standards.<br>In Module 4, the field of cybersecurity is directly affected by human factors, given the<br>role of a cybersecurity analyst and the effects humans have on security. Cyberpsychology also<br>relates to this profession, understanding how the technology created affects users&#8217; thinking and<br>decision-making to develop security that is adaptable to humans. &#8220;Applying the science of<br>psychology to cybersecurity helps cybersecurity professionals understand where, how, and why<br>they are falling short in building a security program that works, experts say. We need to design<br>security with people in mind because if security does not work for people, it just does not work.&#8221;<br>(Pratt, 2023).<\/p>\n\n\n\n<p style=\"font-size:14px\"><strong>Marginalization<\/strong><br>Cybersecurity analysts have an impact on marginalized groups, often experiencing cyber<br>attacks due to a lack of digital literacy, systemic inequities, affordability, and discriminatory<br>practices. Analysts are in place to confront attacks by incorporating social science principles.<br>Low-income and minority communities face sorts of vulnerabilities; for example, people who<br>lack digital literacy are more likely to fall for phishing attacks.<br>Professionals addressed these issues by partnering with organizations that work with<br>companies to implement \u201cprotective features for high-risk users, strengthen safety measures,<br>improve content moderation, invest in other languages, and enforce policies against<br>disinformation and deepfakes\u201d. (Aljizawi et al., 2024).<\/p>\n\n\n\n<p style=\"font-size:14px\"><strong>Career Connection to Society<\/strong><br>Cybersecurity analysts contribute to society by protecting critical infrastructure, such as<br>healthcare records, ensuring digital safety and privacy, safeguarding financial systems, and<br>protecting the economy from disruptions, as well as growing the economy through high demand<br>and well-paid opportunities. (Halladay, 2021).<\/p>\n\n\n\n<p style=\"font-size:14px\"><strong>Scholarly Journal Articles<\/strong><br>The article explains social cybersecurity as a computational social science discipline,<br>stating that tools such as network analysis, data science, machine learning, natural language<br>processing, and agent-based simulation are employed to provide evidence on who is<br>manipulating social media. Key findings reveal how online platforms enable large-scale<br>cybercrime, with immediate applications for analysts in predicting influence campaigns. (Carley,<br>2020), directly tying it to class concepts such as Culture, Social Media, and Cybersecurity.<br>The study supports the idea that including psychology in workforce development,<br>technical skills, and social metrics can improve performance more than technical skills alone.<br>(Dawson &amp; Thomson, 2018) It supports the analysis of social science principles by highlighting<br>the user&#8217;s role in defense.<br>This article highlights the role of cybersecurity analysts as more than just technical<br>experts, but as security for society, as marginalized groups face digital attacks. Analysts work to<br>protect by detecting threats and safeguarding against internet dangers. Safeguarding sensitive<br>information, mitigating risks and cybersecurity issues, preserving privacy, and maintaining the<br>integrity of critical systems and infrastructure are ways in which cybersecurity professionals<br>impact society. (Malone, 2025)<\/p>\n\n\n\n<p style=\"font-size:14px\"><strong>Conclusion<\/strong><br>In conclusion, a cybersecurity analyst&#8217;s career involves applying social science principles<br>and technical skills to perform their duties. Applying class concepts such as Objectivity and<br>Ethical Neutrality, transform the methods used to confront vulnerabilities and threats.<\/p>\n\n\n\n<p style=\"font-size:12px\"><strong>References<\/strong><br>(2025, August 28). Information Security Analysts. U.S BUREAU OF LABOR STATISTICS.<br>Retrieved November 14, 2025, from<br>https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-anal<br>ysts.htm<\/p>\n\n\n\n<p style=\"font-size:12px\"><br>Sachs, D. (2023, June 6). The Tricky Mind Games of Cognitive Biases in Information Security.<br>Https:\/\/www.Cybersecuritytribe.com\/. Retrieved November 14, 2025, from<br>https:\/\/www.cybersecuritytribe.com\/articles\/the-tricky-mind-games-of-cognitive-biases-i<br>n-information-security<\/p>\n\n\n\n<p style=\"font-size:12px\"><br>Team, L. L. (2025, February 4). A Day in the Life of a Cyber Security Analyst.<br>Https:\/\/Lumifylearn.com\/. Retrieved November 14, 2025, from<br>https:\/\/lumifylearn.com\/blog\/blog-a-day-in-the-life-of-a-cyber-security-analyst\/#:~:text=<br>Morning,wrapping%20up%20for%20the%20day, wrapping up for the day,<\/p>\n\n\n\n<p style=\"font-size:12px\"><br>Pratt, M. K. (2023, June 3). Why cyberpsychology is such an important part of effective<br>cybersecurity. Https:\/\/www.Csoonline.com\/. Retrieved November 14, 2025, from<br>https:\/\/www.csoonline.com\/article\/643967\/why-cyberpsychology-is-such-an-important-p<br>art-of-effective-cybersecurity.html<a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.cybersecuritytribe.com\/articles\/the-tricky-mind-games-of-cognitive-biases-in-information-security\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.cybersecuritytribe.com\/articles\/the-tricky-mind-games-of-cognitive-biases-in-information-security\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/lumifylearn.com\/blog\/blog-a-day-in-the-life-of-a-cyber-security-analyst\/#:~:text=Morning,wrapping%20up%20for%20the%20day\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/lumifylearn.com\/blog\/blog-a-day-in-the-life-of-a-cyber-security-analyst\/#:~:text=Morning,wrapping%20up%20for%20the%20day\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.csoonline.com\/article\/643967\/why-cyberpsychology-is-such-an-important-part-of-effective-cybersecurity.html\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.csoonline.com\/article\/643967\/why-cyberpsychology-is-such-an-important-part-of-effective-cybersecurity.html\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p style=\"font-size:12px\"><br>(2025, April 26). Why Are Marginalized Groups Most Affected by the Digital Divide?<br>Https:\/\/Climate.Sustainability-Directory.com\/. Retrieved November 14, 2025, from<br>https:\/\/climate.sustainability-directory.com\/question\/why-are-marginalized-groups-most-<br>affected-by-digital-divide\/<\/p>\n\n\n\n<p style=\"font-size:12px\"><br>Aljizawi, N., Lawford, N., &amp; Bocu, G. (2024, September 30). Enhancing cybersecurity resilience<br>for transnational dissidents. CLTC.<br>https:\/\/cltc.berkeley.edu\/publication\/cyber-resilience-for-transnational-dissidents\/#:~:text<br>=They%20also%20recommend%20that%20technology,security%20and%20advocacy%2<br>0for%20freedom.%E2%80%9D<\/p>\n\n\n\n<p style=\"font-size:12px\"><br>Dawson, J., &amp; Thomson, R. (2018, June 11). The Future Cybersecurity Workforce: Going<br>Beyond Technical Skills for Successful Cyber Performance. Frontiers in Psychology.<br>Retrieved November 14, 2025, from<br>https:\/\/www.frontiersin.org\/journals\/psychology\/articles\/10.3389\/fpsyg.2018.00744\/full<\/p>\n\n\n\n<p style=\"font-size:12px\"><br>Malone, B. (2025). The Growing Importance of a Career in Cyber Security. Colorado Christian<br>University. Retrieved November 14, 2025, from<br>https:\/\/www.ccu.edu\/blogs\/cags\/category\/business\/the-growing-importance-of-a-career-in<br>-cyber-security\/<\/p>\n\n\n\n<p style=\"font-size:12px\"><br>Halladay, K. (2021, November 17). What is an Information Security Analyst? What Do They Do?<br>Https:\/\/Builtin.com\/. https:\/\/builtin.com\/articles\/information-security-analyst<a href=\"https:\/\/climate.sustainability-directory.com\/question\/why-are-marginalized-groups-most-affected-by-digital-divide\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/climate.sustainability-directory.com\/question\/why-are-marginalized-groups-most-affected-by-digital-divide\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/cltc.berkeley.edu\/publication\/cyber-resilience-for-transnational-dissidents\/#:~:text=They%20also%20recommend%20that%20technology,security%20and%20advocacy%20for%20freedom.%E2%80%9D\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/cltc.berkeley.edu\/publication\/cyber-resilience-for-transnational-dissidents\/#:~:text=They%20also%20recommend%20that%20technology,security%20and%20advocacy%20for%20freedom.%E2%80%9D\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/cltc.berkeley.edu\/publication\/cyber-resilience-for-transnational-dissidents\/#:~:text=They%20also%20recommend%20that%20technology,security%20and%20advocacy%20for%20freedom.%E2%80%9D\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.frontiersin.org\/journals\/psychology\/articles\/10.3389\/fpsyg.2018.00744\/full\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.ccu.edu\/blogs\/cags\/category\/business\/the-growing-importance-of-a-career-in-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.ccu.edu\/blogs\/cags\/category\/business\/the-growing-importance-of-a-career-in-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/builtin.com\/articles\/information-security-analyst\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p style=\"font-size:12px\"><br>https:\/\/www.gauthmath.com\/solution\/1831312691765265\/How-does-objectivity-enhance-critical-<br>thinking-for-cybersecurity-professionals-I<a href=\"https:\/\/www.gauthmath.com\/solution\/1831312691765265\/How-does-objectivity-enhance-critical-thinking-for-cybersecurity-professionals-I\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IntroductionThe Cybersecurity industry has various career roles designed to protect digital systemsand networks. As cyber attacks have become more frequent, the role of a cybersecurity analyst isincreasingly vital in protecting systems and networks. Cybersecurity analyst, a role involved inmonitoring networks, maintaining software, checking for security vulnerabilities, and developingsecurity standards. The purpose of this paper is &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/cybersecurity-professional-career-paper-cybersecurity-analysts-applying-social-science-research-and-principles\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cybersecurity Professional Career Paper: Cybersecurity Analysts Applying Social Science Research and Principles<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":31393,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/pages\/414"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/users\/31393"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/comments?post=414"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/pages\/414\/revisions"}],"predecessor-version":[{"id":419,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/pages\/414\/revisions\/419"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/media?parent=414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}