CYSE201S

Article 1 Review:

Social science principles are related to the study of cybersecurity practices during the COVID-19 pandemic because it looks at the interactions between human behaviors, societal institutions, and organizational cultures. It asked questions on the meaning of cybersecurity in a remote setting, the learning processes involved, and the lived experiences of the participants. Semi-structured interviews with 27 Australian employees were used in the study to collect qualitative data using interpretive phenomenological analysis (IPA). The examination of the data uncovered themes related to disruption, inadequate direction, new dangers, and the value of social learning. The experiences and opinions of participants on cybersecurity are reflective of concepts covered in class, such as the social construction of knowledge and the influence of culture on behavior. The subject also discusses the difficulties marginalized people encounter, such as uneven access to resources and assistance can make someone feel more exposed and anxious in online environments. In the end, the study benefits society by highlighting the need of customized cybersecurity strategies that take into account a range of experiences and encourage a shared responsibility culture. This encourages a safer digital environment for all workers, particularly those who might be more vulnerable because of a lack of resources or support.

Work Cited:
Monica T Whitty, Nour Moustafa, Marthie, Cybersecurity when working from home during COVID-19: considering the human factors, Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae001

Career Paper:

Christopher Agyei
Professor Woodbury
CYSE201S
10/28/2024

Cybersecurity Analyst: A Social Science Perspective

Cybersecurity analysts play a critical role in any organization that seeks to defend itself
against cyber threats. These professionals utilize social science research and theories, which
include psychology, sociology, and the behavioral sciences. This enables them to comprehend
behavior, predict risk, and weigh the potential problems that could impact society. Furthermore,
the present paper aims to investigate how cybersecurity analysts employ social science
knowledge, not only by mentioning and excluding the work of minoritized people, but also by
considering the impact of their approach on society as a whole.
Among the essential parts of cybersecurity that I believe are linked with social science is
the study of man, especially the attacker. Other examples include analyzing social science
research to determine the reasons behind a specific individual’s decision to commit cybercrimes,
which enables analysts to forecast the potential threats. Cybersecurity analysts should be
interested in updating themselves with behavior patterns described in social science research
concerning attackers (Mashiane & Kritzinger, 2021). Therefore, this would enhance analysts’
comprehension of psychological threats and the development of countermeasures that take into
account the unique characteristics of a cyberattack.
In this case, another application of social science involves person-centered exercises in
the formation and administration of cyberspace security. Most security analysts commonly
utilize theories from sociology and human-computer interaction to create new security solutions
that are easy to explain and implement (Dall’Acqua, 2019). Similarly, other findings from the
sphere of social sciences suggest that regular users, especially those who lack technical skills or
are an identified vulnerable population, struggle to comprehend or complete security tasks.
However, cybersecurity analysts need to develop protocols that are easy to implement, as they
may choose to opt out of the practice if they encounter numerous barriers or complexities
associated with the regulations supported by the law (Dall’Acqua, 2019). Analysts suggest that
making systems easy to use for researchers positively contributes to security, but researchers also
raise the matter of diversity.
Historically, social science principles have been incorporated into the formulation of
policies aimed at protecting vulnerable groups. For example, the contributions of women,
youth/children, racial minorities, low-income earners, and the elderly within a society are always
more vulnerable than those of any other individual. This is because these groups rarely have the
opportunity to learn about cyber threats, let alone acquire the necessary tools to combat such
malicious acts (Mongeau, 2021). Organizations may hire strategic consultants to develop plans to
design unique programs to educate various groups, as discovered by the social sciences.
Cybersecurity analysts occasionally work in conjunction with other departments to create
organizational policies that promote a welcoming and inclusive information technology culture.
Therefore, analysts apply theories from organizational psychology and social theories to enhance
their capability to anticipate workplace actions and enhance compliance with cybersecurity
policies (Mongeau, 2021). These principles aid in overcoming social and organizational
resistance, as analysts explain to staff that they are essential for ensuring the cybersecurity of
enterprise resources. It also aids in tailoring the training to the specific needs of the employees.

Thus, cybersecurity analysts’ daily operations do not stop at technological knowledge, as
the social issue also forms part of the threat and the end-user interface. Analysts use sociology
concepts and perspectives to improve ways of safeguarding persons through cybersecurity,
whether deserving or not. Analysts use social science not only to predict and prevent cyber
threats, but also to develop ethical, moral, and socially just security measures for the
development of secure, centralized technology worldwide.

Work Cited
Dall’Acqua, L. (2019). Scientific Intelligence, Decision Making, and Cyber-Security.
In Forecasting and Managing Risk in the Health and Safety Sectors (pp. 21-51). IGI
Global.
Mashiane, T., & Kritzinger, E. (2021). Identifying behavioral constructs about user cybersecurity
behavior. Eurasian Journal of Social Sciences, 9(2), 98-122.
Mongeau, S. A. (2021). Cybersecurity Data Science. Springer International Publishing

Journal Entries:

Module 2:

How does the principle of determinism relate to computer hacking?

To carry out assaults with consistency, they take use of deterministic processes, such as known software behavior or algorithms. Because of this predictability, hackers are able to create recurrent plans for breaking into systems.

Module 14:

Why do you think individuals don’t report cybercrime victimization?

I think people don’t report cybercrime victimization because of social barriers. A common reason is embarrassment, particularly in cases involving scams, where victims may feel ashamed or fear judgment from others. this experience can lead to emotional distress, self-blame, and a reluctance to seek help. Cybercrimes often involve technical and cross-border issues, making resolution challenging. For instance, the Open University highlights that victims of cyber-enabled scams often experience emotional and financial distress but avoid seeking help due to a fear of victim-blaming or lack of support. To counteract these issues, raising awareness, providing better support systems, and improving reporting infrastructure should be our next steps.

https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-3Links to an external site.