{"id":283,"date":"2024-01-10T00:46:19","date_gmt":"2024-01-10T00:46:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/christopher-agyei\/?page_id=283"},"modified":"2024-12-11T03:27:28","modified_gmt":"2024-12-11T03:27:28","slug":"cyse201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/christopher-agyei\/cyse201s\/","title":{"rendered":"CYSE201S"},"content":{"rendered":"\n<p><strong>Article 1 Review:<\/strong><\/p>\n\n\n\n<p>  Social science principles are related to the study of cybersecurity practices during the COVID-19 pandemic because it looks at the interactions between human behaviors, societal institutions, and organizational cultures. It asked questions on the meaning of cybersecurity in a remote setting, the learning processes involved, and the lived experiences of the participants. Semi-structured interviews with 27 Australian employees were used in the study to collect qualitative data using interpretive phenomenological analysis (IPA). The examination of the data uncovered themes related to disruption, inadequate direction, new dangers, and the value of social learning. The experiences and opinions of participants on cybersecurity are reflective of concepts covered in class, such as the social construction of knowledge and the influence of culture on behavior. The subject also discusses the difficulties marginalized people encounter, such as uneven access to resources and assistance can make someone feel more exposed and anxious in online environments. In the end, the study benefits society by highlighting the need of customized cybersecurity strategies that take into account a range of experiences and encourage a shared responsibility culture. This encourages a safer digital environment for all workers, particularly those who might be more vulnerable because of a lack of resources or support.<br><br>Work Cited:<br>Monica T Whitty, Nour Moustafa, Marthie, Cybersecurity when working from home during COVID-19: considering the human factors,\u00a0<em>Journal of Cybersecurity<\/em>, Volume 10, Issue 1, 2024, tyae001<\/p>\n\n\n\n<p><strong>Career Paper<\/strong>:<\/p>\n\n\n\n<p class=\"has-text-align-left\">Christopher Agyei<br>Professor Woodbury<br>CYSE201S<br>10\/28\/2024<br>                              <\/p>\n\n\n\n<p class=\"has-text-align-left\">                                 Cybersecurity Analyst: A Social Science Perspective <\/p>\n\n\n\n<p class=\"has-text-align-left\">         Cybersecurity analysts play a critical role in any organization that seeks to defend itself<br>against cyber threats. These professionals utilize social science research and theories, which<br>include psychology, sociology, and the behavioral sciences. This enables them to comprehend<br>behavior, predict risk, and weigh the potential problems that could impact society. Furthermore,<br>the present paper aims to investigate how cybersecurity analysts employ social science<br>knowledge, not only by mentioning and excluding the work of minoritized people, but also by<br>considering the impact of their approach on society as a whole.<br>         Among the essential parts of cybersecurity that I believe are linked with social science is<br>the study of man, especially the attacker. Other examples include analyzing social science<br>research to determine the reasons behind a specific individual&#8217;s decision to commit cybercrimes,<br>which enables analysts to forecast the potential threats. Cybersecurity analysts should be<br>interested in updating themselves with behavior patterns described in social science research<br>concerning attackers (Mashiane &amp; Kritzinger, 2021). Therefore, this would enhance analysts&#8217;<br>comprehension of psychological threats and the development of countermeasures that take into<br>account the unique characteristics of a cyberattack.<br>         In this case, another application of social science involves person-centered exercises in<br>the formation and administration of cyberspace security. Most security analysts commonly<br>utilize theories from sociology and human-computer interaction to create new security solutions<br>that are easy to explain and implement (Dall&#8217;Acqua, 2019). Similarly, other findings from the<br>sphere of social sciences suggest that regular users, especially those who lack technical skills or<br>are an identified vulnerable population, struggle to comprehend or complete security tasks.<br>However, cybersecurity analysts need to develop protocols that are easy to implement, as they<br>may choose to opt out of the practice if they encounter numerous barriers or complexities<br>associated with the regulations supported by the law (Dall&#8217;Acqua, 2019). Analysts suggest that<br>making systems easy to use for researchers positively contributes to security, but researchers also<br>raise the matter of diversity.<br>           Historically, social science principles have been incorporated into the formulation of<br>policies aimed at protecting vulnerable groups. For example, the contributions of women,<br>youth\/children, racial minorities, low-income earners, and the elderly within a society are always<br>more vulnerable than those of any other individual. This is because these groups rarely have the<br>opportunity to learn about cyber threats, let alone acquire the necessary tools to combat such<br>malicious acts (Mongeau, 2021). Organizations may hire strategic consultants to develop plans to<br>design unique programs to educate various groups, as discovered by the social sciences.<br>          Cybersecurity analysts occasionally work in conjunction with other departments to create<br>organizational policies that promote a welcoming and inclusive information technology culture.<br>Therefore, analysts apply theories from organizational psychology and social theories to enhance<br>their capability to anticipate workplace actions and enhance compliance with cybersecurity<br>policies (Mongeau, 2021). These principles aid in overcoming social and organizational<br> resistance, as analysts explain to staff that they are essential for ensuring the cybersecurity of<br>enterprise resources. It also aids in tailoring the training to the specific needs of the employees.<br>         <\/p>\n\n\n\n<p class=\"has-text-align-left\">           Thus, cybersecurity analysts&#8217; daily operations do not stop at technological knowledge, as<br>the social issue also forms part of the threat and the end-user interface. Analysts use sociology<br>concepts and perspectives to improve ways of safeguarding persons through cybersecurity,<br>whether deserving or not. Analysts use social science not only to predict and prevent cyber<br>threats, but also to develop ethical, moral, and socially just security measures for the<br>development of secure, centralized technology worldwide.<br><br>                                                                          Work Cited<br>Dall&#8217;Acqua, L. (2019). Scientific Intelligence, Decision Making, and Cyber-Security.<br>In Forecasting and Managing Risk in the Health and Safety Sectors (pp. 21-51). IGI<br>Global.<br> Mashiane, T., &amp; Kritzinger, E. (2021). Identifying behavioral constructs about user cybersecurity<br>behavior. Eurasian Journal of Social Sciences, 9(2), 98-122.<br>Mongeau, S. A. (2021). Cybersecurity Data Science. Springer International Publishing<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Journal Entries:<\/strong><\/p>\n\n\n\n<p>Module 2:<\/p>\n\n\n\n<p>How does the principle of determinism relate to computer hacking?<\/p>\n\n\n\n<p>To carry out assaults with consistency, they take use of deterministic processes, such as known software behavior or algorithms. Because of this predictability, hackers are able to create recurrent plans for breaking into systems.<\/p>\n\n\n\n<p>Module 14:<\/p>\n\n\n\n<p>Why do you think individuals don\u2019t report cybercrime victimization?<\/p>\n\n\n\n<p>I think people don&#8217;t report cybercrime victimization because of social barriers. A common reason is embarrassment, particularly in cases involving scams, where victims may feel ashamed or fear judgment from others. this experience can lead to emotional distress, self-blame, and a reluctance to seek help. Cybercrimes often involve technical and cross-border issues, making resolution challenging. For instance, the Open University highlights that victims of cyber-enabled scams often experience emotional and financial distress but avoid seeking help due to a fear of victim-blaming or lack of support. To counteract these issues, raising awareness, providing better support systems, and improving reporting infrastructure should be our next steps.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.open.edu\/openlearn\/health-sports-psychology\/psychology\/the-psychology-cybercrime\/content-section-3\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.open.edu\/openlearn\/health-sports-psychology\/psychology\/the-psychology-cybercrime\/content-section-3Links to an external site.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article 1 Review: Social science principles are related to the study of cybersecurity practices during the COVID-19 pandemic because it looks at the interactions between human behaviors, societal institutions, and organizational cultures. It asked questions on the meaning of cybersecurity in a remote setting, the learning processes involved, and the lived experiences of the participants&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/christopher-agyei\/cyse201s\/\">Read More<\/a><\/div>\n","protected":false},"author":27455,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/christopher-agyei\/wp-json\/wp\/v2\/pages\/283"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/christopher-agyei\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/christopher-agyei\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christopher-agyei\/wp-json\/wp\/v2\/users\/27455"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christopher-agyei\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/christopher-agyei\/wp-json\/wp\/v2\/pages\/283\/revisions"}],"predecessor-version":[{"id":336,"href":"https:\/\/sites.wp.odu.edu\/christopher-agyei\/wp-json\/wp\/v2\/pages\/283\/revisions\/336"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/christopher-agyei\/wp-json\/wp\/v2\/media?parent=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}