{"id":359,"date":"2025-04-21T18:55:29","date_gmt":"2025-04-21T18:55:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/corawilson\/?page_id=359"},"modified":"2025-12-03T20:08:53","modified_gmt":"2025-12-03T20:08:53","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/corawilson\/cyse-201s\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Cybercrime Analysts: Bridging Cybersecurity and Social Science<br>Cora Wilson<br>Old Dominion University<br>CYSE 201S\u2013 Cybersecurity and Social Sciences<br>April 7, 2024<\/p>\n\n\n\n<p><br><strong>Introduction<\/strong><\/p>\n\n\n\n<p><br>In today\u2019s digital world, cybercrime is not just a technical challenge; it\u2019s a social one.<br>Cybercrime investigators are cybersecurity professionals who rely heavily on social science<br>research and principles to understand, track, and prevent online criminal behavior. Their work<br>goes beyond code and firewalls, diving deep into human behavior, psychology, social systems,<br>and criminology. This paper explores how social science concepts are embedded in the daily<br>work of cybercrime analysts, emphasizing the profession\u2019s relevance to marginalized groups and<br>broader society.<\/p>\n\n\n\n<p><br><strong>The Role of Social Science in Cybercrime Analysis<\/strong><\/p>\n\n\n\n<p><br>At its core, cybercrime investigation is about people. These professionals use concepts<br>from sociology and criminology to understand why individuals or groups engage in illegal online<br>behavior. Routine activities theory, for example, explains how crime is likely to occur when a<br>motivated offender meets a suitable target in the absence of capable guardianship (Holt &amp;<br>Bossler, 2015). Cybercrime investigators use this framework to assess vulnerabilities in digital<br>systems and anticipate potential criminal activity.<br>Behavioral profiling is another tool drawn from psychology and sociology. Investigators<br>study online behavior patterns, motivations, and group dynamics (such as cyber gangs or<br>ideological collectives) to anticipate attacks. This isn\u2019t just about catching the \u201cbad guys,\u201d it\u2019s<br>about understanding their socio-economic background, digital environment, and even mental<br>health status to develop more effective prevention strategies (Yar, 2013).<\/p>\n\n\n\n<p><strong>Key Concepts from Class in Practice<\/strong><\/p>\n\n\n\n<p><br>Cybercrime investigators rely on several key social science concepts covered in class,<br>including social structure, marginalization, deviance, and ethics. Social structure plays a role<br>in how individuals access technology, education, and opportunity. Understanding these<br>disparities helps investigators identify where cybercrime may emerge and how it may affect<br>different communities (Wall, 2007).<br>Deviance helps professionals categorize behaviors that break social norms or laws. In<br>cybersecurity, deviance isn\u2019t always as simple as \u201cright or wrong.\u201d For example, hacktivism<br>often blurs the ethical line between protest and crime. Investigators must use ethical reasoning to<br>interpret intent and context (Yar, 2013).<br>Finally, ethical decision-making is crucial. Investigators work with sensitive data and<br>must balance privacy rights with national security. Social science gives them the ethical<br>grounding to navigate these gray areas responsibly (Holt &amp; Bossler, 2015).<br>Impact on Marginalized Groups<br>Marginalized communities are disproportionately targeted by cybercrime and often<br>overlooked in digital protection efforts. For example, lower-income individuals are more likely<br>to fall victim to phishing scams or identity theft due to limited digital literacy (Wall, 2007).<br>Cybercrime investigators, guided by social science, can tailor awareness campaigns and<br>protection tools to meet the needs of these vulnerable groups.<br>On the flip side, surveillance and investigative tools, if not properly checked, can harm<br>marginalized populations. Investigators must stay conscious of biases in data and algorithms, a<br>key concern in both criminology and ethics. By incorporating inclusive, community-informed<br>strategies, they reduce harm and build trust across social lines (Yar, 2013).<\/p>\n\n\n\n<p><strong>Cybercrime Investigation and Society<\/strong><\/p>\n\n\n\n<p><br>Cybercrime doesn&#8217;t just affect individual victims; it shapes public policy, impacts<br>economic systems, and influences global diplomacy. Investigators serve as a bridge between the<br>tech world and society, translating threats into social terms that law enforcement, lawmakers, and<br>the public can understand. Their work drives conversations about privacy, justice, and safety in<br>the digital age (Holt &amp; Bossler, 2015).<br>As cyber threats grow in scale and sophistication, cybercrime analysts must stay<br>grounded in the human side of security. Understanding cultural factors, online subcultures, and<br>social media ecosystems is just as important as technical skill. Without social science,<br>investigators risk missing the big picture and the people within it.<\/p>\n\n\n\n<p><br><strong>Conclusion<\/strong><\/p>\n\n\n\n<p><br>Cybercrime investigators are not just tech experts; they are behavioral scientists,<br>ethicists, and sociologists in the field. Their daily routines depend on understanding the social<br>systems and psychological drivers that underlie digital crime. From protecting marginalized<br>populations to shaping national policy, their work reflects the deep interconnection between<br>cybersecurity and social science. As cyber threats evolve, this interdisciplinary approach is not<br>just useful, it\u2019s essential.<\/p>\n\n\n\n<p><strong>Work Cited<\/strong><\/p>\n\n\n\n<p><br>Holt, T. J., &amp; Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of<br>technology-enabled offenses. Routledge.<br>Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age (2nd ed.).<br>Polity Press.<br>Yar, M. (2013). Cybercrime and society (2nd ed.). SAGE Publications.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime Analysts: Bridging Cybersecurity and Social ScienceCora WilsonOld Dominion UniversityCYSE 201S\u2013 Cybersecurity and Social SciencesApril 7, 2024 Introduction In today\u2019s digital world, cybercrime is not just a technical challenge; it\u2019s a social one.Cybercrime investigators are cybersecurity professionals who rely heavily on social scienceresearch and principles to understand, track, and prevent online criminal behavior. Their workgoes [&hellip;]<\/p>\n","protected":false},"author":29782,"featured_media":0,"parent":302,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/pages\/359"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/users\/29782"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/pages\/359\/revisions"}],"predecessor-version":[{"id":396,"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/pages\/359\/revisions\/396"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/pages\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/corawilson\/wp-json\/wp\/v2\/media?parent=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}