CYSE 201S Cybersecurity and the Social Sciences
Career Paper
Data Security Analyst
By: Mark Popejoy
School of Cybersecurity: Old Dominion University
CYSE 201S: Cybersecurity and Social Sciences
Instructor: Diwakar Yalpi
Date: 11/12/2025
Introduction
In this paper I’m going to determine the complexities of social sciences in the cybersecurity career of data security analysts. I’m going to determine how to apply the concepts within social sciences to the data security analyst. Throughout this paper I’m going to explore the relationship between three or more groups that are impacted by being a data security analyst. By the conclusion of this paper, I’ll be able to determine if choosing a career of being a data security analyst is a productive lifestyle and the career opportunities presented matter have an impact on the career.
What is a Data Security Analyst?
A data security analyst specializes in cybersecurity designed to protect large amounts of data (Data Security Analyst: What Is It? And How to Become One?, 2025). The duties include monitoring the current security of the organization and finding ways to improve upon the current security of the organization. This is done by implementing new software and enforcing effective strategies to ensure the security of the organization. An organization expects the appropriate training, education, and experience to be able to effectively manage and protect the data. A bachelor’s degree in computer science, information technology, or other related fields is often expected for a career in cybersecurity data analyst (Data Security Analyst: What Is It? And How to Become One?, 2025). Employers expect candidates to have specific certifications like CISSP, GCIA, and SSCP (Data Security Analyst: What Is It? And How to Become One?, 2025).
Social Science Principles
The social science principles have a major impact on cybersecurity. These principles ensure that cybersecurity adheres to the same principles of natural sciences. These principles are Relativism, Objectivity, Parsimony, Empiricism, Skepticism, Ethical Neutrality, and Determinism. Relativism means that all things are connected. Objectivity means the way scientists study topics in a value free manner. Parsimony means that scientists should keep the explanations as simple as possible. Empiricism means that social scientists only study behavior which is real to the senses. Skepticism means all claims should be questioned and critically examined rather than be accepted at face value. Ethical Neutrality means that scientists must adhere to ethical standards when conducting research. Determinism means that behavior is caused or influenced by preceding events.
Applying the principles
For this paper, I’ll be applying the principles of relativism, objectivity, parsimony, skepticism, and ethical neutrality. Relativism can be applied to cybersecurity by linking all the systems together. This is because if one aspect of the system changes, then a different part of the system will change due to the initial change occurring. Objectivity is applied to cybersecurity by allowing the system to be audited with an unprejudiced outlook of the system to ensure that no important value leads to compromises (Sienkiewicz, 2017). This is important because if auditors have certain outlook in mind, the findings of the system audit will be rendered useless. Parsimony is applied to cybersecurity by ensuring that explanations are kept as simple as possible to allow any scientist to view the data without being overwhelmed by the inclusion of complexities brought on by personal biases (Bancroft, 2025). Skepticism is applied to cybersecurity by preventing any hacking or exploiting of vulnerabilities in the system (Aggarwal, 2024). Ethical neutrality is applied to cybersecurity by the implementation of a code of ethics by the organizations involved in cybersecurity (University of Tulsa, 2023). Three organizations that have a code of ethics are CREST, CompTIA, and ISACA (University of Tulsa, 2023). CREST (the Council of Registered Ethical Security Testers) code of ethics includes Credibility, Professionalism, Prohibition against extortion, bribery, and corruption, Respect, and Responsibility (University of Tulsa, 2023). CompTIA (the Computing Technology Industry Association) code of ethics includes Confidentiality, Conflicts of interest, Honesty, Integrity, and Professional competence (University of Tulsa, 2023). ISACA (formerly the Information Systems Audit and Control Association) code of ethics includes Conduct and character, Disclosure, Due diligence, Objectivity, and Professional care (University of Tulsa, 2023).
Potential Problems
If these principles are ignored, then the cybersecurity will remain unfunctional until the principles are followed. This is because without relativism, scientists would never consider the impact different systems have on each other. That can create a mess of a system and possibly make it unusable. If scientists leave overly complex explanations of their findings, how will other scientists understand what is being reported because parsimony wasn’t used in the report. If scientists allow their personal biases to shape their experiment, then the data is unusable. This is because the data was obtained to a skewed lens and didn’t allow the data to speak for itself. That is why scientists conduct experiments from an objective point of view to ensure the findings are accurate and usable. If scientists look at data at face value without seeing how that data was concluded upon, they are doing themselves a disservice. This is why skepticism is important in the reviewing of data. Ethical neutrality is an industry standard, and it simply can’t be ignored. If it is ignored, then there will be serious consequences.
The Groups Involved
There are three groups involved in cybersecurity and they are the consumer, organization, and data security analyst. The consumer uses information made available by organizations for their own personal use. The organization uses data security analysts to protect the data from hostile threats and exploits. The data security analyst oversees maintaining security of the data and ensuring the safety of the system. This is how the cycle of cybersecurity flows.
In conclusion
Data Security Analyst use their education to gain the appropriate certifications to protect the system and ensure the safety of the data within a system. The social science principles form the code of ethics that is followed in cybersecurity. The productive lifestyle of a data security analyst leads to many career opportunities because cybersecurity is always evolving and organizations will always need capable data security analysts. There will always be opportunities for analysts to further their career and with how the cybersecurity industry is, they’ll always be able to have a job.
References
Data Security Analyst: What Is It? and How to Become One? (2025). ZipRecruiter. https://www.ziprecruiter.com/career/Data-Security-Analyst/What-Is-How-to-Become
Sienkiewicz, H. (2017). INDEPENDENCE & OBJECTIVITY: Fundamental Best Practices for Cybersecurity Assessments [Review of INDEPENDENCE & OBJECTIVITY: Fundamental Best Practices for Cybersecurity Assessments]. United States {CYBERSECURITY} Magazine. https://www.uscybersecurity.net/csmag/independence-objectivity-fundamental-best-practices-for-cybersecurity-assessments/
Bancroft, M. (2025, April 25). Cyber squirrels and the principle of parsimony. Capgemini UK. https://www.capgemini.com/gb-en/insights/expert-perspectives/cyber-squirrels-parsimony-principle-guide/
Aggarwal, T. (2024, March 4). Cybersecurity in the Digital Age: Navigating Fraud with Skepticism and Technology. Business Upturn. https://www.businessupturn.com/technology/cybersecurity-in-the-digital-age-navigating-fraud-with-skepticism-and-technology/ University of Tulsa. (2023, December 13). Cybersecurity Ethics: Why It’s Important | The University of Tulsa. Online.utulsa.edu. https://online.utulsa.edu/blog/cybersecurity-ethics/