{"id":221,"date":"2023-12-08T19:24:06","date_gmt":"2023-12-08T19:24:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/?p=221"},"modified":"2023-12-08T19:24:09","modified_gmt":"2023-12-08T19:24:09","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/2023\/12\/08\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Career Paper<br>CYSE 201s<br>Adam Tucker<br>29NOV2023<br>The Crucial Role of Social Science in Cybersecurity Analysis<br>In the ever-changing field of cybersecurity, technical expertise alone is insufficient to<br>reduce the diverse and sophisticated threats that organizations face. Cybersecurity analysts<br>increasingly depend on social science research and principles to understand the human aspect of<br>cyber threats, develop effective strategies, implement them, and foster a security-aware<br>organizational culture. This paper explores the integral role of social science in the work of<br>cybersecurity analysts.<br>One key aspect of cybersecurity analysis is considering and evaluating human behavior,<br>both in terms of potential cybercriminals and the users within an organization. Social science<br>principles aid the analysts gain essential insights into this portion of their job. Gabriel Weimann<br>emphasizes the importance of social science research principles in the profiling of cybercriminal<br>behavior. By studying the motives and tactics employed by cyber criminals, cybersecurity<br>analysts can develop a clearer understanding of their adversaries. It can help answer questions<br>like, \u201cWhat motivates them?\u201d or \u201cWhat drives their behavior?\u201d Weimann\u2019s work highlights how<br>psychological insights are vital for predicting cyber threats effectively (Weimann, 2015).<br>Furthermore, we can show that social science principles, especially those related to the<br>interaction between human and computers, contribute in the design of security protocols and<br>training programs. This integration aligns security practices with a users&#8217; cognitive functions and<br>behavioral patterns, ultimately reducing the risk of human error (Salisbury et al, 2001). This can<br>have a drastically positive effect because by reducing the risk of human error, we are combating<br>the number one cybersecurity vulnerability within each organization.<br>Another essential component of cybersecurity analysis is risk assessment. This involves<br>evaluating the likelihood and impact of cyber threats, who will be affected, and is that risk worth<br>the effort put into preventing it from happening. Social science research is essential in making<br>these assessments. Paul Slovic&#8217;s research emphasizes the importance of risk perception in<br>decision-making. His research suggests that people&#8217;s perception of risk is influenced by factors<br>beyond statistics and include emotions, cognitive biases, and social dynamics. Cybersecurity<br>analysts leverage these insights to design more effective risk communication strategies and to<br>understand how individuals perceive and respond to cyber threats (Slovic, 1987).<br>User-centered security refers to security policies, practices, or methods that focus on<br>usability as its primary goal. It does not mean that security comes second. It is simply a practice<br>meant to ensure the analyst can use the tools they have effectively. Social science principles are<br>pivotal in the synchronization between the two: security and usability. The Cranor research team<br>highlightsthe importance of usability in cybersecurity operations and practices in their book, The<br>Cost of Reading Privacy Policies. They argue that usability testing, a research method utilizing<br>social science principles, helps analysts assess the \u201cease-of-use\u201d of security tools and systems.<br>Through usability tests and user surveys, analysts gather valuable feedback to improve security<br>interfaces and applications which ultimately reduces the risk of user errors and enhances the<br>overall security of an organization or website (Cranor et al, 2008). In the words of Steve Krug,<br>\u201cUsability is about people and how they understand and use things, not technology\u201d.<br>In conclusion, cybersecurity analysts rely on social science research principles. They<br>enable them to understand human behavior, assess risks, and design user-based security<br>measures. Weimann&#8217;s research illustrates the value of social science in profiling cybercriminal<br>behavior, while Salisbury, Miller, and the Pearson\u2019s highlight the importance of user behavior<br>analysis. Slovic&#8217;s work sheds light on risk perception and its impact on decision-making, while<br>Cranor\u2019s team emphasizes usability testing in user-centered security.<br>As the cybersecurity landscape continues to evolve, the incorporation of social science research<br>principles will remain crucial in addressing the dynamic array of cyber threats. By harnessing<br>these insights, cybersecurity professionals can better protect organizations and individuals in an<br>increasingly interconnected and digitally reliant world.<br>Work Cited<br>Weimann, Gabriel. 2015. &#8220;Terrorism in Cyberspace: The Next Generation\u201d. Woodrow Wilson<br>Press Center.<br>Salisbury, W.D., Pearson, R.A., Pearson, A.W. and Miller, D.W. (2001), &#8220;Perceived security and<br>World Wide Web purchase intention&#8221;, Industrial Management &amp; Data Systems, Vol. 101<br>No. 4, pp. 165-177.<br>https:\/\/doi.org\/10.1108\/02635570110390071<br>Slovic, Paul. 1987. \u201cPerception of Risk\u201d. Science, 236(4799), 280-285.<br>https:\/\/www.science.org\/doi\/10.1126\/science.3563507<br>Cranor, Lorrie Faith, Simson Garfinkel, and Mark S. Perlman. 2008. &#8220;The Cost of Reading<br>Privacy Policies.&#8221; I\/S: A Journal of Law and Policy for the Information Society 4, no. 3,<br>540-568. https:\/\/lorrie.cranor.org\/pubs\/readingPolicyCost-authorDraft.pdf<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"excerpt\">Career PaperCYSE 201sAdam Tucker29NOV2023The Crucial Role of Social Science in Cybersecurity AnalysisIn the ever-changing field of cybersecurity, technical expertise alone is insufficient toreduce the diverse and sophisticated threats that organizations face. Cybersecurity analystsincreasingly depend on social science research and principles to understand the human aspect ofcyber threats, develop effective strategies, implement them, and foster a security-awareorganizational culture. This paper explores&hellip; <a href=\"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/2023\/12\/08\/career-paper\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":26115,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts\/221"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/users\/26115"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/comments?post=221"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts\/221\/revisions"}],"predecessor-version":[{"id":222,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/posts\/221\/revisions\/222"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/media?parent=221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/categories?post=221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sfall2023atucker\/wp-json\/wp\/v2\/tags?post=221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}