{"id":318,"date":"2025-08-08T23:05:37","date_gmt":"2025-08-08T23:05:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dberr012\/?p=318"},"modified":"2025-08-08T23:05:37","modified_gmt":"2025-08-08T23:05:37","slug":"the-paradigm-shift-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dberr012\/2025\/08\/08\/the-paradigm-shift-of-cybersecurity\/","title":{"rendered":"The Paradigm Shift of Cybersecurity"},"content":{"rendered":"\n<p>In reading Beskow and Carley\u2019s article on social cybersecurity, there were moments where I<br>contemplated the shift in our modern view of warfare and national security. In their work, it<br>showed vivid imagery of a battlefield that is not physical, but in our consciousness, our bonds,<br>and in our beliefs. In the article, it is asserted that information warfare has evolved from being a<br>supporting element of conflict to being an end to itself. This shows how warfare has ultimately<br>changed over time. The article also went into detail on social cybersecurity as a science. By<br>how it is focused on cyber related changes in behavior, social, cultural, and political outcomes, it<br>can be seen as a vulnerability in our democratic society. By being open, having public<br>discourse, and being committed to freely exchanging ideas, we are opening ourselves to being<br>attacked in the new domain. The authors\u2019 further emphasize this by going into how adversaries<br>would seek to weaken our trust in national institutions and our commitment to values through<br>the international community. That kind of analysis really puts things into perspective given how<br>things are globally at the moment. There is an erosion currently happening in the world with<br>trust and cohesion playing out throughout our democracies. One of the most concerning parts of<br>this article was in the use of the phrase \u201cmanipulate the global marketplace of beliefs and ideas<br>at the speed of algorithms.\u201d This kind of phrase suggests an asymmetry between how fast false<br>narratives can be formed and how slow truth and reasonable discourse can operate. Algorithmic<br>manipulation can move at fast speeds while fact checking and institutional responses are only at<br>a human timescale. This article also made me reconsider how I look at what national defense is<br>in this 21st century that we are living in. In saying that adversaries can win the next war before it<br>has begun by just undermining social cohesion and trust, then the traditional military might be<br>insufficient as a result. In this new world, national security is tied to our media literacy, critical<br>thinking, and civic engagement. In how every person discerns truth from manipulation, it all<br>becomes a factor of national defense. The article also made me raise questions that I would<br>further consider in the future. Questions such as, \u201cHow would we be able to balance the need to<br>defend against cyber threats with how we preserve free speech?\u201d or \u201cHow could we build<br>resilience as a society against information warfare without becoming authoritarian as a result?\u201d<br>These questions are ones I will consider in the future and in further research. In Beskow and<br>Carley\u2019s article, they provided a very informed and in-depth warning. With social cybersecurity<br>emerging more by the day, there is a matter of national security in how we must prepare people<br>for life in a world where information is being assaulted in our cyberspace. The battlefield is not<br>geographic, but it is in fact psychological and is a war with what you can trust. By being aware<br>of what is happening, you are taking the first step to being resilient.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In reading Beskow and Carley\u2019s article on social cybersecurity, there were moments where Icontemplated the shift in our modern view of warfare and national security. In their work, itshowed vivid imagery of a battlefield that is not physical, but in our consciousness, our bonds,and in our beliefs. In the article, it is asserted that information&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dberr012\/2025\/08\/08\/the-paradigm-shift-of-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":30971,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/318"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/users\/30971"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/318\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/318\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/media?parent=318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/categories?post=318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/tags?post=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}