{"id":330,"date":"2025-08-08T23:12:49","date_gmt":"2025-08-08T23:12:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dberr012\/?p=330"},"modified":"2025-08-08T23:12:49","modified_gmt":"2025-08-08T23:12:49","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dberr012\/2025\/08\/08\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p><br>In the current digital world we live in, cybersecurity analysts have been commonly<br>known as the battlefront defenders against any digital threat. They can defend large organizations<br>from cyber attacks, malicious activities, and any other kind of digital threat that exists. With all<br>this technical expertise, it forms the basis for the profession and industry, but the role of social<br>sciences with this field is also very critical and can go unappreciated. According to the Bureau of<br>Labor Statistics, cybersecurity analysts were responsible for planning and executing security<br>measures to protect an organization or individual\u2019s computer systems and networks, a job that<br>requires a vast understanding of human behavior and psychological principles. In this paper, I<br>will examine how cybersecurity analysts can depend on social sciences through their daily job<br>routines and focus on the impacts that this would have on marginalized communities and society<br>as a whole.<br>Cybersecurity analysts usually rely on several core social science principles in order to<br>better engage with their job duties. Psychology has been known to play a fundamental role due to<br>its ability to understand a perpetrator\u2019s motivations, their behavior, and the kinds of decisions<br>they would make. Social engineering attacks, which have been known to be the largest portion of<br>cyber breaches, can often exploit psychological vulnerabilities (Western Governors University,<br>2023). From this understanding, an analyst must understand different kinds of cognitive biases,<br>social influence mechanisms, and patterns of human error in order to fully predict and prevent<br>any kind of attack from occurring.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Sociololgy can also provide a fundamental framework for cybersecurity analysts. In<br>understanding different group and organizational dynamics, it helps analysts better assess how<br>information can flow within organizations and better identify vulnerabilities within these<br>systems. Social concepts can be very relevant in how we analyze insider threats and understand<br>how these kinds of cybercriminal networks operate. Principle in Anthropology can also be<br>helpful in cybersecurity work in how we understand the differences of many cultures in how they<br>adapt to technology, their privacy expectations, and security behaviors.<br>Within the career of cybersecurity analysis, there are several social science concepts that<br>apply to this work. The concept of social construction is very essential due to how we understand<br>how different groups can identify and respond to cyber threats. The second would be the<br>principle of intersectionality. This concept is crucial through analyzing how cybersecurity can<br>impact different populations throughout the world. Another core concept is in social learning<br>theory. This theory helps analysts be better informed in how they approach security education<br>and behavioral change initiatives. It is in understanding how people could learn security<br>behaviors that you can be able to develop better training programs and security protocols for<br>them as well. The final core concept is in digital divide. This concept highlights the unequal<br>access to technology in our digital world and how analysts should consider this disparity when<br>assessing risks and developing strategies for organizations.<br>In the work of cybersecurity analysis, it has many broad implications for society.<br>Cybersecurity analysts can play a crucial role for protecting institutions, ensuring equal access to<br>digital material, and preventing this technology from being used for malicious intent. However,<br>this field can often experience challenges in diversity that affects how effective it is within<br>society. In recent years, it has been reported that in the field of Cybersecurity, there is a massive<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>lack of women and minorities in these roles. (Cybersecurity Guide, 2023). Due to the lack of<br>diversity within these job roles, there can often be errors in assessing threats and designing<br>security systems due to not knowing the vulnerabilities faced by certain marginalized<br>communities.<br>The cybersecurity field often collaborates with society in what security measures are best.<br>These measures will take into account privacy rights, allowing for accessibility, and not taking<br>away any civil liberties from members of the community. While some security protocols are<br>great from a tech view, they can potentially discriminate against certain populations. An example<br>would be that having biometric authentication can seem great on paper, but have been known to<br>have higher error rates for individuals with darker skin tones.<br>Cybersecurity analysts have also been known to play key parts in addressing inequalities<br>within a system for digital access and protection. A cybersecurity analyst would need to consider<br>how their security recommendations could affect members of a different population\u2019s ability to<br>access their essential services, participate in their economies online, or exercise their given rights<br>for privacy. This kind of consideration would require understanding cybersecurity vulnerabilities<br>and developing more equal security solutions.<br>Through their daily routine, a cybersecurity analyst can regularly apply social science<br>methods. Through threat intelligence analysis, it involves understanding the different social and<br>economic factors that would lead to cybercriminal behavior and requiring the knowledge of<br>behavioral economics and criminology. In investigating a security incident, it is important to<br>consider any human factors that could contribute to it. By conducting a risk assessment process,<br>a cybersecurity analyst they are continuing to incorporate social science research into human<br>behavior and decision making through uncertainty. Analysts have also used survey research to<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>assess security awareness levels, conduct studies to understand how security policies would be<br>implemented, and apply statistical analysis to identify patterns involved with human-related<br>security events. By staying current with new developments with social science on emerging<br>threats, cybersecurity professionals can make sure to anticipate any new threat indicators and<br>develop the best countermeasures for these attacks.<br>Overall, the job of being a cybersecurity analyst involves a lot of work in<br>interdisciplinary research. It not only requires technical knowledge, but the knowledge of social<br>science as well. With cyber threats continuing to exploit human vulnerabilities and social<br>dynamics, it is important to integrate social science with cybersecurity in order to be more<br>effective. In working to protect an ever changing world of emerging technologies, it is important<br>to make sure to have an equal, inclusive, and socially justified outcome that is central to the field<br>of social science. In the future of cybersecurity, it is important to not just focus on the<br>advancement of technology, but also understanding the social dynamics of digital security. In<br>providing a safer digital world, it is important to be aware of the complex world around you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the current digital world we live in, cybersecurity analysts have been commonlyknown as the battlefront defenders against any digital threat. They can defend large organizationsfrom cyber attacks, malicious activities, and any other kind of digital threat that exists. With allthis technical expertise, it forms the basis for the profession and industry, but the role&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dberr012\/2025\/08\/08\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":30971,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/330"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/users\/30971"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":331,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/posts\/330\/revisions\/331"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dberr012\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}