{"id":379,"date":"2025-04-25T15:51:19","date_gmt":"2025-04-25T15:51:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dtayl079\/?page_id=379"},"modified":"2025-04-25T15:51:19","modified_gmt":"2025-04-25T15:51:19","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dtayl079\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><br><\/p>\n\n\n\n<p class=\"has-text-align-center\">4\/7\/25<\/p>\n\n\n\n<p class=\"has-text-align-center\">Cybersecurity Analyst: The Role of Social Science in<br>Defending Digital Frontiers<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Introduction<\/strong><br>In an increasingly interconnected world, cybersecurity has become a cornerstone of<br>organizational resilience and societal trust. Among the most critical roles in this domain<br>is that cybersecurity analyst are responsible for identifying, assessing, and mitigating<br>threats to digital infrastructure. While technical skills are often emphasized in this field,<br>the integration of social science principles is just as important to a cybersecurity analyst\u2019s<br>success. Understanding human behavior, communication patterns, and societal influences<br>allows analysts to anticipate cyber threats, develop user-centered security protocols, and<br>effectively interact with diverse populations. This paper explores how cybersecurity<br>analysts incorporate social science research and concepts into their work, with particular<br>focus on how these practices impact marginalized groups and society at large.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Understanding Human Behavior in Cybersecurity<br><\/strong>Cybersecurity analysts rely on social science principles to better understand the<br>motivations and behaviors of both cybercriminals and users. Social engineering attacks<br>exploit human psychology through manipulation tactics like phishing or pretexting.<br>Analysts who understand psychological theories can more easily identify and stop these<br>types of threats. According to Alsmadi and Zarour (2020), social engineering attacks<br>often hinge on trust, authority, or urgency, all concepts rooted in behavioral science.<br>Theories such as Routine Activity Theory (RAT) help analysts anticipate when and<br>where cybercrimes are likely to occur by analyzing the convergence of motivated<br>offenders, suitable targets, and the absence of capable guardians.<br>Understanding insider threats also requires insight into social and organizational<br>psychology. Cybersecurity analysts often collaborate with human resources to identify<br>signs of employee dissatisfaction, which could lead to security breaches. These practices<br>show how social science research supports a cybersecurity analyst&#8217;s ability to detect non<br>technical indicators of risk.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Daily Applications in the Analyst Role<br><\/strong>Cybersecurity analysts use social science research to improve communication, strengthen<br>security awareness training, and shape incident response plans. A major part of the job is<br>developing awareness campaigns that educate users about secure practices. These efforts<br>are more effective when grounded in principles of learning and communication theory.<br>Hadlington (2018) notes that training built around cognitive and motivational factors is<br>more likely to be retained and followed by employees.<br>Cybersecurity analysts also interpret behavioral data from system logs, user access<br>reports, and network activity. Recognizing unusual patterns often depends on a solid<br>understanding of what typical behavior looks like within a specific organizational culture,<br>a concept linked to sociology. Analysts work closely with other departments, translating<br>technical data into clear language for non-technical staff. Communication rooted in social<br>science makes this process more effective.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Engaging Society and Marginalized Groups<br><\/strong>Cybersecurity analysts must consider how security measures affect marginalized<br>communities. Security protocols that are not inclusive can unintentionally exclude users<br>with disabilities, non-native English speakers, or people with limited access to<br>technology. Analysts apply inclusive design and equity-centered thinking to ensure<br>security practices are accessible and fair to all users.<br>Smith and Rege (2020) argue that cybersecurity strategies should consider the<br>sociocultural dynamics of digital inclusion. For example, requiring multifactor<br>authentication without accessible alternatives can exclude older adults or users in<br>underserved communities. Ethical concerns also arise when monitoring user behavior,<br>especially within vulnerable populations. Analysts must balance the need for security<br>with protecting privacy and civil liberties, ensuring marginalized groups are not unfairly<br>targeted.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Conclusion<\/strong><br>The role of a cybersecurity analyst goes beyond technical tasks; it is closely connected to<br>social sciences. By applying principles from psychology, sociology, communication, and<br>ethics, analysts can create safer and more inclusive digital environments. This approach<br>improves threat detection, strengthens user training, and promotes ethical engagement<br>with all sectors of society, especially marginalized communities. As digital threats<br>continue to evolve, cybersecurity analysts must continue to apply both technical<br>knowledge and an understanding of human behavior.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>References<\/strong><br>Alsmadi, I., &amp; Zarour, M. (2020). Social engineering attacks: Common techniques and<br>how to prevent them. Journal of Information Security, 11(2), 129-144.<br>https:\/\/doi.org\/10.4236\/jis.2020.112008<br>Hadlington, L. (2018). Human factors in cybersecurity: Examining the role of human<br>behaviour in security violations. Computers &amp; Security, 73, 187-195.<br>https:\/\/doi.org\/10.1016\/j.cose.2017.11.011<br>Smith, R., &amp; Rege, A. (2020). Cybersecurity and marginalized communities: An<br>intersectional approach. Journal of Cyber Policy, 5(1), 90-105.<br>https:\/\/doi.org\/10.1080\/23738871.2020.1723036<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>4\/7\/25 Cybersecurity Analyst: The Role of Social Science inDefending Digital Frontiers IntroductionIn an increasingly interconnected world, cybersecurity has become a cornerstone oforganizational resilience and societal trust. Among the most critical roles in this domainis that cybersecurity analyst are responsible for identifying, assessing, and mitigatingthreats to digital infrastructure. While technical skills are often emphasized in this&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dtayl079\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":28663,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/379"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/users\/28663"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/comments?post=379"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/379\/revisions"}],"predecessor-version":[{"id":381,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/379\/revisions\/381"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/media?parent=379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}