Career Paper

Elizabeth Howard

CYSE 201s

Career Paper

4/13/2025

Social Science Effects on the Role of an IT Security Specialist

Information Security Specialists (IT Security Specialists) must utilize social science research and principles daily to effectively address human, societal and ethical dimensions of cybersecurity threats. The application of key concepts-such as human behavior in digital environments, risk perception, ethical frameworks, social engineering, and the impact of cybersecurity on marginalized groups-are essential to success in the IT Security Specialists career. Overall, cybersecurity is not solely a technological domain, it is a sociotechnical field and IT Security Specialists must understand and respond to the human behaviors and social contexts that contribute to vulnerabilities in cyberspace.

Responsibilities and Skills of an IT Security Specialists

            An It Security Specialist is truly knowledgeable about the world of information and has a deep understanding of cybersecurity threats and vulnerabilities. Their primary responsibility is to defend digital infrastructure, enabling organizations to operate securely and efficiently. and safely convert input into actionable output. IT Security Specialists have varied responsibilities. These professionals will install, configure, and maintain security software. They will constantly review the organizations network watching out for signs of security breaches of vulnerabilities. They may also be tasked with training employees on cybersecurity protocols and preventative measures (WGU, 2025).

  Other important aspects of the job include collaboration with cybersecurity analysts and information systems experts to employ critical countermeasures during cyber-attacks and ensuring security updates are regularly implemented across the company’s systems. Finally, IT Security Specialists also analyze new cyber threats, document their assessments, and communicate recommended strategies to leadership or management teams on their processes and solutions to ongoing or upcoming attacks. (WGU, 2025) 

            To become an IT Security Specialists, you can choose to major in a degree in computer science, cyber security and information assurance, or network operations and security. (WGU, 2025) However, it is also essential that the IT Security Specialist has a great understanding of social science research and principles to be effective.

Depending on Psychology Research and Principles

            Often cybersecurity focus is on the technological aspect of the field. What an IT Security Specialist must consider is that “Cybersecurity involves humans…” (National Academies of Sciences, Engineering, and Medicine. 2019). Therefore, the need to integrate Social and Behavioral Science research is required to enhance the effectiveness of their ability to complete their career responsibilities.

            IT Security Specialist need to pay attention to key social science concepts such as the psychology behind phishing attacks, social engineering tactics, the ethics of surveillance, and the digital divide. In their daily routine IT Security Specialists must anticipate how users interact with systems, predict potential misuse, and apply ethical decision-making when developing policies or implementing monitoring tools. Social science principles enable security specialists to design more effective awareness training, develop inclusive policies, and understand how risk is perceived differently across cultural and demographic lines.

Depending on Criminology Research and Principles

            In addition to designing awareness training IT Security Specialists may utilize classical positivist research in criminology that seeks generalized understanding of criminal behavior such as poverty, lack of education, psychological conditions to recommend strategies for developing policies within the organization (Bhattacherjee, 2012). Furthermore, Understanding the criminal mindset, as informed by criminological research, helps security professionals anticipate and mitigate cyber threats. This outlook will also help them in positions where legal activity is necessary to protect the organization as well.

As a plaintiff in a cybercrime case, an IT security specialist for an organization needs to present evidence of the cybercrime, including documentation of the incident, forensic analysis, and potential legal violations. This involves establishing the nature of the attack, identifying the affected systems and data, and showing the impact on the organization. Additionally, it is crucial to demonstrate the malicious intent behind the cybercrime and any financial losses or damages (DOJ Cybersecurity Unit, 2020). Knowledge of criminology research will provide the specialist with a foundation of support should this circumstance arise.

 Socioeconomic Relation to IT Security Specialist Positions

            IT Security Specialist positions have a significant positive socioeconomic impact. Cybersecurity drives economic growth by preventing losses, building trust, and fostering digital innovation. These specialists play a crucial role in protecting businesses from cyberattacks, which can lead to financial damage and reputational harm (Russo, A. 2019). Social Science exploratory research can be used to determine the effectiveness of the IT Security Specialists position on the company (Bhattacherjee, 2012).

The Human Factor Approach as an IT Security Specialist

Finally, IT Security Specialists will consider the human-factors approach to understanding cybersecurity threats and victimization. According to the National Academies of Science, Engineering and Medicine, “Human factors research has played a prominent role in attempts to improve cybersecurity analysis by examining the effects of distraction (Gutzwiller et al., 2018), situation awareness (Gutzwiller et al., 2016; Liu et al., 2017), and interruption (Vieane et al., 2017) on the cyber defender’s task.”  (National Academies,’ et al. (2019). As an IT security specialist, addressing the “human factor” involves understanding how human behavior and cognition impact security, and implementing strategies to mitigate risks and enhance security awareness. This includes incorporating human factors engineering into system design, providing comprehensive training, and fostering a culture of security awareness and responsibility.

Relation to Marginalized Groups and Society in General

Moreover, Information Security Specialists play a critical role in protecting marginalized communities who are often disproportionately targeted or affected by cybersecurity threats. Whether addressing algorithmic bias, safeguarding vulnerable populations from identity theft, or advocating for equitable access to digital privacy, these professionals must integrate social awareness with technical expertise. Where studies have found that older adults are more vulnerable to mass-marketing fraud and women are more susceptible to romance scams, even evaluating the likelihood that certain groups have opportunity to participate in cybercrime, IT Security Specialist will need to consider these research topics when performing their organizational duties (Whitty, 2018).

Conclusion

In today’s hyper-connected digital environment, the role of IT Security Specialists extends far beyond the technical safeguarding of systems. By applying social science theories and methodologies—particularly those concerning human behavior, communication, and societal impact—IT Security Specialists ensure that cybersecurity practices are not only effective but ethical and socially responsible.

References:

  1. Bhattacherjee, A. (2012). Social science research: Principles, methods, and practices. University of South Florida. https://digitalcommons.usf.edu/oa_textbooks/3
  2. Cybersecurity Unit, Department of Justice. (2020). Legal considerations when gathering online cyber threat intelligence and purchasing data from illicit sources. https://www.justice.gov/criminal/criminal-ccips/page/file/1252341/dl
  3. National Academies of Sciences, Engineering, and Medicine. (2019). A decadal survey of the social and behavioral sciences: A research agenda for advancing intelligence analysis. The National Academies Press. https://doi.org/10.17226/25335
  4. Russo, A. (2019, November). Cybersecurity: A crucial element of socio-economic stability and prosperity. World Economic Forum. https://www.weforum.org/press/2019/11/cybersecurity-a-crucial-element-of-socio-economic-stability-and-prosperity/
  5. Western Governors University. (2025). What is an IT specialist? https://www.wgu.edu/career-guide/information-technology/it-security-specialist-career.html
  6. Whitty, M. T. (2018). Do you love me? Psychological characteristics of romance scam victims. Cyberpsychology, Behavior, and Social Networking, 21(2), 105–109. https://doi.org/10.1089/cyber.2016.0729