{"id":274,"date":"2024-12-09T01:15:11","date_gmt":"2024-12-09T01:15:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/?page_id=274"},"modified":"2024-12-09T01:16:37","modified_gmt":"2024-12-09T01:16:37","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Career Paper<\/p>\n\n\n\n<p>Paul Cumiskey<br>Diwakar Yalpi<br>Cybersecurity and the Social Sciences<br>November 17, 2024<br>Career Paper &#8211; How Cybersecurity advocates use the social sciences and their principles to<br>reduce cyber threats<br>Introduction<br>When people think of cybersecurity, they usually think of topics that go over their head.<br>Things like network security, hackers, and large data breaches in the past make it seem like an<br>inevitable threat. However, shockingly, 95% of cybersecurity breaches result from human error.<br>(OVHcloud. (n.d.). Cyber threat: The role of human error This means that the best way to<br>mitigate cyber threats is to understand social science principles and how they interact with<br>cybersecurity. The profession that has to keep this in mind the most and educate others about<br>how cybersecurity and social science are integrated is cybersecurity awareness advocates.<br>Cybersecurity awareness advocates are essential and provide the much-needed insight into the<br>social sciences to successfully mitigate human error in cyber breaches.<br>Security Awareness Advocate<br>To understand what impact a security awareness advocate has on cybersecurity, we first<br>need to know what a cybersecurity awareness advocate is. The primary role of Security<br>Awareness Advocates is education. They try to promote the best security practices to individuals.<br>Practices such as strong passwords, phishing email detection, and social engineering. They keep<br>human factors in mind while educating people about cybersecurity. Haney J. and Lutters, W.<br>state in \u201cHow cybersecurity advocates overcome negative perceptions of security\u201d that many<br>people have a rather negative perception of cybersecurity. Security awareness advocates help to<br>mitigate some of that negative perception.<br>The application of social sciences<br>Security awareness advocates need to have a focus on social science while they are<br>educating. This is because they need to focus on human-centered cybersecurity to successfully<br>mitigate potential data breaches. One area of the social sciences that needs to be kept in mind is<br>behavioral psychology. This allows security advocates to understand why people take security<br>risks by understanding their decision-making and habit formation. Another social science that<br>security advocates need to have a strong understanding of is sociology. Understanding sociology<br>allows them to understand how peer behaviors and social norms can affect cybersecurity<br>practices. Economics and decision science can also help security advocates analyze and<br>understand why people make security errors. They can use cost-benefit analysis to help educate<br>individuals on just how much they are risking by making security errors. They can also<br>implement incentives to reward safe behavior. Lastly, and most important for cybersecurity<br>awareness advocates, is understanding human factors and ergonomics. This helps to ensure a<br>user-centered cybersecurity design. It will also help cybersecurity advocates keep in mind the<br>cognitive load on the ones they are teaching.<br>Career connection to society<br>Cybersecurity awareness advocates have a complex and dynamic relationship with<br>society. This is due to them being needed to educate users about cyberthreats and how to avoid<br>them. Cybersecurity awareness advocates will eventually seem dull and boring to many people<br>after they have already heard the main talking points about security. This leads some people to<br>think that they are not needed after a while. However, the amount of data breaches caused by<br>human error has only increased in the past decade. This showcases just how important<br>cybersecurity awareness advocates are.<br>Connection to marginalized groups.<br>Cybersecurity awareness advocates help marginalized groups in a plethora of unique<br>ways. First, cybersecurity awareness advocates make a point to present data in a clear and<br>precise way so that it can be easily understood by many backgrounds. Cybersecurity awareness<br>advocates will also usually make a point to keep in mind that for some people, English might not<br>be their first language. So they will oftentimes make a separate presentation in different<br>languages. Cybersecurity awareness advocates will also make a point to support vulnerable<br>groups such as the elderly, children, and even immigrants. Oftentimes, the elderly will not be<br>knowledgeable about how technology works. This leads them to be susceptible to phishing<br>scams and many other cyber threats. This is why cybersecurity awareness advocates typically<br>make it a point to sufficiently educate the elderly on these issues. Lastly, children in many cases<br>spend the most time online, so cybersecurity awareness advocates do try to keep them in mind<br>when making presentations.<br>Conclusion<br>In conclusion, cybersecurity awareness advocates play a very crucial part in battling<br>significant cybersecurity vulnerabilities. They do this mainly by applying social sciences and<br>social science principles to the cybersecurity awareness education they do. Cybersecurity<br>awareness advocates also make a point to educate marginalized groups such as the elderly,<br>immigrants, and children, as well as the public. They effectively tailor their presentations to<br>reach their audience in the best way they can. Cybersecurity awareness advocates are able to<br>effectively turn the very technical field of cybersecurity into an easy-to-understand and digestible<br>topic for the public. This is why cybersecurity awareness advocates are essential and provide the<br>much-needed insight into the social sciences to successfully mitigate human error in cyber<br>breaches.<br>Works Cited<br>Carley, K. M. (2020). Social cybersecurity: An emerging science. Springer Nature Link, Social<br>Cyber-Security. Retrieved from https:\/\/link.springer.com\/article\/10.1007\/s10588-020-09322-9<br>Haney, J., &amp; Lutters, W. (2017). Skills and characteristics of successful cybersecurity advocates.<br>University of Maryland, Baltimore County. Retrieved from<br>https:\/\/www.usenix.org\/system\/files\/conference\/soups2017\/wsiw2017-haney.pdf<br>Haney, J., &amp; Lutters, W. (2018). How cybersecurity advocates overcome negative perceptions of<br>security. University of Maryland, Baltimore County. Retrieved from<br>https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/haney-perceptions<br>Lin, Y.-Y., Hsu, H.-M., &amp; Hsu, S.-C. (n.d.). A study of the effects of information security<br>advocacy. Association for Information Systems, AIS Electronic Library (AISeL). Retrieved from<br>https:\/\/core.ac.uk\/download\/pdf\/326833228.pdf<br>OVHcloud. (n.d.). Cyber threat: The role of human error. Retrieved November 24, 2024, from<br>https:\/\/us.ovhcloud.com\/resources\/blog\/cyber-threat-human-error\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Career Paper Paul CumiskeyDiwakar YalpiCybersecurity and the Social SciencesNovember 17, 2024Career Paper &#8211; How Cybersecurity advocates use the social sciences and their principles toreduce cyber threatsIntroductionWhen people think of cybersecurity, they usually think of topics that go over their head.Things like network security, hackers, and large data breaches in the past make it seem like&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":29376,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/pages\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/users\/29376"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/pages\/274\/revisions"}],"predecessor-version":[{"id":277,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/pages\/274\/revisions\/277"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/media?parent=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}