Review of Social Science and Cybersecurity Articles
Introduction
The articles reviewed in the annotated bibliography relate to the themes of cybersecurity from the social sciences perspective. The understanding of how these topics link with the principles of the social sciences, the research questions or hypotheses of these studies, the research methodologies used, how the data was analyzed, the application of the notions in class, the degree of consideration given towards the plight of minority groups, and the societal impact of these topics shall form the basis of this review.
1. Relation to Social Science Principles
As illustrated by the critical approaches in these articles, social sciences are evident in cybersecurity. For instance, Dwyer et al. (2022) step outside the box and ask questions about power relations while presenting a case for justice in cybersecurity. This is because it corresponds with many tenets of social sciences, especially those that relate to issues of power, equity and the rights of the suffering or oppressed groups.
In the same context, Wu et al. (2022) pay attention to social cybersecurity, which incorporates social aspects into technical ones. This approach speaks volumes about behavioural and social relations in formulating security and eradicating cybercrime, which aligns well with the social science discipline.
2. Research Questions and Hypotheses
Each study poses unique research questions that bridge the gap between cybersecurity and social sciences:
• Dwyer et al. (2022): Dwyer et al. (2022): What does critical cybersecurity entail, and how can it aid the progression of social justice against cyber threats?
• Medoh and Telukdarie (2022): This paper seeks to answer the following questions: 1. What are the consequences of the Fourth Industrial Revolution in cybersecurity scenarios? 2. Can the System Dynamics Modeling (SDM) assist in strategic planning and execution of cybersecurity measures?
• Wu et al. (2022): Which social factors should be incorporated into the technical security models to improve the handling of security and privacy issues?
• Popoola et al. (2024): What influences the execution of cybersecurity awareness training programs in Africa and the United States?
3. Research Methods
The articles employ various research methods:
• Dwyer et al. (2022): To assess the current strategies in cybersecurity, qualitative research, critical theory, and political sociology will be used to present the new concepts.
• Medoh and Telukdarie (2022): System Dynamics Modeling (SDM) to model and predict the effects of cybersecurity initiatives and future undertakings.
• Wu et al. (2022): Application of Systematization of knowledge (SoK) technique to classify the literature and discover the research gaps in social cybersecurity.
• Popoola et al. (2024): Using a comparative literature analysis to compare the theoretical concepts of cybersecurity awareness and training programs in various cultural and economic environments.
4. Data and Analysis
• Dwyer et al. (2022): Qualitative information should be employed to question prevailing structures regulating cybersecurity conduct and supporting social justice formations.
• Medoh and Telukdarie (2022): Make industry contribution and dynamic modelling data to build a living model for the cybersecurity plan.
• Wu et al. (2022): Assessment of the current literature to establish trends and the lack of social cybersecurity practices.
• Popoola et al. (2024): Organize a comparison between two program designs, their implementation and results to point out inconsistencies and to make recommendations.
5. Class Concepts
The articles are associated with the concepts explored in social science classes, including power relations, fairness, behaviourism, and technology adaptation to society. For instance, Dwyer et al. (2022) describe the problem of power dynamics and stress the need to change the cybersecurity paradigm to reflect social justice and equity theories. Thus, following Wu et al. (2022), special attention should be paid to social behaviour within security practices that touch on social psychology and human-computer interaction issues.
Relevance to Marginalized Groups
The studies highlight the importance of considering marginalized groups in cybersecurity:
• Dwyer et al. (2022): Develop a new, more critical cybersecurity understanding focusing on the vulnerabilities and power issues affecting marginalized communities.
• Medoh and Telukdarie (2022) Emphasize the role of creating segmented cybersecurity policies, considering the consequences of digitalization in various parts of society.
• Wu et al. (2022) Stress the importance of the social factors that need to be considered in the existing security approaches since this strategy might safeguard the threatened groups’ members by addressing the individual abilities that would allow them to implement the security options provided.
• Popoola et al. (2024) draw a contrast between the cybersecurity awareness programs in Africa and those of the USA, examining how the different factors, such as culture and economy, influence the results and why the absence of a generic solution is necessary.
6. Overall Contributions to Society
Collectively, the studies are insightful because they may offer novel strategies for more equitable, efficient and socially conscious cybersecurity. It is, therefore, imperative that as advanced as the field of cybersecurity’s work is, it owes it to society to begin taking the lead from Dwyer et al. (2022) by integrating social justice into the workflows to enhance fairness and protection possibly. Alaa Medoh and Telukdarie (2022) provide a dynamic model that will enable organizations to develop a strategic cybersecurity plan amidst these advancements. Wu et al. (2022) offer a framework that further explains how social factors can be included in cybersecurity, which, in turn, will lead to more secure and comfortable solutions. In their work, Popoola et al. (2024) explain possible cultural and economic differences that can be considered when improving the cybersecurity education processes at the international level.
Conclusion
The reviewed articles help to continue discussions about the lack of connection between social sciences and cybersecurity and the need to factor social justice, human behaviour, and cultural perception into cybersecurity solutions. Thus, these studies call for a synergy in research efforts across the disciplines to deal with complicated cybersecurity problems and secure endangered communities. Therefore, through engaging social sciences concepts, the study provides valuable input in achieving better, open, and fair practices in cybersecurity to support society as a whole.
References
Dwyer, A. C., Stevens, C., Muller, L. P., Cavelty, M. D., Coles-Kemp, L., & Thornton, P. (2022). What can a critical cybersecurity do? International Political Sociology, 16(3), olac013.
Medoh, C., & Telukdarie, A. (2022). The future of cybersecurity: A system dynamics approach. Procedia Computer Science, 200, 318-326.
Popoola, O. A., Akinsanya, M. O., Nzeako, G., Chukwurah, E. G., & Okeke, C. D. (2024). Exploring theoretical constructs of cybersecurity awareness and training programs: a comparative analysis of African and US Initiatives. International Journal of Applied Research in Social Sciences, 6(5), 819-827.
Wu, Y., Edwards, W. K., & Das, S. (2022, May). SoK: Social Cybersecurity. In 2022 IEEE Symposium on Security and Privacy (SP) (pp. 1863-1879). IEEE.