{"id":330,"date":"2024-08-05T01:51:57","date_gmt":"2024-08-05T01:51:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/esty05\/?p=330"},"modified":"2024-08-05T01:51:57","modified_gmt":"2024-08-05T01:51:57","slug":"annotated-bibliography","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/esty05\/2024\/08\/05\/annotated-bibliography\/","title":{"rendered":"Annotated Bibliography"},"content":{"rendered":"Annotated Bibliography on Social Science and Cybersecurity<br \/>The present annotated bibliography aims to highlight various peer-reviewed articles<br \/>published in the last few years that discuss different aspects of social science and cybersecurity.<br \/>Dwyer et al. (2022) explore the shift in a critical cybersecurity perspective seeking to advance<br \/>social justice to counter cyber threats. Medoh and Telukdarie (2022) employ System Dynamics<br \/>Modelling to reflect on the impact of the Fourth Industrial Revolution on cybersecurity. In the<br \/>work of Wu et al. (2022), the authors focus on social cybersecurity and the necessity of<br \/>incorporating social factors into technical security frameworks. Last, Popoola et al. (2024) focus<br \/>on the difference between cybersecurity awareness and training programs in Africa and the USA<br \/>and discuss the impact of the cultural and economic disparity between these regions. Altogether,<br \/>the presented articles cover key issues and approaches to cybersecurity in the context of social<br \/>sciences in the present day.<br \/>Dwyer, A. C., Stevens, C., Muller, L. P., Cavelty, M. D., Coles-Kemp, L., &amp; Thornton, P. (2022).<br \/>What can a critical cybersecurity do? International Political Sociology, 16(3), olac013.<br \/>This article compares a critical approach to cybersecurity and the effects that will ensue<br \/>from its application. Closely, it analyses what the traditional approaches to cybersecurity<br \/>strengthen the power imbalance and what other strategies can be applied instead.<br \/>Highlighting the individual&#8217;s and society&#8217;s vulnerability in most cybersecurity studies, the<br \/>authors appeal for a more rigorous and diverse cybersecurity investigation within societies&#8217;<br \/>political processes. They stress the need to embrace social justice in cybersecurity,<br \/>considering the statistical nature of threats and responses. This work is essential due to its<br \/>paradigm shift regarding cyber security. Thus, it is a vital reference source, especially for<br \/>scholars and practitioners interested in the broader security perspective.<br \/>3<br \/>Medoh, C., &amp; Telukdarie, A. (2022). The future of cybersecurity: A system dynamics<br \/>approach. Procedia Computer Science, 200, 318-326.<br \/>This article, presented at the 3rd International Conference on Industry 4.0 and Smart<br \/>Manufacturing, discusses the effects of the Fourth Industrial Revolution (4IR) on cyber<br \/>security. Medoh and Telukdarie use System Dynamics Modelling (SDM) to model the<br \/>impact of cybersecurity activities in network and security solution markets. It compiles and<br \/>evaluates the inputs from the industry participants involved in the study and incorporates<br \/>such into a living model that supports tactical and strategic planning and execution to<br \/>counter the risks posed by cybersecurity threats. The study also reinforces the necessity of<br \/>implementing new technologies for protecting corporate assets, including big data and<br \/>cloud computing, for sustainable development in digitalization.<br \/>Wu, Y., Edwards, W. K., &amp; Das, S. (2022, May). SoK: Social Cybersecurity. In 2022 IEEE<br \/>Symposium on Security and Privacy (SP) (pp. 1863-1879). IEEE.<br \/>This systematization of knowledge article analyzes prior work in social cybersecurity<br \/>across four key behavior domains: gaining entrance control to resources, shared and social<br \/>authentication, self-presentation, and socialization of security and privacy concerns. The<br \/>authors categorize the literature into four levels of social distance intimacy: intimate,<br \/>personal, social, and public. They also establish that the desired practices differ with this<br \/>structure. They pinpoint a social-technical chasm where none of the security and privacy<br \/>models consider social aspects, compelling users to employ reasonable best practices\/<br \/>security-based privacy and minimum social friction. The article lays down the course for<br \/>research that centers on developing social cybersecurity systems that would incorporate the<br \/>technical goals into societal needs.<br \/>4<br \/>Popoola, O. A., Akinsanya, M. O., Nzeako, G., Chukwurah, E. G., &amp; Okeke, C. D. (2024).<br \/>Exploring theoretical constructs of cybersecurity awareness and training programs:<br \/>comparative analysis of African and US Initiatives. International Journal of Applied<br \/>Research in Social Sciences, 6(5), 819-827.<br \/>This journal article offers a comprehensive comparative literature reflection of the<br \/>conceptual framework of cybersecurity awareness and training in Africa and the USA. The<br \/>authors explore how they are modified within cultural and economic differences of the two<br \/>regions to each of the theories of behaviorism, cognitivism, and constructivism. Sustaining<br \/>focus on the overview of the discrepancies in the program design, delivery, and results, the<br \/>article provides significant insights for the authorities and everyone who aims at improving<br \/>the effectiveness of the global cybersecurity education programs. The study provides a<br \/>strong foundation for making context-specific, place-oriented decisions while<br \/>simultaneously stressing cross-portal cooperation in the fight against emerging cyber<br \/>threats.<br \/>5<br \/>References<br \/>Dwyer, A. C., Stevens, C., Muller, L. P., Cavelty, M. D., Coles-Kemp, L., &amp; Thornton, P. (2022).<br \/>What can a critical cybersecurity do? International Political Sociology, 16(3), olac013.<br \/>Medoh, C., &amp; Telukdarie, A. (2022). The future of cybersecurity: A system dynamics<br \/>approach. Procedia Computer Science, 200, 318-326.<br \/>Popoola, O. A., Akinsanya, M. O., Nzeako, G., Chukwurah, E. G., &amp; Okeke, C. D. (2024).<br \/>Exploring theoretical constructs of cybersecurity awareness and training programs:<br \/>comparative analysis of African and US Initiatives. International Journal of Applied<br \/>Research in Social Sciences, 6(5), 819-827.<br \/>Wu, Y., Edwards, W. K., &amp; Das, S. (2022, May). SoK: Social Cybersecurity. In 2022 IEEE","protected":false},"excerpt":{"rendered":"<p>Annotated Bibliography on Social Science and CybersecurityThe present annotated bibliography aims to highlight various peer-reviewed articlespublished in the last few years that discuss different aspects of social science and cybersecurity.Dwyer et al. (2022) explore the shift in a critical cybersecurity perspective seeking to advancesocial justice to counter cyber threats. Medoh and Telukdarie (2022) employ System [&hellip;]<\/p>\n","protected":false},"author":28250,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/330"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/users\/28250"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":359,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/330\/revisions\/359"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}