{"id":344,"date":"2024-08-05T01:54:29","date_gmt":"2024-08-05T01:54:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/esty05\/?p=344"},"modified":"2024-08-05T01:54:29","modified_gmt":"2024-08-05T01:54:29","slug":"article-analysis","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/esty05\/2024\/08\/05\/article-analysis\/","title":{"rendered":"Article Analysis"},"content":{"rendered":"Review of Social Science and Cybersecurity Articles<br \/>Introduction<br \/>The articles reviewed in the annotated bibliography relate to the themes of cybersecurity from the social sciences perspective. The understanding of how these topics link with the principles of the social sciences, the research questions or hypotheses of these studies, the research methodologies used, how the data was analyzed, the application of the notions in class, the degree of consideration given towards the plight of minority groups, and the societal impact of these topics shall form the basis of this review. <br \/> 1. Relation to Social Science Principles <br \/>As illustrated by the critical approaches in these articles, social sciences are evident in cybersecurity. For instance, Dwyer et al. (2022) step outside the box and ask questions about power relations while presenting a case for justice in cybersecurity. This is because it corresponds with many tenets of social sciences, especially those that relate to issues of power, equity and the rights of the suffering or oppressed groups.<br \/>In the same context, Wu et al. (2022) pay attention to social cybersecurity, which incorporates social aspects into technical ones. This approach speaks volumes about behavioural and social relations in formulating security and eradicating cybercrime, which aligns well with the social science discipline. <br \/>2. Research Questions and Hypotheses <br \/>Each study poses unique research questions that bridge the gap between cybersecurity and social sciences: <br \/>\u2022\tDwyer et al. (2022): Dwyer et al. (2022): What does critical cybersecurity entail, and how can it aid the progression of social justice against cyber threats?<br \/>\u2022\tMedoh and Telukdarie (2022): This paper seeks to answer the following questions: 1. What are the consequences of the Fourth Industrial Revolution in cybersecurity scenarios? 2. Can the System Dynamics Modeling (SDM) assist in strategic planning and execution of cybersecurity measures? <br \/>\u2022\tWu et al. (2022): Which social factors should be incorporated into the technical security models to improve the handling of security and privacy issues? <br \/>\u2022\tPopoola et al. (2024): What influences the execution of cybersecurity awareness training programs in Africa and the United States? <br \/> 3. Research Methods <br \/> The articles employ various research methods: <br \/>\u2022\tDwyer et al. (2022): To assess the current strategies in cybersecurity, qualitative research, critical theory, and political sociology will be used to present the new concepts.<br \/>\u2022\tMedoh and Telukdarie (2022): System Dynamics Modeling (SDM) to model and predict the effects of cybersecurity initiatives and future undertakings. <br \/>\u2022\tWu et al. (2022): Application of Systematization of knowledge (SoK) technique to classify the literature and discover the research gaps in social cybersecurity. <br \/>\u2022\tPopoola et al. (2024): Using a comparative literature analysis to compare the theoretical concepts of cybersecurity awareness and training programs in various cultural and economic environments. <br \/> 4. Data and Analysis <br \/>\u2022\tDwyer et al. (2022): Qualitative information should be employed to question prevailing structures regulating cybersecurity conduct and supporting social justice formations. <br \/>\u2022\tMedoh and Telukdarie (2022): Make industry contribution and dynamic modelling data to build a living model for the cybersecurity plan. <br \/>\u2022\tWu et al. (2022): Assessment of the current literature to establish trends and the lack of social cybersecurity practices. <br \/>\u2022\tPopoola et al. (2024): Organize a comparison between two program designs, their implementation and results to point out inconsistencies and to make recommendations. <br \/> 5. Class Concepts <br \/>The articles are associated with the concepts explored in social science classes, including power relations, fairness, behaviourism, and technology adaptation to society. For instance, Dwyer et al. (2022) describe the problem of power dynamics and stress the need to change the cybersecurity paradigm to reflect social justice and equity theories. Thus, following Wu et al. (2022), special attention should be paid to social behaviour within security practices that touch on social psychology and human-computer interaction issues. <br \/> Relevance to Marginalized Groups <br \/>The studies highlight the importance of considering marginalized groups in cybersecurity: <br \/>\u2022\tDwyer et al. (2022): Develop a new, more critical cybersecurity understanding focusing on the vulnerabilities and power issues affecting marginalized communities. <br \/>\u2022\tMedoh and Telukdarie (2022) Emphasize the role of creating segmented cybersecurity policies, considering the consequences of digitalization in various parts of society. <br \/>\u2022\tWu et al. (2022) Stress the importance of the social factors that need to be considered in the existing security approaches since this strategy might safeguard the threatened groups&#8217; members by addressing the individual abilities that would allow them to implement the security options provided. <br \/>\u2022\tPopoola et al. (2024) draw a contrast between the cybersecurity awareness programs in Africa and those of the USA, examining how the different factors, such as culture and economy, influence the results and why the absence of a generic solution is necessary. <br \/> 6. Overall Contributions to Society<br \/>Collectively, the studies are insightful because they may offer novel strategies for more equitable, efficient and socially conscious cybersecurity. It is, therefore, imperative that as advanced as the field of cybersecurity&#8217;s work is, it owes it to society to begin taking the lead from Dwyer et al. (2022) by integrating social justice into the workflows to enhance fairness and protection possibly. Alaa Medoh and Telukdarie (2022) provide a dynamic model that will enable organizations to develop a strategic cybersecurity plan amidst these advancements. Wu et al. (2022) offer a framework that further explains how social factors can be included in cybersecurity, which, in turn, will lead to more secure and comfortable solutions. In their work, Popoola et al. (2024) explain possible cultural and economic differences that can be considered when improving the cybersecurity education processes at the international level. <br \/>Conclusion<br \/>The reviewed articles help to continue discussions about the lack of connection between social sciences and cybersecurity and the need to factor social justice, human behaviour, and cultural perception into cybersecurity solutions. Thus, these studies call for a synergy in research efforts across the disciplines to deal with complicated cybersecurity problems and secure endangered communities. Therefore, through engaging social sciences concepts, the study provides valuable input in achieving better, open, and fair practices in cybersecurity to support society as a whole.<br \/>\u2003<br \/>References<br \/>Dwyer, A. C., Stevens, C., Muller, L. P., Cavelty, M. D., Coles-Kemp, L., &amp; Thornton, P. (2022). What can a critical cybersecurity do? International Political Sociology, 16(3), olac013. <br \/>Medoh, C., &amp; Telukdarie, A. (2022). The future of cybersecurity: A system dynamics approach. Procedia Computer Science, 200, 318-326.<br \/>Popoola, O. A., Akinsanya, M. O., Nzeako, G., Chukwurah, E. G., &amp; Okeke, C. D. (2024). Exploring theoretical constructs of cybersecurity awareness and training programs: a comparative analysis of African and US Initiatives. International Journal of Applied Research in Social Sciences, 6(5), 819-827.<br \/>Wu, Y., Edwards, W. K., &amp; Das, S. (2022, May). SoK: Social Cybersecurity. In 2022 IEEE Symposium on Security and Privacy (SP) (pp. 1863-1879). IEEE.<br \/>","protected":false},"excerpt":{"rendered":"<p>Review of Social Science and Cybersecurity ArticlesIntroductionThe articles reviewed in the annotated bibliography relate to the themes of cybersecurity from the social sciences perspective. The understanding of how these topics link with the principles of the social sciences, the research questions or hypotheses of these studies, the research methodologies used, how the data was analyzed, [&hellip;]<\/p>\n","protected":false},"author":28250,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/344"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/users\/28250"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/344\/revisions"}],"predecessor-version":[{"id":363,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/344\/revisions\/363"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/media?parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/categories?post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/tags?post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}