Artifacts

Reed and Koliba (1995) highlight the distinction between merely absorbing information and truly experiencing it, suggesting that deeper learning often stems from active engagement with the subject matter. This aligns with the idea of experiential learning, where practical involvement facilitates understanding. While traditional resumes may struggle to capture such nuanced learning, ePortfolios offer a platform to showcase the process and outcomes of experience-based knowledge acquisition.

A significant instance of my own experiential learning involved developing an IoT Security blueprint through live online lessons. My motivation was driven by the need to understand the complexities of securing interconnected devices, a rapidly evolving and critical domain. The live lesson format provided a framework, but the true learning occurred through actively participating in hands-on exercises and real-time problem-solving scenarios. Initially, the concepts and tools felt abstract. However, by engaging in practical tasks such as configuring network security protocols for simulated IoT devices and identifying vulnerabilities through ethical hacking exercises, the theoretical knowledge began to solidify. This active participation, coupled with immediate feedback from the instructors and peers, was crucial in deciphering the intricacies of the blueprint development process.

This learning experience underscores several key skills. On the hard skills spectrum, it involved acquiring knowledge of IoT security principlesunderstanding network security protocols, and developing practical skills in vulnerability assessment. Soft skills demonstrated include active learning through engagement and participation, problem-solving in real-time scenarios, critical thinking to apply concepts to practical situations, and adaptability to navigate the dynamic nature of live exercises. This process of learning by doing, and the resulting blueprint, could be effectively documented and reflected upon in an ePortfolio to showcase the development of these competencies.

Week #2 Discussion Article 

Your Holtzman et al reading this week describes surveys of various industries and their use of eportfolios. While many indicated an interest in reviewing a candidate’s eportfolio, some still don’t know what they are. Others would use them if they had instructions about how to. Based on what you learned in that article, how might you encourage an interviewer to review your portfolio? What would be your approach to sharing it and making sure it is looked at? How would you describe an eportfolio to an interviewer? 

When confirming the interview, I would introduce my ePortfolio as an online showcase of my work, emphasizing its relevance to the position and how it offers a more comprehensive view of my qualifications beyond my resume. This approach aims to pique the interviewer’s curiosity and interest in learning more about me before our meeting. I would offer to send the link, making it convenient for them to access and review at their leisure.  

During the interview, I would strategically reference specific parts of my ePortfolio that align with the job requirements, showing how my skills and experiences directly relate to the role. For example, I might say, “As you can see in the project sample on page 3 of my ePortfolio, I have experience with [specific skill] that directly relates to this position.” This method allows me to give concrete examples of my capabilities and how they match the company’s needs.  

If asked to explain what an ePortfolio is, I’d describe it as an online collection of my best work samples, projects, and accomplishments, providing tangible evidence of my skills and experiences. This explanation would help to clarify the value of the ePortfolio for those who may be unfamiliar with the concept.  

After the interview, I would send a thank-you note including another link to my ePortfolio, highlighting a specific relevant piece discussed during our conversation. This follow-up serves two purposes: it reinforces my qualifications and provides easy access for the interviewer to review my work when discussing candidates with colleagues.  

By consistently referencing and providing access to my ePortfolio throughout the interview process, I increase the likelihood of it being reviewed and considered in the hiring decision. This approach shows my initiative, preparation, and commitment to offering a comprehensive view of my qualifications, potentially setting me apart from other candidates. 

Week 3 Discussion Article 

Having collected artifacts from previous coursework, identify at least 3 skills that you’ve gained during your academic career. These may be broad skills (e.g. research) or specific skills (e.g. Python). Consider, too, any soft skills after looking over this week’s readings as well as skills identified in job advertisements you’ve observed. List these in your post and discuss assignments you have that might exemplify each skill.   

Throughout my academic career as an epidemiologist with a background in biology and philosophy, I have developed skills in Research and Analytics, Communications, Interpersonal and Collaborative Studies. My coursework in epidemiology and biology has increased my ability to collect, analyze and interpret data. For example, assignments involving statistical modeling of disease transmission using software like SAS and Epi-info exemplify this skill. These tasks required me to analyze complex datasets to find trends and make evidence-based recommendations.  

My skills in communicating were vital in epidemiology, especially when translating my findings into actionable insights for diverse audiences. My experience includes writing research papers on public health trends and presenting findings during group projects. These tasks prove my ability to convey technical information clearly and persuasively.  

I also developed interpersonal and collaboration skills working on team-based projects. This has strengthened my ability to collaborate with peers from various disciplines. For instance, group assignments on outbreak investigations required active listening, conflict resolution, and using team strengths to achieve shared goals.  

Since I started my career in academics at ODU, I have learned how to apply my communication skills in ways that I never did before. For instance, using the computer as opposed to meeting in person, using emails more and the phone less. This form of communication is more efficient because it saves time and money. I appreciate it and sometimes regret that I had not used these means earlier in my career.   

Week 4 Readings/Job Ad Discussion 

Based on the job ad for an Associate Consultant position here are three most important skills that I think would be most important to the job:   

  1. Research and analysis: The ad emphasizes “Conduct quantitative and qualitative research” and “Analyze data and draft clear and compelling presentations”
  1. Communication: “Excellent verbal and written communication skills” are explicitly needed, along with the ability to forge “close relationships with clients and colleagues”
  1. Project management: The role involves “Support project management by monitoring progress against timelines, milestones and budgets for multiple concurrent engagements”

 Company culture: The culture appears to be fast paced, collaborative and learning oriented. The ad mentioned phrases like “Work as part of a diverse team” and “collaborative professional environment” suggesting a team-based approach. The emphasis on “juggle multiple demands” and “taking initiative” implies a robust work environment. From the way the ad was written you can tell the company values continuous learning, as shown by “Humility to recognize that we are learning all the time, and the hunger to use challenges as opportunities to gain new knowledge”.  

 Working experience: Working there might be challenging but rewarding. The job offers a variety of engagements and opportunities for growth. However, it may also be demanding, requiring strong multitasking abilities and self-motivation.  

Encouraging applicants: The ad encourages applicants by highlighting opportunities for direct client engagement, diverse responsibilities, and professional growth. Phrases like “engages directly with clients” and “develop and implement human capital management strategies” imply serious work with consequences.  

Presentation and improvements: The presentation clearly outlines the responsibilities and qualifications. However, it could be improved by more transparency about the companies benefits and career progression opportunitiesspecifics about the types of nonprofit clients or projects, providing salary range information to set clear expectations and using bullet points consistently for better readability. 

ARTICLE: Ray Harper  
The collection and analysis of job advertisements: a review of 
research methodolog
Abstract 
An increasing number of research studies in LIS use job adverts as a data source 
to analyze and track changes to job skills and the employment market over time. 
This review of 70 research studies in LIS aims to provide an overview of key 
characteristics of existing research methods, and to suggest improvements which 
could be made to methods. The researcher analyzed various aspects of each 
study using a quantitative approach and noted salient features of each study’s 
methodology. The review found that studies of job adverts in LIS are 
characterised by large sample sizes often collected using purposive sampling; a 
lack of full pilot studies and ethical assessments; minimal use of inferential 
statistics and automatic text analysis; and minimal use of complementary 
empirical methods. Studies of job adverts could be improved by fuller 
preparation of research methods, more sophisticated methods of analysis, and 
greater use of secondary empirical methods. 

CAREER PAPER

The Role of Social Science in the Career of Cybersecurity Engineers 

Tryfene Scott 

Old Dominion University 

CYSE201S 

Professor Diwakar Yalpi 

April 8, 2025 

Introduction 

Cybersecurity engineers depend heavily on social science to do their jobs effectively. Their work involves not just technical defense mechanisms, but also understanding human behavior, organizational systems, and societal impacts. Cybersecurity engineering is a dynamic field at the intersection of technology, risk management, and human behavior. This paper explores how cybersecurity engineers integrate social science into their work, with a focus on interactions with society at large and marginalized communities. 

Understanding the Human Element in Cybersecurity 

One of the most significant applications of social science in cybersecurity engineering is the focus on the human element in security systems. According to Hadnagy (2018), social engineering attacks exploit human psychology rather than technical vulnerabilities. Cybersecurity engineers use psychological and sociological research to predict and mitigate these threats. For instance, engineers analyze phishing attack trends, which often rely on fear, urgency, or curiosity to trick users into compromising systems. The development of training programs, security awareness campaigns, and user-friendly security interfaces stems directly from social science principles aimed at shaping behavior and improving compliance. 
 
Furthermore, cybersecurity engineers apply concepts from behavioral economics and decision theory when designing authentication systems or intrusion detection alerts. The way security features are arranged influences user choices, a strategy supported by the concept of ‘choice architecture’ (Thaler & Sunstein, 2008). These approaches demonstrate that understanding how people make decisions under stress or uncertainty is as vital as understanding encryption algorithms. 

Cybersecurity in Organizational and Social Contexts 

Cybersecurity engineers operate within organizational structures and broader societal systems. The concept of ‘organizational culture,’ a staple in sociology and anthropology, directly impacts how security protocols are adopted within companies. Engineers must navigate internal politics, leadership priorities, and staff attitudes toward compliance. For example, if a workplace culture values speed over procedure, engineers must tailor their solutions to ensure minimal disruption while maximizing security. 
 
On a larger scale, cybersecurity engineers must be aware of how their work interacts with societal values like privacy, freedom of expression, and public safety. Surveillance tools, though developed for protection, can unintentionally harm civil liberties—especially those of marginalized communities who face greater systemic scrutiny (Nissenbaum, 2010). Thus, engineers must not only understand technical risk but also ethical and social ramifications. 

Engaging with Marginalized Groups and Promoting Equity 

Because cybersecurity engineers serve a broad range of users, they must consider how marginalized populations experience distinct security vulnerabilities. For example, low-income individuals may rely on older devices or public Wi-Fi, increasing their vulnerability to cyberattacks. Similarly, members of the LGBTQ+ community or political dissidents may be targets of online harassment or surveillance. 
 
Social science research helps engineers understand these dynamics and design inclusive, equitable systems. Disciplines like anthropology and psychology inform human-centered design, which helps engineers integrate underrepresented user needs into their risk assessments and interface evaluations (Costanza-Chock, 2020). Engineers who engage with these perspectives can advocate for inclusive policies, such as default encryption, access to digital literacy training, or protection for vulnerable populations. 

Daily Application of Key Social Science Concepts 

In their day-to-day work, cybersecurity engineers apply several core social science concepts. ‘Risk perception,’ for example, helps them prioritize threats based on how users and stakeholders perceive various dangers—not just statistical likelihood. ‘Social norms’ guide their understanding of user behavior and adherence to security protocols. Additionally, ‘communication theory’ supports engineers in crafting effective messaging to influence secure user behavior, whether through emails, alerts, or training sessions.To model threats and evaluate insider risks, engineers frequently apply social science insights and behavioral data. These practices bridge the gap between technical infrastructure and human behavior, emphasizing the interdisciplinary nature of the profession. 

Conclusion 

Cybersecurity engineers are not solely technicians; they are behavioral strategists, ethical advisors, and cultural translators. Their work depends heavily on insights from social science disciplines to create secure, usable, and ethical systems. From understanding user behavior to navigating the broader social implications of surveillance and privacy, social science is deeply embedded in the fabric of cybersecurity engineering. As digital infrastructure becomes more integral to society, the integration of social science principles into cybersecurity will only grow in importance, especially in addressing the needs of marginalized groups and ensuring equitable protection for all.  

References 

Costanza-Chock, S. (2020). *Design justice: Community-led practices to build the worlds we need*. MIT Press. 
Hadnagy, C. (2018). *Social engineering: The science of human hacking*. Wiley. 
Thaler, R. H., & Sunstein, C. R. (2008). *Nudge: Improving decisions about health, wealth, and happiness*. Yale University Press. 
Nissenbaum, H. (2010). *Privacy in context: Technology, policy, and the integrity of social life*. Stanford University Press. 

PRESENTATION

The Role of Social Media in Cybersecurity Threats
Where Technology, Psychology and
Ethics Intersect

https://olddominion-my.sharepoint.com/:b:/g/personal/tscot047_odu_edu/Ef2lYtns__5AhD6FWU6LOK0BMhZ59F6w4HVHkXRlhyYodw?e=MmJeGo

BLOG – https://insightglobal.com/blog/essential-cloud-skills-for-2025/

Personality Profile Integration

Personality Profile Integration (Modeled After Appendices): Scoring 96/100 in conscientiousness and 96/100 in agreeableness, my Big Five assessment reflects a strong orientation toward collaborative achievement and meticulous execution of responsibilities. High conscientiousness correlates with sustained productivity in structured environments, evidenced by consistent leadership in cross-functional project management roles, while elevated agreeableness underscores an aptitude for conflict resolution and team cohesion—traits critical for client-facing and managerial positions1. With 79/100 in extraversion, I balance independent task focus with the relational skills necessary for stakeholder engagement, aligning with research linking moderate-high extraversion to leadership effectiveness in autonomous roles. A 0/100 score in negative emotionality indicates resilience under high-pressure scenarios, reducing burnout risks in fast-paced industries. These attributes—paired with 75/100 openness to experience—support adaptive problem-solving and receptiveness to innovative workflows, positioning me to thrive in organizations prioritizing cultural fit and operational reliability. Using this data and the source provided craft a paragraph like ones in the article’s prototypes (see Wright & Domalgaski appendices on pages 283 & 284 where the personality profile results are in the second paragraph of each example).  

Artifact – ANALYSIS OF A JOB AD 

Based on the job ad for an Associate Consultant position here are three most important skills that I think would be most important to the job:   

1. Research and analysis: The ad emphasizes “Conduct quantitative and qualitative research” and “Analyze data and draft clear and compelling presentations”.   

2. Communication: “Excellent verbal and written communication skills” are explicitly needed, along with the ability to forge “close relationships with clients and colleagues”.   

3. Project management: The role involves “Support project management by monitoring progress against timelines, milestones and budgets for multiple concurrent engagements”.  

 Company culture: The culture appears to be fast paced, collaborative and learning oriented. The ad mentioned phrases like “Work as part of a diverse team” and “collaborative professional environment” suggesting a team-based approach. The emphasis on “juggle multiple demands” and “taking initiative” implies a robust work environment. From the way the ad was written you can tell the company values continuous learning, as shown by “Humility to recognize that we are learning all the time, and the hunger to use challenges as opportunities to gain new knowledge”.  

 Working experience: Working there might be challenging but rewarding. The job offers a variety of engagements and opportunities for growth. However, it may also be demanding, requiring strong multitasking abilities and self-motivation.  

Encouraging applicants: The ad encourages applicants by highlighting opportunities for direct client engagement, diverse responsibilities, and professional growth. Phrases like “engages directly with clients” and “develop and implement human capital management strategies” imply serious work with consequences.  

Presentation and improvements: The presentation clearly outlines the responsibilities and qualifications. However, it could be improved by more transparency about the companies benefits and career progression opportunities, specifics about the types of nonprofit clients or projects, providing salary range information to set clear expectations and using bullet points consistently for better readability.