{"id":374,"date":"2024-12-08T17:39:17","date_gmt":"2024-12-08T17:39:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/?p=374"},"modified":"2025-04-30T02:28:47","modified_gmt":"2025-04-30T02:28:47","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/2024\/12\/08\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center has-medium-font-size\">Career Paper: Cybersecurity Administrator &amp; Social Sciences<\/p>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Jaedyn D. Joe<\/p>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Old Dominion University<\/p>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">CYSE 201S: Cybersecurity &amp; Social Sciences<\/p>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Dr. Diwakar Yalpi<\/p>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">April 17<sup>th<\/sup>, 2025<\/p>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><strong>Career Paper: Cybersecurity Administrator &amp; Social Sciences<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-left has-medium-font-size\"><strong>Introduction<\/strong><\/h1>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; As technology has continued to improve over the years, this has allowed the cybersecurity discourse community to flourish. Since cybercrime has become a common occurrence for individuals on the internet, it has caused an increase in demand for cybersecurity professionals. Currently, cybersecurity has a 0% unemployment rate. This paper will discuss the daily routine of a cybersecurity administrator and how social science principles correlate with cybersecurity administrators.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-medium-font-size\"><strong>Cybersecurity Administrator Routine<\/strong><\/h2>\n\n\n\n<p>First, cybersecurity administrators\u2019 daily routine consists of system checks, monitor networks, and writing security reports (<em>A Day in the Life of a Cybersecurity Professional<\/em>, 2024). Cybersecurity administrators are tasked with managing the safety of the business\u2019 systems, networks, applications, devices, hardware, and software (<em>Cybersecurity Administrator Salary and Career Path | CyberSN<\/em>, 2024). Cybersecurity administrators usually work in teams to innovate and discuss potential ideas to best protect networks from cybercriminals. Also, there will be times where they will have to communicate cyber threats to less technologically savvy decision-makers in human resource management, so everyone is on the same page (Dawson &amp; Thomson, 2018). The previous example is a good representation of determinism because it shows that different departments are still related through cybersecurity.<\/p>\n\n\n\n<p>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">&nbsp;<\/h3>\n\n\n\n<p>References<\/p>\n\n\n\n<p><em>A day in the life of a cybersecurity professional<\/em>. (2024, October 28). Stjohns.edu. <a href=\"https:\/\/www.stjohns.edu\/news-media\/johnnies-blog\/day-life-cybersecurity-professional\">https:\/\/www.stjohns.edu\/news-media\/johnnies-blog\/day-life-cybersecurity-professional<\/a><\/p>\n\n\n\n<p><em>Cybersecurity Administrator Salary and Career Path | CyberSN<\/em>. (2024, April 9). CyberSN. <a href=\"https:\/\/cybersn.com\/role\/cybersecurity-administrator\/\">https:\/\/cybersn.com\/role\/cybersecurity-administrator\/<\/a> Dawson, J., &amp; Thomson, R. (2018). The future cybersecurity workforce: Going beyond technical skills for successful cyber performance. <em>Frontiers in Psychology<\/em>, <em>9<\/em>(9). <a href=\"https:\/\/doi.org\/10.3389\/fpsyg.2018.00744\">https:\/\/doi.org\/10.3389\/fpsyg.2018.00744<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Career Paper: Cybersecurity Administrator &amp; Social Sciences Jaedyn D. Joe Old Dominion University CYSE 201S: Cybersecurity &amp; Social Sciences Dr. Diwakar Yalpi April 17th, 2025 Career Paper: Cybersecurity Administrator &amp; Social Sciences Introduction &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; As technology has continued to improve over the years, this has allowed the cybersecurity discourse community to flourish. Since cybercrime has&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/2024\/12\/08\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":28545,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/posts\/374"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/users\/28545"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/comments?post=374"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/posts\/374\/revisions"}],"predecessor-version":[{"id":411,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/posts\/374\/revisions\/411"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/media?parent=374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/categories?post=374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaedyn-joe\/wp-json\/wp\/v2\/tags?post=374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}