Career paper

Jahmeel Campbell
Cybersecurity Career Professional Paper
CYSE 201S

Introduction
Information Security Analysts are responsible for keeping computer systems safe from
hackers and other online threats. While their work involves a lot of technical tasks, they also
depend on social science to do their jobs as well. Social science helps them understand how
people behave, how to communicate risks effectively, and how to make ethical decisions.
Understanding Common Mistakes
One big part of an Information Security Analyst’s job is finding ways to prevent human
mistakes, which is one of the leading causes of security problems. Employees, for example, may
unintentionally click on phishing emails or use weak passwords, increasing the vulnerability of
systems to attackers. Social science helps analysts understand why these mistakes happen.
Psychology shows that stress and cognitive overload can make people more likely to fall for
scams. Analysts utilize this knowledge to develop training programs that teach employees how to
recognize phishing emails and avoid risky activities. By replicating real-life circumstances, they
teach people to respond calmly and correctly when something suspicious occurs.
Communicating Risks
Another key part of the job is explaining security risks to people who don’t have
technical backgrounds, like company executives or employees. Social science principles,

especially those related to communication, help analysts simplify technical concepts and make
them easier to understand. For example, analysts often use visual tools like graphs or real-life
examples to show how a cyberattack could hurt the company. They also use persuasive
strategies, like highlighting how security measures can save time and money, to encourage
people to follow cybersecurity rules.
Information Security Analysts are sometimes forced to make difficult decisions about
privacy and monitoring. For example, they may need to use tools that monitor employee
activities to detect potential dangers. However, these technologies might feel intrusive,
particularly for individuals from underrepresented groups who may already feel monitored or
investigated. Social science provides ethical frameworks that help analysts make rational
choices. Analysts can use these frameworks to find a balance between keeping the organization
safe and respecting people’s privacy. For example, rather than monitoring everything an
employee does online, they can concentrate on interactions that appear suspect.
How this Work Impacts Marginalized Groups and Society
Some groups, like low-income families or people with disabilities, face more challenges
in staying safe online. They may not have access to the most advanced technology or may
struggle to comprehend complex security procedures. Information security analysts can help by
advocating for more straightforward, inclusive solutions. Analysts, for example, may try to make
two-factor authentication easier for those who don’t have cellphones or provide training materials
in several languages. These initiatives make cybersecurity more accessible to all, not just those
with significant technological expertise.

The work of information security analysts serves society as a whole. By protecting
important systems, like hospitals, banks, and government websites, they help keep everyone’s
personal data safe. Analysts also conduct public awareness efforts to educate individuals on how
to avoid internet scams and secure their personal information. These efforts increase trust in
technology and contribute to a safer digital world for everyone.
Conclusion
Information Security Analysts employ a combination of technical skills and social
science expertise to protect individuals and businesses from cyber dangers. They improve
cybersecurity by better understanding human behavior, communicating effectively, and making
ethical decisions. Their efforts not only keep businesses safe, but also benefit underprivileged
communities and contribute to a more secure society. As the digital world expands, the mix of
social science and technology will remain critical to keeping everyone’s information secure.

References
Carley, K. M. (2020). Social cybersecurity: an emerging science. Computational and
Mathematical Organization Theory, 26(4), 365–381. https://doi.org/10.1007/s10588-020-
09322-9
Igor Bernik. (2023). Teaching Social Science Aspects of Information Security. European
Conference on Cyber Warfare and Security, 22(1), 83–88.
https://doi.org/10.34190/eccws.22.1.1210
Stockman, M. (2013). Infusing social science into cybersecurity education. Proceedings of the
14th Annual ACM SIGITE Conference on Information Technology Education, 121–124.
https://doi.org/10.1145/2512276.2512302