{"id":287,"date":"2024-12-10T17:39:57","date_gmt":"2024-12-10T17:39:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/?page_id=287"},"modified":"2024-12-11T05:11:28","modified_gmt":"2024-12-11T05:11:28","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/career-paper\/","title":{"rendered":"Career paper"},"content":{"rendered":"\n<p>Jahmeel Campbell<br>Cybersecurity Career Professional Paper<br>CYSE 201S<\/p>\n\n\n\n<p>Introduction<br>Information Security Analysts are responsible for keeping computer systems safe from<br>hackers and other online threats. While their work involves a lot of technical tasks, they also<br>depend on social science to do their jobs as well. Social science helps them understand how<br>people behave, how to communicate risks effectively, and how to make ethical decisions.<br>Understanding Common Mistakes<br>One big part of an Information Security Analyst\u2019s job is finding ways to prevent human<br>mistakes, which is one of the leading causes of security problems. Employees, for example, may<br>unintentionally click on phishing emails or use weak passwords, increasing the vulnerability of<br>systems to attackers. Social science helps analysts understand why these mistakes happen.<br>Psychology shows that stress and cognitive overload can make people more likely to fall for<br>scams. Analysts utilize this knowledge to develop training programs that teach employees how to<br>recognize phishing emails and avoid risky activities. By replicating real-life circumstances, they<br>teach people to respond calmly and correctly when something suspicious occurs.<br>Communicating Risks<br>Another key part of the job is explaining security risks to people who don\u2019t have<br>technical backgrounds, like company executives or employees. Social science principles,<\/p>\n\n\n\n<p>especially those related to communication, help analysts simplify technical concepts and make<br>them easier to understand. For example, analysts often use visual tools like graphs or real-life<br>examples to show how a cyberattack could hurt the company. They also use persuasive<br>strategies, like highlighting how security measures can save time and money, to encourage<br>people to follow cybersecurity rules.<br>Information Security Analysts are sometimes forced to make difficult decisions about<br>privacy and monitoring. For example, they may need to use tools that monitor employee<br>activities to detect potential dangers. However, these technologies might feel intrusive,<br>particularly for individuals from underrepresented groups who may already feel monitored or<br>investigated. Social science provides ethical frameworks that help analysts make rational<br>choices. Analysts can use these frameworks to find a balance between keeping the organization<br>safe and respecting people\u2019s privacy. For example, rather than monitoring everything an<br>employee does online, they can concentrate on interactions that appear suspect.<br>How this Work Impacts Marginalized Groups and Society<br>Some groups, like low-income families or people with disabilities, face more challenges<br>in staying safe online. They may not have access to the most advanced technology or may<br>struggle to comprehend complex security procedures. Information security analysts can help by<br>advocating for more straightforward, inclusive solutions. Analysts, for example, may try to make<br>two-factor authentication easier for those who don&#8217;t have cellphones or provide training materials<br>in several languages. These initiatives make cybersecurity more accessible to all, not just those<br>with significant technological expertise.<\/p>\n\n\n\n<p>The work of information security analysts serves society as a whole. By protecting<br>important systems, like hospitals, banks, and government websites, they help keep everyone\u2019s<br>personal data safe. Analysts also conduct public awareness efforts to educate individuals on how<br>to avoid internet scams and secure their personal information. These efforts&nbsp;increase trust in<br>technology and contribute to a safer digital world for everyone.<br>Conclusion<br>Information Security Analysts employ a combination of technical skills and social<br>science expertise to protect individuals and businesses from cyber dangers. They improve<br>cybersecurity by better understanding human behavior, communicating effectively, and making<br>ethical decisions. Their efforts not only keep businesses safe, but also benefit underprivileged<br>communities&nbsp;and contribute to a more secure society. As the digital world expands, the mix of<br>social science and technology will remain critical to keeping everyone\u2019s information secure.<\/p>\n\n\n\n<p>References<br>Carley, K. M. (2020). Social cybersecurity: an emerging science. Computational and<br>Mathematical Organization Theory, 26(4), 365\u2013381. https:\/\/doi.org\/10.1007\/s10588-020-<br>09322-9<br>Igor Bernik. (2023). Teaching Social Science Aspects of Information Security. European<br>Conference on Cyber Warfare and Security, 22(1), 83\u201388.<br>https:\/\/doi.org\/10.34190\/eccws.22.1.1210<br>Stockman, M. (2013). Infusing social science into cybersecurity education. Proceedings of the<br>14th Annual ACM SIGITE Conference on Information Technology Education, 121\u2013124.<br>https:\/\/doi.org\/10.1145\/2512276.2512302<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jahmeel CampbellCybersecurity Career Professional PaperCYSE 201S IntroductionInformation Security Analysts are responsible for keeping computer systems safe fromhackers and other online threats. While their work involves a lot of technical tasks, they alsodepend on social science to do their jobs as well. Social science helps them understand howpeople behave, how to communicate risks effectively, and how&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":29731,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/287"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/users\/29731"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/287\/revisions"}],"predecessor-version":[{"id":364,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/287\/revisions\/364"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/media?parent=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}