{"id":114,"date":"2024-09-17T20:10:27","date_gmt":"2024-09-17T20:10:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/fl210languageinmotiondraft\/?page_id=114"},"modified":"2024-12-08T00:51:46","modified_gmt":"2024-12-08T00:51:46","slug":"partner-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasminewatford\/partner-2\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p><br>Cybersecurity Analyst: Bridging Technology and Social Science<br>Jasmine Watford<br>11\/23\/2024<br>Introduction<br>In an increasingly digital world, cybersecurity analysts play a crucial role in safeguarding<br>sensitive information from cyber threats. However, their responsibilities extend beyond mere technical expertise; they must also integrate principles of social science into their daily routines. This paper explores how cybersecurity analysts depend on social science research and concepts, emphasizing the interplay between technology, human behavior, and societal implications. The analysis will highlight the relevance of these principles to marginalized groups and the community.<br>Understanding Human Behavior<br>One of the primary functions of a cybersecurity analyst is to understand and predict<br>human behavior concerning cybersecurity practices. Research has shown that human error is a<br>significant vulnerability (Tayouri., 2015). Analysts examine social engineering tactics used by<br>attackers\u2014methods that manipulate individuals into divulging confidential information or<br>granting access to secure systems. By understanding cognitive biases and social behaviors,<br>analysts can develop more effective training programs to educate employees about potential<br>threats, thereby reducing the risk of successful attacks.<br>For instance, the Principle of Least Effort suggests that individuals are likely to choose<br>the easiest path when faced with complex security protocols (Rohan, 2021). A cybersecurity<br>analyst may apply this principle by streamlining authentication processes to encourage stronger<br>password usage without overwhelming users. This emphasis on human factors not only<br>enhances security but also fosters a culture of awareness within organizations.<br>Cultural Competence and Inclusion<br>Cybersecurity analysts must also consider the diverse cultural backgrounds of users<br>when developing policies and protocols. Marginalized groups often face unique challenges<br>related to technology access, literacy, and perceptions of privacy and security. Social science<br>research provides insights into how different communities interact with technology and the<br>barriers they encounter.<br>For example, a study by the Pew Research Center (2021) highlights that low-income<br>communities are less likely to have access to the latest technology, which can impede their<br>ability to adhere to cybersecurity best practices. Analysts tasked with creating inclusive security<br>measures must engage with these populations to understand their experiences and challenges.<br>By applying principles of cultural competence, cybersecurity professionals can design solutions<br>that are accessible and relevant to all users, ensuring that no one is left vulnerable due to<br>systemic inequalities.<br>Communication and Community Engagement<br>Effective communication is another critical aspect of a cybersecurity analyst&#8217;s role.<br>Analysts must convey complex technical information to non-technical stakeholders, often<br>including those from marginalized groups who may not have extensive knowledge of<br>cybersecurity issues. Utilizing social science principles, particularly in communication theory,<br>analysts can tailor their messaging to resonate with diverse audiences, fostering greater<br>understanding and collaboration.<br>For instance, employing culturally relevant communication strategies can enhance trust<br>and cooperation among community members when addressing cybersecurity threats. When<br>analysts engage with marginalized groups, they foster a sense of shared responsibility for<br>cybersecurity, leading to a more resilient community. According to the National Institute of<br>Standards and Technology (NIST), engaging stakeholders through community outreach<br>initiatives can significantly improve overall security posture (NIST, 2021).<br>Conclusion<br>The role of a cybersecurity analyst requires an intersectional approach that<br>encompasses both technical skills and social science understanding. By applying principles of<br>human behavior, cultural competence, and effective communication, analysts can better protect<br>sensitive information and empower individuals and communities in the realm of cybersecurity.<br>As society continues to evolve alongside technology, the importance of integrating social<br>science research into cybersecurity practices will only deepen, ensuring that security measures<br>are equitable, effective, and inclusive.<br>References<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<ol>\n<li>Rohan, Funilkul, Pal (2021). Understanding human factors in cybersecurity. Journal of<br>Cybersecurity Research.<br>https:\/\/www.researchgate.net\/publication\/359924870_Understanding_of_Human_Factors_in_Cy<br>bersecurity_A_Systematic_Literature_Review<\/li>\n\n\n\n<li>Pew Research Center. (2021). Digital divide persists even as Americans with lower incomes<br>make gains in tech adoption.<br>https:\/\/www.pewresearch.org\/short-reads\/2021\/06\/22\/digital-divide-persists-even-as-americans-<br>with-lower-incomes-make-gains-in-tech-adoption\/<\/li>\n\n\n\n<li>David Tayouri (2015). The Human Factor in Social Media Security \u2013 Combining Education<br>and Technology to Reduce Social Engineering Risks and Damages.<br>https:\/\/www.researchgate.net\/publication\/283961973_The_Human_Factor_in_the_Social_Media<br><em>Security<\/em>-_Combining_Education_and_Technology_to_Reduce_Social_Engineering_Risks_an<br>d_Damages<\/li>\n\n\n\n<li>National Institute of Standards and Technology (NIST). (2021). Cybersecurity and Privacy<br>Stakeholder Engagement.<br>https:\/\/www.nist.gov\/cybersecurity\/cybersecurity-privacy-stakeholder-engagement<\/li>\n<\/ol>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Analyst: Bridging Technology and Social ScienceJasmine Watford11\/23\/2024IntroductionIn an increasingly digital world, cybersecurity analysts play a crucial role in safeguardingsensitive information from cyber threats. However, their responsibilities extend beyond mere technical expertise; they must also integrate principles of social science into their daily routines. This paper explores how cybersecurity analysts depend on social science research&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jasminewatford\/partner-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29687,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasminewatford\/wp-json\/wp\/v2\/pages\/114"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasminewatford\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasminewatford\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasminewatford\/wp-json\/wp\/v2\/users\/29687"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasminewatford\/wp-json\/wp\/v2\/comments?post=114"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jasminewatford\/wp-json\/wp\/v2\/pages\/114\/revisions"}],"predecessor-version":[{"id":268,"href":"https:\/\/sites.wp.odu.edu\/jasminewatford\/wp-json\/wp\/v2\/pages\/114\/revisions\/268"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasminewatford\/wp-json\/wp\/v2\/media?parent=114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}