{"id":218,"date":"2025-02-06T21:28:35","date_gmt":"2025-02-06T21:28:35","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-04-30T03:39:14","modified_gmt":"2025-04-30T03:39:14","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasondaamash\/skills-2\/","title":{"rendered":"Article 1"},"content":{"rendered":"\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color has-medium-font-size wp-elements-9ffb816faca82a57516e2277a3d9cb97\">Jason Daamash<br>February 20, 2025<br>Cybersecurity will become a global threat starting in early 2025. The substantial amount of<br>information in Forrester&#8217;s research, Predictions 2025: Cybersecurity, Risk, and Privacy, provides<br>a good summary of the risks to be anticipated, potential changes to legislation, and shared<br>responsibilities that security executives will have to deal with. This review discusses the<br>alignment of the report with social-science principles related to research questions, methods,<br>analysis, and consideration of societal implications, most especially for marginalized<br>communities.<br>Relation to Social Science Principles<br>A delicate relationship between technological superiority and social reaction is exposed in this<br>article. More specifically, how generative AI and IoT devices affect human interaction, trust, and<br>regulation is examined. Social science theories that examine how technology and society interact<br>and emphasize the need of behavioral insights and flexible policies in managing the always<br>changing cybersecurity landscape would be well suited to such a technological perspective.<br>Research Questions:<br>Forrester&#8217;s analysis addresses several pivotal questions:<br>\u25cf What are the potential regulatory actions against AI providers under new legislation?<br>\u25cf How might significant IoT breaches impact device security and public trust?<br>\u25cf What factors contribute to the growing disillusionment with generative AI among Chief<br>Information Security Officers (CISOs)?<br>\u25cf How will government restrictions on third-party and open-source software evolve?<br>\u25cf What is the projected financial impact of class-action lawsuits compared to regulatory<br>fines?<br>The study predicts that by 2025, the EU will impose its first fine against a generative AI provider<br>under the EU AI Act, that a major IoT breach will compromise a large class of devices, that<br>CISOs will become increasingly disillusioned by generative AI, that governments will enforce<br>stricter regulations on third-party and open-source software, and that costs stemming from class<br>action lawsuits will surpass regulatory fines by 50%.<br>Research Methods<br>The research methodology is a mixed-methods one, combining qualitative analyses of regulatory<br>trends and technology development with quantitative projections of financial impacts. The<br>methodological design consists of expert interviews, case studies of prior cyber incidents, and<br>statistical modeling to forecast future scenarios. This allows for great subtleties in the<br>understanding of the multifaceted challenges anticipated in the cybersecurity landscape by 2025.<br>Data and Analysis<br>Legislative records, cybersecurity incident reports, financial data, and expert opinions are among<br>the several kinds of evidence that the analyst might examine in this report. Patterns from the data<br>analysis will include the monetary consequences of data breaches, vulnerability spots in the IoT<br>ecosystem, and heightened regulatory scrutiny of AI technology. The estimated $12 trillion in<br>expenses associated with cybercrime by 2025 justifies the need for stronger security.<br>Connection to Course Concepts<br>Key course themes, particularly the socio-technical aspects of cybersecurity, are typified by the<br>observations presented in the study. Technological innovation, policy development, and social<br>trust are intricately intertwined, as seen by the regulatory reactions to AI and IoT concerns.<br>Furthermore, CISOs&#8217; changing views on generative AI demonstrate the importance of human<br>elements in risk management and technology adoption, underscoring the focus on the human<br>element in cybersecurity.<br>Impact on Marginalized Groups<br>Community groups often bear the brunt of cybersecurity threats through a lack of access to<br>protective resources and technologies. The report&#8217;s inference regarding the uptick in regulatory<br>actions and emerging possible IoT breaches signals heightened vulnerabilities that these groups<br>might face, as they have reduced resources to adapt to pressures or rapid technological changes<br>and growing regulatory complexities. Bridging these gaps will require inclusive policy-making<br>and targeted support to enable letting such advancements into cybersecurity benefit all sectors of<br>society without bias.<br>Contributions to Society<br>Forrester&#8217;s report is a strategic roadmap for stakeholders across all industries, providing a<br>glimpse into the cybersecurity challenges everyone will face and the actions to take to mitigate<br>them. By shedding light on the potential shifts occurring within the regulatory, technological<br>vulnerability, and financial impact landscapes, the report will allow organizations to consolidate<br>and call upon their strategic powers to defend themselves. This proactive positioning is critical to<br>ensuring that not only organizational assets but also public trust and societal welfare are<br>safeguarded in a continuously evolving digital world.<br>Conclusion<br>&#8220;Predictive 2025: Cybersecurity, Risk and Privacy&#8221; offers scholarly undertaking, examining the<br>changing face of cybersecurity while fusing together technological, regulatory, and human<br>factors. The conclusions in the report show the need to have an interdisciplinary approach,<br>enveloping technical innovations, policy developments, and social considerations, to adequately<br>respond to complex challenges that the world is expected to face by 2025.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"518\" height=\"300\" src=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_233603254.png\" alt=\"https:\/\/www.nist.gov\/sites\/default\/files\/images\/2022\/03\/31\/relationship%20between%20cybersecurity%20and%20privacy%20risks.png\" class=\"wp-image-378\" srcset=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_233603254.png 518w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/image_2025-04-29_233603254-300x174.png 300w\" sizes=\"(max-width: 518px) 100vw, 518px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-to-vivid-purple-gradient-background has-background\">References:<\/h2>\n\n\n\n<p>Forrester Analyst Report: Predictions 2025: Cybersecurity, Risk, And Privacy. (n.d.). Retrieved<br>from <a href=\"https:\/\/aris.com\/resources\/process-management\/ar\/cybersecurity-predictions-2025-forrester\/\">https:\/\/aris.com\/resources\/process-management\/ar\/cybersecurity-predictions-2025-forrester\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jason DaamashFebruary 20, 2025Cybersecurity will become a global threat starting in early 2025. The substantial amount ofinformation in Forrester&#8217;s research, Predictions 2025: Cybersecurity, Risk, and Privacy, providesa good summary of the risks to be anticipated, potential changes to legislation, and sharedresponsibilities that security executives will have to deal with. This review discusses thealignment of the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30554,"featured_media":380,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/users\/30554"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":381,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages\/218\/revisions\/381"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/media\/380"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}