{"id":320,"date":"2025-04-25T14:40:19","date_gmt":"2025-04-25T14:40:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/?page_id=320"},"modified":"2025-04-27T20:00:27","modified_gmt":"2025-04-27T20:00:27","slug":"career-profesional-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/career-profesional-paper\/","title":{"rendered":"Career Profesional Paper"},"content":{"rendered":"\n<p class=\"has-text-align-left has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-f01d83ee93c3e27639ece114487589b2\" style=\"font-size:18px\"><br><strong>BLUF<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><br>As technology advances, the importance of cybersecurity continues to grow with it. For<br>this paper, we were told to choose a cybersecurity career that we liked and examine how<br>professionals in this field rely on social science research and social science principles in those<br>careers. I decided to write my paper on cybersecurity specialists working for the military as a<br>civilian because this is a job that I am very interested in and want to know more about. Civilian<br>cybersecurity specialists working for the military protect and navigate through sensitive<br>information systems, and work with complex human factors that influence security threats.<br>These professionals rely on social science to better understand user behavior, prepare for<br>possible insider threats, and address inclusivity issues and societal impact, particularly<br>concerning marginalized groups.<\/p>\n\n\n\n<p class=\"has-text-align-left has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-4759e13a06bbfce14003308505e77d73\" style=\"font-size:18px\"><br><strong>How cybersecurity specialists rely on social science research<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><br>Social science principles that I feel apply to this career are behavioral analysis,<br>organizational culture and communication, and ethics. Civilian cybersecurity specialists in<br>military environments often utilize sociological and psychological research to identify common<br>patterns that may expose cyber threats. The concept of &#8220;insider threats&#8221; (where individuals<br>within the organization pose a risk) is a good example to show how it is deeply rooted in<br>behavioral science. According to Greitzer and Frincke (2010), understanding personality traits,<br>stress factors, and behavioral anomalies helps predict and prevent insider attacks. This comes<br>directly from social science methodologies such as case studies ,surveys, and observational research. Secondly, organizational culture and communication are utilized to navigate<br>hierarchical and culturally diverse environments. Social science principles such as cultural<br>competency and organizational behavior help these professionals understand and use various<br>communication styles and decision-making processes. Hofstede\u2019s cultural dimensions theory<br>can be applied to work more effectively with international teams or allied forces (Hofstede,<br>Hofstede, &amp; Minkov, 2010). This understanding aids in creating cybersecurity protocols that are<br>culturally sensitive and universally enforceable which improves overall effectiveness.<br>Furthermore, the use of ethics in social science research can be used to inform how<br>cybersecurity policies are enforced and created. Civilian professionals must balance national<br>security interests with individual privacy rights. Ethical considerations such as data protection,<br>consent, and surveillance are all crucial. Applying ethical theories helps to guide<br>decision-making in areas such as monitoring employee activity or intercepting communications<br>(Taddeo &amp; Floridi, 2018).<\/p>\n\n\n\n<p class=\"has-text-align-left has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-deac339c1607df6d09a7d6e14a24dca0\" style=\"font-size:18px\"><br><strong>How cybersecurity specialists interacts with marginalized groups<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><br>Working with marginalized communities is an important part of the cybersecurity field<br>that helps us see that it\u2019s not just about building strong defenses, it\u2019s also about making sure<br>those defenses are fair and don\u2019t unintentionally harm certain groups. Research has shown that<br>facial recognition software often struggles to accurately identify non-white faces, which can lead<br>to false matches and discriminatory outcomes. By staying informed about these issues through<br>social science research, cybersecurity professionals can help push for more equitable<br>technology and better testing standards that work for everyone. Also, I realized that civilian<br>cybersecurity experts are often involved in community outreach and education, especially in<br>diverse military communities which I found to be interesting. They may work with schools, local<br>governments, or non-profits to teach proper cyber hygiene and digital literacy, helping bridge the digital divide. This aspect of their role shows the social responsibility that comes with their work<br>and reflects the broader social impact of cybersecurity.<\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color wp-elements-812e5a63f5a9b9e33c8e2563b806f721\" style=\"font-size:18px\"><strong><br>Conclusion<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><br>In conclusion, this career paper on cybersecurity specialists made me see that<br>cybersecurity tends to focus solely on the technical side of things\u2014but there&#8217;s another critical<br>piece that shouldn\u2019t be overlooked which is the influence of social science . For military-civilian<br>cybersecurity specialists, everyday decisions and ethical judgments are shaped just as much by<br>human behavior and cultural understanding as by code and hardware. Whether it&#8217;s analyzing<br>navigating ethical gray areas patterns of behavior, or ensuring that digital tools serve diverse<br>communities fairly, social science plays a quiet but essential role. It&#8217;s necessary to build security<br>strategies that are not only effective but also responsible and inclusive.<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><br>References<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><br>Greitzer, F. L., &amp; Frincke, D. A. (2010). Combining traditional cyber security audit data with<br>psychosocial data: Towards predictive modeling for insider threat mitigation. In C. W. Probst, J.<br>Hunker, D. Gollmann, &amp; M. Bishop (Eds.), Insider threats in cyber security (pp. 85\u2013113).<br>Springer. https:\/\/doi.org\/10.1007\/978-1-4419-7133-3_5<br>Hofstede, G., Hofstede, G. J., &amp; Minkov, M. (2010). Cultures and organizations: Software of the<br>mind (3rd ed.). McGraw-Hill.<br>Taddeo, M., &amp; Floridi, L. (2018). How AI can be a force for good. Science, 361(6404), 751\u2013752.<br>https:\/\/doi.org\/10.1126\/science.aat5991<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF As technology advances, the importance of cybersecurity continues to grow with it. Forthis paper, we were told to choose a cybersecurity career that we liked and examine howprofessionals in this field rely on social science research and social science principles in thosecareers. I decided to write my paper on cybersecurity specialists working for the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/career-profesional-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":30270,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages\/320"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/users\/30270"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages\/320\/revisions"}],"predecessor-version":[{"id":412,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages\/320\/revisions\/412"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/media?parent=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}