{"id":340,"date":"2025-12-05T02:11:48","date_gmt":"2025-12-05T02:11:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jteasley28\/?p=340"},"modified":"2025-12-05T02:11:48","modified_gmt":"2025-12-05T02:11:48","slug":"article-review-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jteasley28\/2025\/12\/05\/article-review-1\/","title":{"rendered":"Article Review #1"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>Article Review #1<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><em>\u201cThe Security Mindset\u201d<\/em><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Koen Schoenmakers, Daniel Greene, Sarah Stutterheim,&nbsp;Herbert Lin,&nbsp;Megan J Palmer<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><u>Introduction<\/u><\/strong><\/p>\n\n\n\n<p><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>This article examines the concept of the \u201csecurity mindset\u201d, a way of thinking where people consistently look for flaws, weaknesses, and vulnerabilities in everyday systems. The concept is referred to a lot in cybersecurity but doesn\u2019t have a complete definition. While many professionals and educators value this mindset, there is hardly any research on what it means, how it develops, or how it affects individuals in the field of cybersecurity. This article seeks to fill that gap by analyzing interviews with cybersecurity professionals who identify as having a security mindset (Greene, Stutterheim, 2023)<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><u>Relation to the Social Sciences<\/u><\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 This topic directly relates to the principles of social sciences because it connects individual psychology, social behavior, and workplace culture to a technical field. Instead of viewing cybersecurity as purely technological, the article treats it as a human-driven discipline shaped by habits, motivation, and cultural expectations. It aligns with social science approaches that study how people perceive risk, interact with systems, and develop shared professional norms.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><u>Research Question, Hypotheses, IV and DV<\/u><\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 For this article, the central research question asks: What does the security mindset mean to cybersecurity professionals, and how does it affect their personal and professional lives? While the study is exploratory and does not propose formal hypotheses, it assumes that professionals will identify common traits and experiences tied to the mindset. The independent variable is whether the participants who self-identified as having the mindset, while the dependent variable are the way they describe the mindset\u2019s development, meaning, and impact.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><u>Research Methods<\/u><\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The study uses a qualitative research design based on the interviews conducted. This approach allowed the participants to describe their experiences in their own words, providing richer detail than surveys or experiments would. The use of interviews is consistent with social science traditions of exploring cultural meaning and professional identity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><u>Data and Analysis<\/u><\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The data collected were interview transcripts from the 21 participants. The authors analyzed the data using thematic coding to identify patterns in how participants defined and discussed the mindset. This type of analysis focuses on drawing out themes rather than measuring variables numerically (Schoenmakers, 2023).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><u>Connections to Coursework<\/u><\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The article connects to social science concepts learned through class, such as social learning, motivation, and identity. For example, participants described learning the mindset through communities and mentors, reflecting the idea that behavior is shaped socially. The emphasis on proactive risk-seeking also ties to theories of perception and human behavior covered in course materials.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><u>Marginalized Groups<\/u><\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The study has limited representation of marginalized groups, as the samples were small and not diverse across the globe. However, the discussion hints at broader challenges: marginalized groups may experience the security mindset differently because of cultural or workplace barriers. Recognizing this gap is important for making cybersecurity more inclusive and ensuring that valuable perspectives are not overlooked.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><u>Contributions to Society<\/u><\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The study contributes to society by highlighting the human side of cybersecurity. Understanding the security mindset can improve training, recruitment, and retention, helping to close the cybersecurity workforce gap. It also encourages the integration of social science into cybersecurity research, reminding us that technology and people are inseparable in building secure systems.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><u>Conclusion<\/u><\/strong><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The security mindset provides an early but important step in defining a crucial concept in cybersecurity. By applying social science methods and perspectives, the article broadens how we think about professional skills in this field. While limited in scope, it lays the foundation for more inclusive, evidence-based approaches to training the next generation of cybersecurity professionals.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong><u>References<\/u><\/strong><\/p>\n\n\n\n<ul>\n<li>Koen Schoenmakers, Daniel Greene, Sarah Stutterheim, Herbert Lin, Megan J Palmer, The security mindset: characteristics, development, and consequences,&nbsp;<em>Journal of Cybersecurity<\/em>, Volume 9, Issue 1, 2023, tyad010,&nbsp;<a href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyad010\">https:\/\/doi.org\/10.1093\/cybsec\/tyad010<\/a><\/li>\n<\/ul>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1 \u201cThe Security Mindset\u201d Koen Schoenmakers, Daniel Greene, Sarah Stutterheim,&nbsp;Herbert Lin,&nbsp;Megan J Palmer Introduction \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 This article examines the concept of the \u201csecurity mindset\u201d, a way of thinking where people consistently look for flaws, weaknesses, and vulnerabilities in everyday systems. The concept is referred to a lot in cybersecurity but doesn\u2019t have a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jteasley28\/2025\/12\/05\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":30586,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/posts\/340"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/users\/30586"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/comments?post=340"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/posts\/340\/revisions"}],"predecessor-version":[{"id":356,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/posts\/340\/revisions\/356"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/media?parent=340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/categories?post=340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/tags?post=340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}