{"id":308,"date":"2024-12-09T01:05:45","date_gmt":"2024-12-09T01:05:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/?page_id=308"},"modified":"2024-12-09T01:49:24","modified_gmt":"2024-12-09T01:49:24","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-c53c23a9-0add-4579-93f9-b9e8fdfa6df1\" href=\"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-content\/uploads\/sites\/35007\/2024\/12\/Career-Paper.docx\">Career-Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-content\/uploads\/sites\/35007\/2024\/12\/Career-Paper.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c53c23a9-0add-4579-93f9-b9e8fdfa6df1\">Download<\/a><\/div>\n\n\n\n<p><strong>Kwabena Asumadu<\/strong><\/p>\n\n\n\n<p>The Career of a Cybersecurity&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Awareness&nbsp;&nbsp; Specialist<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Introduction<\/h1>\n\n\n\n<p>In&nbsp;many&nbsp;ways,&nbsp;the&nbsp;technical disciplines&nbsp;of&nbsp;computer science and engineering&nbsp;seem to have<\/p>\n\n\n\n<p>dominated cybersecurity.&nbsp;As cyber threats evolve, so&nbsp;too&nbsp;does the&nbsp;realization&nbsp;of the<\/p>\n\n\n\n<p>fact&nbsp;that human behavior more&nbsp;often than not is&nbsp;the weakest link in cybersecurity defenses.<\/p>\n\n\n\n<p>Cybersecurity awareness specialists&nbsp;are&nbsp;careers&nbsp;delved&nbsp;into&nbsp;educating employees and<\/p>\n\n\n\n<p>organizations about cyber threats,&nbsp;relying&nbsp;heavily on social&nbsp;sciences&nbsp;research and<\/p>\n\n\n\n<p>principles. These professionals are tasked with bridging the gap&nbsp;in the divide&nbsp;between<\/p>\n\n\n\n<p>complex technical concepts and human behavior&nbsp;in a bid&nbsp;to create&nbsp;safe&nbsp;online<\/p>\n\n\n\n<p>environments.&nbsp;They particularly apply the&nbsp;social science principles&nbsp;of&nbsp;behavioral<\/p>\n\n\n\n<p>psychology, sociology, and cultural studies&nbsp;when considering marginalized groups<\/p>\n\n\n\n<p>and&nbsp;the&nbsp;diverse demographics&nbsp;within society.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Behavioral Psychology<\/h1>\n\n\n\n<p>Those in the cybersecurity awareness field rely on behavioral psychology to design<\/p>\n\n\n\n<p>effective training programs. In this case, concepts such as reinforcement, habit formation,<\/p>\n\n\n\n<p>and cognitive biases allow the experts to design appropriate interventions for the<\/p>\n\n\n\n<p>encouragement of secure behavior. Application of the theory of operant conditioning,<\/p>\n\n\n\n<p>where employees are positively reinforced for the identification of phishing attempts,<\/p>\n\n\n\n<p>makes consistent vigilance much more likely. Knowledge of biases, such as optimism bias,<\/p>\n\n\n\n<p>which makes people underestimate their personal risk, helps experts frame training<\/p>\n\n\n\n<p>messages that are cognitively and emotionally resonant with the intended audience.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Sociology and Group Dynamics.<\/h1>\n\n\n\n<p>Cybersecurity awareness specialists also leverage sociology to understand group<\/p>\n\n\n\n<p>behaviors within organizations. Recognizing how social norms influence behavior is critical<\/p>\n\n\n\n<p>to promoting a security-first culture. For example, when employees see their peers<\/p>\n\n\n\n<p>adhering to best practices, they are more likely to follow suit due to the influence of<\/p>\n\n\n\n<p>normative social pressure. Additionally, sociological research on organizational hierarchies<\/p>\n\n\n\n<p>helps specialists tailor training to resonate with different levels of management, ensuring<\/p>\n\n\n\n<p>maximum impact.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Application in Daily Routines<\/h1>\n\n\n\n<p>Cybersecurity awareness specialists integrate these social science principles into their<\/p>\n\n\n\n<p>daily routines in several ways like:<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Analyzing Behavior Patterns<\/h1>\n\n\n\n<p>By conducting surveys and analyzing user behavior, specialists identify trends and<\/p>\n\n\n\n<p>vulnerabilities within an organization. For example, if employees in a specific department<\/p>\n\n\n\n<p>frequently fall for phishing emails, specialists use targeted interventions to address the<\/p>\n\n\n\n<p>issue, informed by behavioral and sociological insights.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Promoting Inclusive Security Practices<\/h1>\n\n\n\n<p>Professionals work to actively address biases in cybersecurity practices, including ensuring<\/p>\n\n\n\n<p>tools and training do not exclude marginalized groups. For example, a Pew Research Center<\/p>\n\n\n\n<p>study showed that people with lower incomes often have limited access to cybersecurity<\/p>\n\n\n\n<p>tools. Security awareness specialists are calling for company policies to provide free<\/p>\n\n\n\n<p>resources and reduce systemic barriers to security.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Impact on Marginalized Groups and Society<\/h1>\n\n\n\n<p>In this respect, cybersecurity awareness specialists have very important jobs in protecting<\/p>\n\n\n\n<p>marginalized groups and promoting societal security. Marginalized individuals are generally<\/p>\n\n\n\n<p>more vulnerable to cyber threats because of less access to resources, lower digital literacy,<\/p>\n\n\n\n<p>and being targets of scams. By addressing these inequities, specialists contribute to<\/p>\n\n\n\n<p>broader societal goals of digital inclusivity and equity. For example, customized campaigns<\/p>\n\n\n\n<p>to educate seniors about online scams or efforts to protect communities of color from<\/p>\n\n\n\n<p>cyber exploitation are just a couple of clear examples where the principles of social<\/p>\n\n\n\n<p>science lead to significant change at the level of society. More broadly, cybersecurity<\/p>\n\n\n\n<p>awareness programs reduce the societal impact of data breaches, identity theft, and<\/p>\n\n\n\n<p>online fraud that disproportionately victimize vulnerable populations. They are the<\/p>\n\n\n\n<p>professionals who help bridge the gap between technological strides and equal access to<\/p>\n\n\n\n<p>secure digital spaces by promoting a culture of security awareness.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>Cybersecurity awareness experts rely on social science research and principles throughout<\/p>\n\n\n\n<p>their practice in an attempt to address the human element of cyber risk. Findings from<\/p>\n\n\n\n<p>behavioral psychology, sociology, and cultural studies empower them to design programs<\/p>\n\n\n\n<p>that are effective and inclusive and that speak with a voice relevant to diverse populations.<\/p>\n\n\n\n<p>These specialists infuse their daily routines with social science protecting not only the<\/p>\n\n\n\n<p>organizations but also contributing to a fairer digital society. With the rise in sophistication<\/p>\n\n\n\n<p>of cyber threats, the synergy between social science and cybersecurity will continue to be<\/p>\n\n\n\n<p>of utmost importance so that no individual or group is left vulnerable in this digital age.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p><strong>Pew Research Center. (2021). <em>The internet and the pandemic: Digital divides and cybersecurity risks<\/em>. Pew Research Center. <\/strong><a href=\"https:\/\/www.pewresearch.org\"><strong>https:\/\/www.pewresearch.org<\/strong><\/a><\/p>\n\n\n\n<p><strong>Verizon. (2022). <em>2022 data breach investigations report<\/em>. Verizon. <\/strong><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\"><strong>https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/<\/strong><\/a><\/p>\n\n\n\n<p><strong>National Institute of Standards and Technology. (2021). <em>Human factors in cybersecurity<\/em>. U.S. Department of Commerce. <\/strong><a href=\"https:\/\/www.nist.gov\"><strong>https:\/\/www.nist.gov<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kwabena Asumadu The Career of a Cybersecurity&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Awareness&nbsp;&nbsp; Specialist Introduction In&nbsp;many&nbsp;ways,&nbsp;the&nbsp;technical disciplines&nbsp;of&nbsp;computer science and engineering&nbsp;seem to have dominated cybersecurity.&nbsp;As cyber threats evolve, so&nbsp;too&nbsp;does the&nbsp;realization&nbsp;of the fact&nbsp;that human behavior more&nbsp;often than not is&nbsp;the weakest link in cybersecurity defenses. Cybersecurity awareness specialists&nbsp;are&nbsp;careers&nbsp;delved&nbsp;into&nbsp;educating employees and organizations about cyber threats,&nbsp;relying&nbsp;heavily on social&nbsp;sciences&nbsp;research and principles. These professionals are tasked with&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kdotportfolio\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":28080,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/308"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/users\/28080"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/comments?post=308"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/308\/revisions"}],"predecessor-version":[{"id":326,"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/pages\/308\/revisions\/326"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kdotportfolio\/wp-json\/wp\/v2\/media?parent=308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}