{"id":400,"date":"2023-12-08T04:18:02","date_gmt":"2023-12-08T04:18:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/?page_id=400"},"modified":"2023-12-08T04:30:12","modified_gmt":"2023-12-08T04:30:12","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<pre class=\"wp-block-preformatted\"><strong>A Look into Cybersecurity Policy Advocate<\/strong>s\nKevin McKenna\nDecember 3rd, 2023\n\n<strong>Introduction<\/strong>\n\nThe job of a Cybersecurity Policy Advocate is carried out by cybersecurity professionals who\npossess a skillset of not only technical expertise in the field, but also skills relating to social sciences and\nsocial principles. These professionals focus on the major components of their jobs which include\npromoting the adoption of various security measures, as well as educating a variety of people in\ndifferent occupations such as politicians, executives, home users, and more. This career path\nencompasses a few different roles in which this advocacy is needed such as security researchers, non-\nprofit cybersecurity staff, and various consultants.\n\n<strong>A Human Centric Approach<\/strong>\n\nCybersecurity policy advocates are an emergent role that encompasses the job tasks of both a\n\u201cchange agent\u201d as well as a \u201crisk communicator.\u201d In order to do this, those that find themselves in this\nrole must focus more so on the education and empowerment of individuals to ensure that they are\nforming good habits regarding their personal security attitudes and behaviors. To successfully fulfill\nthese job responsibilities, advocates are required to focus on the social sciences and principles that are\npresent in Cybersecurity rather than the technical aspects. These advocates possess adequate\ninterpersonal skills, as well as communication skills in order to understand human behavior and build\ntrust with their target audience and clientele. A study conducted by Julie M. Haney and Wayne G.\nLutters showed that participants stated that advocates also must possess \u201ccontext awareness\u201d meaning\nthat they must recognize \u201cthat unique audiences have different strengths, values and challenges\u201d and\nthat a \u201cone-size-fits-all\u201d approach is not an adequate means of advocacy. Rather advocates must\naccount for marginalized groups such as the elderly and people with lower economic means in which\nthere is a significant gap of access to technology, as well as cybersecurity education and knowledge. To\nsummarize, these experts essentially bridge the gap between technology and society by utilizing social\nsciences to effectively advocate for improved cybersecurity measures that are inclusive, accessible, and\neffective for all groups of people.\n\n<strong>Conclusion<\/strong>\n\nIn an ever-changing technological society full of social disparities, Cyber Security Policy\nAdvocates are essential in bridging the gap and ensuring that all technology users are well educated and\nequipped to handle their own cyber hygiene, as well as the cyber hygiene of their companies. This role is\nmulti-faceted in nature meaning that these advocates not only advocate for the implementation of\nsecurity measures, but also engage actively in education and empowerment across varying\ndemographics that range from politicians and CEOs to those marginalized groups that may have lesser\nmeans and understanding when it comes to technology. This career field requires a positive attitude,\nempathy, and a good understanding of social sciences and human behavior in order to achieve success.\nAs emerging cyber threats continue to arise and evolve, advocates possess an imperative role in which\nthey must combine cybersecurity principles with social sciences an order to successfully build a safer\ncyber landscape that is secure and considers the needs of every member of our society.\n\nReferences:\nHaney, J. M., &amp; Lutters, W. G. (2021, March 22). Cybersecurity advocates: Discovering the\ncharacteristics and skills of an emergent role. Information &amp; Computer Security.\nhttps:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-08-2020-0131\/full\/html#sec012\n\nHaney, J. M., &amp; Lutters, W. G. (2018, August 12). \u201cit\u2019s {scary\u2026it\u2019s} {confusing\u2026it\u2019s} dull\u201d:\nHow cybersecurity advocates overcome negative perceptions of security. USENIX.\nhttps:\/\/www.usenix.org\/conference\/soups2018\/presentation\/haney-perceptions\n\nShane, P. M. (2012). Cybersecurity policy as if ordinary citizens mattered: The case for public\nparticipation in cyber policy making. Isjlp, 8, 433.<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>A Look into Cybersecurity Policy Advocates Kevin McKenna December 3rd, 2023 Introduction The job of a Cybersecurity Policy Advocate is carried out by cybersecurity professionals who possess a skillset of not only technical expertise in the field, but also skills relating to social sciences and social principles. These professionals focus on the major components of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kevinmckenna\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":25938,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/pages\/400"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/users\/25938"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/comments?post=400"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/pages\/400\/revisions"}],"predecessor-version":[{"id":408,"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/pages\/400\/revisions\/408"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/media?parent=400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}