Career Paper

The Work of a Data Analyst 

Introduction

In the National Initiative for Cybersecurity Careers and Studies, or NICE, they categorize data analytics as under implementation and operations. This categorical field is described as a provider of the administration and maintenance of systems’ efficiency. A more in-depth job description is transforming and interpreting “raw data to make conclusions” to progress workflow(Drury, 2024). 

Importance to Society

Data analysis must take an objective approach when deciphering statistical data. By doing this, they reinforce their ethical neutrality or standard for how their research is conducted. This is important because in this position, a crucial aspect of their role is assessing information, which involves many complex and moving pieces. Also known as relativism, because they are looking at a graph and finding patterns or trends. The patterns they detect allow them to rely upon their findings for their agency or company. By practicing parsimony, the act of condensing information to provide a simplified explanation, their companies can effectively use that information towards “optimiz(ing) their performances” given the facts by the data analysis(Drury, 2024).

Data analytics uses archival research,  a collection of relevant research, to provide “effective solutions” to improving resources and tools within organizations (Parameshwaran, 2022). Backing up solutions with thorough research that is justified through the study of past behavior, and whether or not the stream of productivity was positive or negative. 

Challenges

Due to the workload that comes with the position, the challenges lie in every detail of their work. They work with sensitive information, so privacy is a huge responsibility and requires the upholding of “ethical standards” while avoiding “inaccurate” data (Staff, 2024). Being a foundational position, if their data interpretation and collection misrepresents the true findings, it will damage the project’s integrity. The foundations can’t be wrong, so having to redo them would cost a lot of money because you have to restart. An increasing challenge within this field is the ethical dilemmas of how data is collected. Following the NICE description of implementation and operations, there must be protection of data privacy, but as information gets leaked more and more and is being sold to train and improve companies’ algorithms and sales, that is an invasion of privacy and an ethical situation (Staff, 2024). The range of this field is very wide, so it is crucial for an understanding of the specific business practices that follow the companies that you work for in order to prevent malpractice or insufficient demonstration of information (Dice, 2024).

Conclusion

Data analysis plays a foundational role in developing formulas and plans for companies to improve their programs. Through scientific research methods like using archival research and case studies to compare information, growing the possibilities for solutions. This field requires precision of different complex principles that come from assessing the patterns of past work while making an educational prediction of future work that requires objectivity and relativism. Despite the challenges that drive the difficulty of this workforce, data analysis is important to society because it must work with the numbers to accurately project the status of companies in order to come up with the best solution for maximum productivity.

References

Drury, A. (2024). Data analytics: What it is, how it’s used, and 4 basic techniques. Investopedia. https://www.investopedia.com/terms/d/data-analytics.asp 

Staff, D. (2024, November 27). Data Analyst challenges: What you need to know. Dice Insights. https://www.dice.com/career-advice/data-analyst-challenges-what-you-need-to-know#:~:text=Data%20Consistency:%20Inconsistent%20data%20formats,initiatives%20from%20leadership%20is%20crucial. 

Parameshwaran, S. (2022, December 20). How data analytics can help deliver social good. Knowledge at Wharton. https://knowledge.wharton.upenn.edu/article/how-data-analytics-can-help-deliver-social-good/ 

Article Review #2: An Analysis of Cybercrime


In this article, Smith takes an objective view of cyberspace’s impact and
how that has affected cybersecurity and its effectiveness. They review how
cyberspace has “unique characteristics” that make evaluating the activity
different than in traditional spaces (Smith, 2024). By using an objective way to
deliver their investigation on human and cyber behaviors, it makes sense to
connect their message with mitigation, because they are trying to understand
the vulnerabilities and how they will impact communities, and they do this by
looking at the patterns and history of cyber vulnerabilities.
Although the format of these crimes has evolved, the motives of the crimes
are derived from the same interpersonal motives that have been discovered and
studied. Psychology and criminology have paved the way for discovering and
evolving an interdisciplinary understanding of cybersecurity, and “encapsulates
the complexity of cybercrime” (Smith, 2024). Because of the psychological
reasoning and understanding of crime, we can apply social learning theory (SLT)
and routine activities theory (RAT) when evaluating the motives and patterns of
cybercrime, retracing the steps that lead to the crime.
The challenges the research found were that both theories had limits that
didn’t cover the full individual being’s behavioral complexities. They look into
gratification theory to shed light on this neglect because it would give an
explanation to “the desire” that comes along with many crime motives (Smith,
2024). In the boy of the article, they review different personality types like
narcissism and anti-social behavior found that they all feel a ned for gratification
of some kind. Because gratification comes in different forms for different people,
it acknowledges the complexity of an individual’s behavior and how every person
will require different incentives that lead to different motives, such as money or
peer approval.

Conclusion
In Trot Smith’s article, they take horse law, or psychology and criminology
principles, when discussing crimes, and suggest applying it to cyber crimes.
Their plan for finding a method that proves this theory is through “synthesizing
concepts” that would allow full coverage of an individual’s personality, which will
give reason to motive for crime, and applies to the cyber world where crime is
made more accessible and allows for more complex motives (Smith, 2024).
Smith, T. PhD (2024). Integrated Model of Cybercrime Dynamics: A Comprehensive Framework
for Understanding Offending and Victimization in the Digital Realm. International Journal of
Cybersecurity Intelligence & Cybercrime, 7(2), – . DOI: https://doi.org/10.52306/2578-3289.1163
https://vc.bridgew.edu/ijcic/vol7/iss2/4

Article Review #1: The Analysis of Cybercrime and Civil Protection


The Influence of Cybersecurity on a National Scale
This article looks at how Jordan’s sensitive information is vulnerable to cyberattacks.
The article takes an objective stance on Jordan’s attack and looks at the ways attackers
were able to access and leak their information. The paper is conducting its research by
gathering relevant cyber legislation throughout the world and comparing it to Jordan’s protective
measures against cybercrime, which have fallen short.
Masadeh comparatively looks into U.S. legislation, specifically the Computer Fraud and
Abuse Act and Electronic Communications Privacy Act. This act provides regulation of the sharing
and selling data. Jordan does contain several cybercrime-targeted policies, including the
Electronic Transactions Law of Jordan and Cybercrime Law of Jordan, which are very similar to
the U.S. laws that were discussed. Both acknowledge the misuse of cyberspace and state that
the misuse is a criminal offense (Masadeh, 2024). By looking at the nation’s legal defense, one
can observe the increasing growth of crime in cyberspace. This practice is determinism because
more people are getting away with transferring and collecting information, and more regulations
are coming out to counter it. Despite new laws, they aren’t covering enough guidelines, which
creates great vulnerability to their private information, especially across international levels
(Masadeh, 2024). In order to protect the sensitive information of Jordan, they must implement
more specific guides for prosecution of cybercrimes and increase enforcement by investing in
businesses in order to protect information and prevent leakage.
Conclusion
This study is important for looking at how big cyberspace and cybercrime are. It is
constantly growing, and the country’s laws will continue to grow as they know more about
cybercrime. This article demonstrates that despite the laws put in place, many of them aren’t
specific enough to tackle the wide range of cybercrime, and there is a great delay from
legislation and cyberspace.
Mansour Maghaireh, A. (2024, January 1). Civil Protection of Trade Secrets in
Cyberspace: Jordanian Legislation and International Agreements. International Journal
of Cyber Criminology.
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/352/1
05