This article relates to principles of the social sciences because cyberthreats have to focus
on human behavior with having to teach humans on how to prevent cyber threats entering the
network, look back on trends and then basing on what type of detection systems that one should
use, and having more jobs in cybersecurity which is a supply and demand for the protection. The
research question in this article is what is the best defense to use against cyberthreats, there are
many different types of defense’s that can be used and it is trying to differentiate which one to
use with which cyberthreat. The type of research methods used was case studies from past
attacks and what they can gather from as well as gather information from different organizations
that specialize in ranking and making other companies aware of the cyber threats like IEEE,
SIEM, and CTI.The type of data collected is archival research and case studies because of the
reports from different types of unclassified CTI’s as well as crowdsourcing , which means any
company or organization can identify the security risk they are seeing. This article relates to the
concepts that we talk about relativism, the cyber threats that we read about in this article leads to
the development of better and more advanced cyber defense. Everything is related and that
without having a cyberthreat there would be no need for cyber defense. The type of research that
is being used is archival research while it used to be only physical things , now there is a way to
access different types of information on the internet and the article uses a lot of archival research
to develop the cyber defense. This article dives into the psychological factors that influence what
defenses are important to cybersecurity behaviors. The article is trying to spread knowledge
which helps educate not just companies but regular people that did not know about the cyber
threat become aware of the issue. The issue with this topic is that smaller business owners may
not be able to afford the research to be done on cyber threats. Another marginalized group of
people that may find all this challenging is people that are not as technologically savvy to understand the words and acronyms that are being used in this article. The social contributions
that this article made is development and almost volunteering different ways to help combat
cyber threats and making a database for companies to locate and submit information and cyber
threats that they see.
N. Sun et al., “Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey
and New Perspectives,” in IEEE Communications Surveys & Tutorials, vol. 25, no. 3, pp.
1748-1774, 2023, doi: 10.1109/COMST.2023.3273282.