Article Review 1
by
Matthew Mattozzi
01184001
https://www.frontiersin.org/articles/10.3389/fpsyg.2018.00744/full
An emerging field or not, there is a relatively consistent picture of what the field of cybersecurity entails for the average layperson. People in dark rooms manically typing away on keyboards, large rooms with stacks of servers and glowing lights, the ever-imminent threat of a cyber apocalypse. In other words, the picture painted is one of hardware and tools. What researchers are quickly realizing is that the human component is being vastly underestimated in its role and importance. And it is no wonder. Large stacks of complex machinery are an enigma for most people and can quickly capture imaginations. However, these machines are still, as of now, run by people. AI will assuredly play an increasing role in the field of cybersecurity in the coming years. As of now though, the organic component (us humans) will remain more important than ever to understand. Cyberattacks are performed using machines piloted by humans, and it is with machines that other humans must defend against such attacks. Understanding human psychology, cultural values, and even religion plays a role in every plan.
The paper I chose explains that there is a gap in knowledge of what skills and abilities are vital in this rapidly expanding workforce. They assert that the priority for technical skills over soft skills such as communication and integrity could lead to future issues. The balance of technical and soft skills produces a particularly unique problem, especially when considering how many disciplines make up the cybersecurity workforce.
The paper states that they will attempt to fill the shortage in knowledge by combining insights from various organization management literature and social psychology. From what I can ascertain, this involves sifting through various sources involving the human component in a workforce capacity. In other words, while they stated the literature involving human psychology in a cybersecurity setting is greatly limited as of now, it is possible to piece together a balanced perspective using examples from other fields. I liken this to precedents in a court setting. Knowing how people react in other similar settings is crucial when it comes to approximating how people will act in ours.
The article outlines six assumptions that are made in the assembly of every effective cybersecurity team. These are as follows: systemic thinkers, team players, technical and social skill, civic duty, continued learning, civic duty, and communication. It is proposed by these researchers that all effective cybersecurity teams will include personnel with these skills, and the more each player possesses of the six, the better. They also analyze the Big Five Personality Tests and their utilization in putting together an efficient team. Ultimately, it is conglomeration of information compiled from various sources and applied to the field of cybersecurity.
A term that I think perfectly describes what these researchers are trying to accomplish is the Human Systems Integration (HIS) dilemma. How humans can interact optimally with the hardware and, of course, other humans are at the core of what these researchers hope to solve. On the surface, it might seem simple, but we humans are rash creatures that run off emotions and millennia-old biological programming and as such can be unpredictable in our actions. There are basic tenets that all humans abide by, such as the needs described in Maslow’s Hierarchy of Needs. These are made up of basic, psychological, and self-fulfillment needs. Even still, researchers cannot even agree on the typical profile of a cyber offender, as the profiles proposed by Shinder and Title, Chisea, and Lickiewicz all differ. People are only ever pigeon-holed out of convenience; never because it is the actual solution to the problem.
Part 2: how the topic relates to the challenges, concerns, and contributions of marginalized groups
While the article does not explicitly state the challenges and contributions of marginalized groups to cybersecurity, I believe a few things can be inferred. First, marginalization of various groups should be eliminated as much possible in order to allow a wider berth of access to more diverse personnel. This can only be beneficial to the field, as a wider degree of variation ensures more perspectives are represented. It also allows for more creative problem solving when more variation in culture and even religion is accounted for.
It is hoped that HR departments that are involved in the hiring process will take some of these findings to heart. Computer science and electrical engineering should look great on a resume, sure, but people-skills and other soft skills are just as important for operating in any team capacity. A good moral compass and strong personal character is also something that, while it is much harder to vet for, it is probably worth the time and effort. A simple test that can showcase the applicant’s technical skill is easy to write; a survey showing strong moral character is much harder but will be ultimately maybe even more rewarding.