{"id":227,"date":"2026-05-06T02:39:56","date_gmt":"2026-05-06T02:39:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mv05\/?page_id=227"},"modified":"2026-05-06T03:07:24","modified_gmt":"2026-05-06T03:07:24","slug":"professional-career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mv05\/professional-career-paper\/","title":{"rendered":"Professional Career Paper"},"content":{"rendered":"\n<p>Cybersecurity Professional Career Paper:<br>Student Name: Maxwell Vinson<br>School of Cybersecurity, Old Dominion University<br>CYSE 201S: Cybersecurity and the social sciences<br>Instructor Name: Dr. Jordan Quinn<br>Date: April 14, 2026<br>2<br>Cybersecurity is a widely growing profession focused on protecting sensitive online<br>information and systems. Cybersecurity analysts play a huge role in protecting users&#8217; data. They<br>try to identify possible vulnerabilities, to try and prevent attacks before they happen, and respond<br>to breaches. In today&#8217;s world, cybersecurity is important since we are digitalizing more and more<br>everyday, this is a technology driven world. Every aspect of our society is digital, for example<br>our baking, healthcare and education are all online as well. Without proper security for our<br>systems, we are vulnerable to cyberattacks resulting in loss of data, financial loss, and more.<br>The purpose of this paper will show how cybersecurity analysts rely on social science research<br>and principles in their day-to-day work.<br>Social science research is needed in cybersecurity, many attacks rely on human behavior<br>over technical vulnerabilities. Carley (2020) explains that social cybersecurity shows us how<br>people interact online and how people are exploiting these interactions and trying to take<br>advantage of them for personal gain. For example all the phishing attacks that try to trick users to<br>click and download links revealing the users information. Cybersecurity analysts use principles<br>from psychology and sociology to try and understand why people make their decisions online.<br>Like using weak passwords and or downloading sketchy links.<br>Key concepts like risk assessment, and ethics are central to cybersecurity careers. Risk<br>assessment allows analysts to identify vulnerabilities and determine whether or not they pose any<br>danger to the user or their system. Dalal et al. (2021) highlights that employee behavior is one of<br>the biggest factors in cybersecurity risks, making this important to understand workplace<br>dynamics. Ethics is another important concept, cybersecurity analysts must protect user data<br>while also respecting their privacy. They must ensure that they do not violate any of their<br>customers or any individuals rights.<br>3<br>Cybersecurity is very important for marginalized groups, especially those with<br>limited access to technology or aren&#8217;t as experienced with technology. Khan et al. (2025) tells us<br>that cybersecurity is a social responsibility since the online attacks affect different and more<br>vulnerable populations. For example, older individuals are more likely to fall for phishing scams.<br>Cybersecurity professionals try to address these problems by designing more available systems<br>and try to promote online education.<br>Cybersecurity analysts play a huge role in cybersecurity, by protecting vital systems like<br>our banking and healthcare. Their work is to prevent cybercrime and sensitive information that is<br>stored online. Public policies are related to cybersecurity and guide how organizations have to<br>manage information and respond to these threats. Cybersecurity professionals must follow<br>policies while assisting whoever they are working for.<br>In conclusion, cybersecurity analysts rely on their technical skills and social science<br>principles to protect systems and information. Understanding human behavior online, and<br>applying the key concepts like risk assessment and ethics, and the needs for marginalized groups<br>are all essential for this profession. Cybersecurity is not just about how secure the system is but<br>also the human behavior online.<br>4<br>References<br>Carley, K. M. (2020). Social cybersecurity: an emerging science. Computational and<br>Mathematical Organization Theory, 26(4), 365\u2013381.<br>https:\/\/doi.org\/10.1007\/s10588-020-09322-9<br>Dalal, R. S., Howard, D. J., Bennett, R. J., Posey, C., Zaccaro, S. J., &amp; Brummel, B. J.<br>(2021). Organizational science and cybersecurity: abundant opportunities for<br>research at the interface. Journal of Business and Psychology, 37(1).<br>https:\/\/doi.org\/10.1007\/s10869-021-09732-9<br>Khan, W. N., Lee, J. K., &amp; Liu, S. (2025). Is Cybersecurity a Social Responsibility?<br>Information Systems Frontiers, 27. https:\/\/doi.org\/10.1007\/s10796-024-10565-z<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Professional Career Paper:Student Name: Maxwell VinsonSchool of Cybersecurity, Old Dominion UniversityCYSE 201S: Cybersecurity and the social sciencesInstructor Name: Dr. Jordan QuinnDate: April 14, 20262Cybersecurity is a widely growing profession focused on protecting sensitive onlineinformation and systems. Cybersecurity analysts play&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/mv05\/professional-career-paper\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":32014,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/pages\/227"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/users\/32014"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/comments?post=227"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/pages\/227\/revisions"}],"predecessor-version":[{"id":245,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/pages\/227\/revisions\/245"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/media?parent=227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}