{"id":339,"date":"2025-04-30T03:50:24","date_gmt":"2025-04-30T03:50:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/?page_id=339"},"modified":"2025-04-30T03:55:17","modified_gmt":"2025-04-30T03:55:17","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Name: Nathanael Birhan<br>Title: The Role of Social Science in the Career of a Cybersecurity Analyst<br>Introduction<br>In this digital age, cybersecurity analysts have an important job protecting information<br>and systems against cyber threats. While many consider this job to be predominantly technical in<br>nature, it also is a heavily social science job. Cybersecurity analysts use social science disciplines<br>(psychology, sociology, and criminology) to analyze human behavior, predict behavioral<br>cyberattacks, and further create defenses. This paper examines social science research and<br>principles used in the daily accountabilities of cybersecurity analysts, especially as this role<br>engages with society and marginalized groups.<br>Understanding Human Behavior in Cybersecurity<br>One prominent way that cybersecurity analysts utilize the social sciences is in the<br>foundational understanding of human behavior. Most cyber threats such as phishing or social<br>engineering, also depend on manipulating people as much as breaching software. Analysts look<br>at behavior to understand how to identify threats and educate users on how to mitigate them.<br>Understanding how people respond to authority or urgency can help security analysts build better<br>training (Workman et al., 2008). This is directly tied to psychological principles such as<br>cognitive biases and decision-making.<br>Another example is the application of criminology theories &#8211; such as Routine Activity<br>Theory &#8211; which explains that the opportunity for a crime occurs when a motivated offender<br>encounters a capable target in the absence of a guardian (Cohen &amp; Felson, 1979). Cybersecurity<br>analysts use Routine Activity Theory by identifying vulnerable systems or behaviors that<br>attackers are willing to exploit and adding defensive measures.<\/p>\n\n\n\n<p>Communication and Social Awareness<br>Communication is another important responsibility of a cybersecurity analyst. The<br>analyst often must communicate complex threats in layperson&#8217;s terms to employees, stakeholders<br>and even the public. Social science helps professionals to understand how to communicate<br>differently depending on the background, beliefs, and attitudes of those in their audience. This is<br>particularly helpful when dealing with marginalized groups who may have different access to<br>technology or be at a heightened level of risk online.<br>Take, for instance, low-income or elderly groups who might be more susceptible to<br>scams because they often lack digital skills (Anderson et al., 2019). It&#8217;s crucial for cybersecurity<br>analysts to grasp these social disparities so they can create inclusive policies and outreach<br>initiatives that safeguard everyone, not just those who are tech-savvy. This highlights how<br>sociology plays a vital role in pinpointing societal gaps and tackling them through effective<br>cybersecurity strategies.<br>Ethics, Diversity, and Public Trust<br>Cybersecurity analysts frequently face ethical dilemmas that require a solid<br>understanding of social values. They often get asked things like, \u201cHow much user data should be<br>collected by companies?\u201d or \u201cIs it fair to monitor employees?\u201d These problems are not unique<br>to the field. Social science data can help analysts view these questions through multiple lenses,<br>including ethics, the values of the public, and the supporting public, private, and media<br>institutions.<br>Moreover, cybersecurity analysts are often called to collaborate in diverse teams and with<br>diverse clients, and must, therefore, be culturally attuned and cognizant of bias. Social science<\/p>\n\n\n\n<p>concepts like implicit bias and systemic inequality enable analysts to apply fairness and respect<br>to their work. That\u2019s especially important when building technologies that have implications for<br>marginalized communities, like facial recognition software or digital ID systems.<br>Conclusion<br>Ultimately talking about cybersecurity analyst career is overview of social science! From<br>understanding human behavior and communicating effectively, to addressing ethical concerns<br>and protecting vulnerable populations, analysts use social science research and principles at<br>every moment of their work. Realizing these links illuminates the fact that cybersecurity is more<br>than about technology\u2014it\u2019s about people. Cyber security professionals can build safer, more<br>inclusive digital spaces for everyone by integrating social science into what we do and learning<br>from the world around us.<br>References<br>Anderson, R., Barton, C., B\u00f6hme, R., Clayton, R., van Eeten, M. J. G., Levi, M., &#8230; &amp; Savage, S.<br>(2019). Measuring the cost of cybercrime. Journal of Cybersecurity, 2(1), 1\u2013<br>18. https:\/\/doi.org\/10.1093\/cybsec\/tyv007<br>Cohen, L. E., &amp; Felson, M. (1979). Social change and crime rate trends: A routine activity<br>approach. American Sociological Review, 44(4), 588\u2013608. https:\/\/doi.org\/10.2307\/2094589<br>Workman, M., Bommer, W. H., &amp; Straub, D. (2008). Security lapses and the omission of<br>information security measures: A threat control model and empirical test. Computers in Human<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Nathanael BirhanTitle: The Role of Social Science in the Career of a Cybersecurity AnalystIntroductionIn this digital age, cybersecurity analysts have an important job protecting informationand systems against cyber threats. While many consider this job to be predominantly technical innature, it also is a heavily social science job. Cybersecurity analysts use social science disciplines(psychology, sociology,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":27251,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/pages\/339"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/users\/27251"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/comments?post=339"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/pages\/339\/revisions"}],"predecessor-version":[{"id":347,"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/pages\/339\/revisions\/347"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nbirhan-eportfolio\/wp-json\/wp\/v2\/media?parent=339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}