Cybersecurity is the practice of protecting systems and data from attacks. Often used
situationally, the term cybersecurity can be extended to protect a range from individual attacks to
attacks on government infrastructure. Morten Bay (2016) found in his research that
cybersecurity, as a concept, incorporates theory from philosophy and sociology to create a
multifaceted approach to the protection of assets. One job within the cybersecurity field that
depends on social science is that of a cyber threat hunter. Cyber threat hunters proactively search
across all aspects of a system to hunt for malicious or suspicious activities that evade detection
by existing tools (Delaney 2025). By combining social science and cybersecurity practices, cyber
threat hunters can identify and neutralize potential risks.
Cyber threat hunters use behavioral analysis, social network analysis, and cognitive
psychology in their quest to root out malicious or suspicious activity. Behavioral analysis allows
cyber threat hunters to analyze the behavior of hackers and malicious actors. Understanding the
motives can lead to the discovery of patterns that distinguish regular network activity from signs
of an attack. Social network analysis examines the relationships among individuals or groups
within cybercriminal organizations. These relationships can identify how threat actors
collaborate and recruit members. Lastly, cyber threat hunters rely on principles from cognitive
psychology, studying how people make decisions and perceive risk. By understanding cognitive
biases such as overconfidence and confirmation bias, cyber threat hunters can train an
organization’s employees to recognize social engineering attempts, thereby strengthening the
human firewall (Klimburg-Witjes & Wentland, 2021).
While the main work of cyber threat hunters is protecting systems, assets, and
information, it also affects marginalized groups. Many cyber attacks target vulnerable
populations. Low income communities, minorities, the elderly, and LGBTQ+ individuals are
often targeted through social engineering and other scams. Cyber threat hunters stop the
proliferation of such scams, thereby protecting those who may not have the knowledge and
resources to defend themselves. However, cyber threat hunters can also pose privacy risks to
marginalized groups as their work can be seen as a form of digital surveillance, especially when
done by the government or other organizations without transparency. There is a need for ethical
guidelines to ensure threat hunting does not cross the line into unintentionally violating privacy
rights.
Cyber threat hunters affect society by protecting the digital infrastructure that plays a
large role in the day to day lives of many people. Cyber threat hunters identify and neutralize
threats before they cause harm, helping the public maintain trust in digital systems ranging from
personal communication to more sensitive sectors such as healthcare or banking (Carley, 2020).
The field of cyber threat hunting raises ethical questions about privacy and surveillance, which in
turn influence corporate policies and laws. Cyber threat hunters apply social science ethics to
ensure that cybersecurity practices respect civil liberties while still maintaining safety (Yan,
2022).
In conclusion, cyber threat hunters combine social sciences and cybersecurity practices to
identify and neutralize potential risks. The job is deeply rooted in social sciences, applying
principles of behavioral analysis, social network analysis, and cognitive psychology to
understand the human side of cyber risk and root out malicious or suspicious activity. Their work
protects marginalized groups such as low income communities, minorities, the elderly, and
LGBTQ+ individuals by stopping the spread of social engineering and scams. It also raises
ethical questions related to privacy and surveillance. Cyber threat hunters also impact society by
maintaining public trust through their work, protecting digital infrastructure, and influencing
corporate policies and laws. Cyber threat hunters combine technical expertise with social
sciences to shape a cybersecurity landscape that is not only more secure but also more in tune
with its human side.
References
Bay, M. (2016, June). What is cybersecurity? In search of an encompassing definition for the
post-Snowden era.
Computational and
Carley, K. M. (2020). Social cybersecurity: an emerging science. Mathematical Organization Theory, 26(4), 365–381. https://doi.org/10.1007/s10588-020-09322-9
Delaney, R. (2025, May 28). What Is Cyber Threat Hunting? Trellix.com.
Klimburg-Witjes, N., & Wentland, A. (2021). Hacking Humans? Social Engineering and the
Construction of the “Deficient User” in Cybersecurity Discourses. Science, Technology,
& Human Values, 46(6), 1316–1339. https://doi.org/10.1177/0162243921992844
Yan, Z. (2022). The Dual Foundation of Cybersecurity Legislation. Social Sciences in
China, 43(3), 4–20. https://doi.org/10.1080/02529203.2022.2093065