Article Analysis

Spencer Foulk

Old Dominion University

CYSE 201S: Cybersecurity and the Social Science

Professor Matthew Umphlet

July 19, 2024

Abstract

This analysis is intended to summarize the main points of the Article at hand. This will be done by finding the key points of the text and figuring out whether a solution was met or not. This will be done by focusing on how the topic relates to the principle of social sciences, the study’s research questions, the types of methods that were used, the types of data and analysis that were performed, how concepts discussed in class relate, how the topic relates to the challenges, concerns, and contributions of marginalized groups, while also touching on its overall contribution of the study on the society. 

            Keywords: data, analysis

Relation to Social Science

What does the text have to do with the principles of social sciences? As we know, the six main social sciences include determinism, relativism, objectivity, ethical neutrality, skepticism, and parsimony. About these six principles, the text reinforces each one’s definition throughout the body of the paragraph. For instance, when explaining the history behind it all, relativism is used to show the connection between their points and information from earlier research to form a proper analysis. Objectivity and ethical neutrality are also used to provide a non-biased article with text that can be viewed from both angles to understand each side. Further examples exist like determinism that is recognized in the body paragraph and studies that were done to research and analyze a complete source of information for later use.

Research Question

As far as the article is concerned, the research question has to do with whether one hundred percent cybersecurity can be achieved and what would be necessary for such a thing to be carried out. The text dives into this question thoroughly with the use of review on the lack of cybersecurity. This review shows the negative impacts that have been noticed without the influence of cybersecurity including a plethora of threats which included cybercrime, cyberterrorism, and cyberwar. With this review we know that the research question is true and just leaving the research methods and testing left over to diagnose.

Research Methods and Data Analysis

            One of the main research methods that proved useful for this article was that of the analyzation of the existing scholarly literature on ICT. With the help of ICT, they found varying moral values including privacy and trust, freedom and consent, as well as dignity and solidarity.  This was useful when researching the morality behind the ICT and what their main goals were when it came to such information. Another research method used was based on central intuition that was drawn from discourse ethics. This method informed the reader that right or wrong was not as simple as it may seem and that it could not be easily answered in its fullest. Instead, it had to be negotiated among stakeholders. The help of the ICT and discourse ethics were useful research methods when studying the establishment of cybersecurity and all that may be involved in such a task. As far as data and analysis is concerned, as mentioned before, a lot of the information that is presented was provided for by the ICT and discourse ethics as research methods. This allowed the researchers to reflect on what they currently knew about cybersecurity’s fundamentals to grasp a differing opinion on the matter. As far as the analysis is concerned, it is not as easy as it may seem to achieve one hundred percent cybersecurity.

“We must recognize that any comprehensive cybersecurity strategy includes more than just technical elements. It must include aspects of leadership, societal, and corporate culture and encompass larger economic and even sociopolitical elements (e.g., national security)”.

Cybersecurity is not just one sided and in turn requires multiple aspects of viewpoints and information to create something that will be beneficial in the end.

Relation To Concepts in Class

            This article shows its relation to the class in more than one way with the principles of social science as one. Many of the six principles were used when developing the research question and research methods for the experiment. Other concepts that were found include archival research with the help of ICT as mentioned above, field studies that were conducted to examine individuals and their way of thinking, as well as human factors which were useful when giving an explanation about how the dichotomy of cyber hackers and protectors reflect each other. A final concept is that of Maslow’s Hierarchy which is a bit of a stretch but useful when describing the needs of a human with relation to human factors above.

Marginalized Groups

The topic has to do with the ethical, social, and political considerations of cybersecurity. IT touches on this by mentioning that cybersecurity for all is not as likely as it may seem by touching on many issues and concerns that have been outlined in the past.

“Such an attack might allow access to the camera and microphone of a laptop or smartphone, so that images and sound recordings can be made without the user’s knowledge”.

This quote has to do with the potential cyber threat on groups that could affect their confidential information and wellbeing based on their social status or financial situation for criminal gain. Another example of such a concern for such groups has to do with groups of such issues as mentioned above that suffer from illegal access to financial data, encryption of important data, theft, and extortion for example.

Overall Contribution and Conclusion

The article has provided the reader with a just and well-rounded summary of its findings as they relate to the topic at hand as to whether one hundred percent cybersecurity can be achieved. While doing so, it has also provided societal contributions like that of a deeper understanding of cybersecurity’s meaning as a whole and information on what can be done to get close to a perfect cyber protected nation. On top of this it has provided extensive research that can be reviewed and looked upon for future studies and considerations as a useful contribution to society. This article was an informative read that increased my knowledge on cybersecurity and its difficult achievement of perfect security. I found the topics to be just, the research questions to be fair, the methods to be well-fully explained, the concepts to be relative, and its overall contribution to be sound.

References

WEBER. (2022). Cybersecurity and Ethical, Social, and Political Considerations: When Cybersecurity

For All Is Not on The Table. Humanities and Social Sciences, 29(1), 87–95. https://doi.org/10.7862/rz.2022.hss.07

This Journal was written by Author Weber, Karsten who is a podiatry specialist that lives in Florida. The focus of this journal has to do with the power and dangers that can exist from Cybersecurity if careful considerations are not met. The text takes an ethically challenged analysis of the profession and its nature to find a concise conclusion to operations and tactics when forming new laws, security roles, or privacy norms.

Leave a Reply

Your email address will not be published. Required fields are marked *