{"id":72,"date":"2024-08-05T01:09:13","date_gmt":"2024-08-05T01:09:13","guid":{"rendered":"https:\/\/student.wp.odu.edu\/atrev004\/?p=72"},"modified":"2024-08-05T01:09:13","modified_gmt":"2024-08-05T01:09:13","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/atrev004\/2024\/08\/05\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Alexander Trevino<br>Professor Umphlet<br>CYSE 201S<br>August 1, 2024<br>Using Social Sciences as a Security Analyst<br>As a passionate college student embarking on a cybersecurity career, I&#8217;m discovering just<br>how vital it is to combine technical skills with social sciences. The role of a security analyst isn&#8217;t<br>just about understanding systems; it&#8217;s about understanding people.<br>For instance, insights from psychology can help create user-friendly systems that reduce<br>human error. Surveys can reveal employees&#8217; attitudes towards cybersecurity, leading to more<br>effective training programs. Experiments, though rare, can test the effectiveness of different<br>security measures.<br>Psychological principles are essential in mitigating risks related to human behavior.<br>Recognizing cognitive biases helps in designing better security protocols. The concept of<br>&#8220;Psyber Security&#8221; uses psychological insights to promote safer cyber behaviors. Traits like low<br>self-control and sensation-seeking behavior are linked to risky cybersecurity actions. By<br>identifying these traits in employees, analysts can tailor interventions to reduce cyber incidents.<br>Understanding determinism, which suggests behavior is influenced by previous events,<br>helps analysts find the root causes of cyber incidents, guiding preventive measures and policies.<br>Ethical neutrality ensures that security policies are based on evidence rather than biases.<br>Maslow\u2019s hierarchy of needs can be applied to cybersecurity, showing that digital safety<br>is crucial for individuals&#8217; security needs. This understanding helps develop security measures that<br>protect data and enhance overall well-being. Analysts must also consider the impact of<br>Trevino2<br>cybersecurity policies on marginalized groups, who often face higher risks and have unique<br>needs. Social science research can uncover these disparities, leading to inclusive and effective<br>security measures.<br>The interdisciplinary nature of cybersecurity is highlighted in the emerging field of social<br>cybersecurity. Kathleen Carley discusses this in &#8220;Social Cybersecurity: An Emerging Science,&#8221;<br>which integrates computational social science techniques to counter cyber threats. This approach<br>emphasizes social network analysis, data science, and machine learning to understand and<br>mitigate influence campaigns on social media.<br>Myriam Dunn Cavelty and Andreas Wenger explore the political dimensions of<br>cybersecurity in &#8220;Cyber Security Meets Security Politics: Complex Technology, Fragmented<br>Politics, and Networked Science.&#8221; They show how cyber incidents have become more expensive,<br>disruptive, and politicized, highlighting the evolution of cybersecurity research and policies and<br>emphasizing the interplay between technology and politics.<br>In addition, Kathleen Carley&#8217;s work on ResearchGate, &#8220;Social Cybersecurity: An<br>Emerging Science,&#8221; underscores the importance of social science principles in understanding and<br>mitigating cyber threats, focusing on human behavior and social dynamics.<br>By combining insights from various social science disciplines, security analysts can<br>better understand human factors, design effective interventions, and develop inclusive security<br>policies. This interdisciplinary approach enhances the effectiveness of cybersecurity measures,<br>ensuring they are fair and responsive to the needs of all societal groups.<br>Trevino3<br>References<br>Carley, Kathleen M. &#8220;Social Cybersecurity: An Emerging Science.&#8221; Computational and<br>Mathematical Organization Theory, vol. 26, no. 1, 2020, pp. 4-18. SpringerLink,<br>doi:10.1007\/s10588-020-09322-9.<br>Dunn Cavelty, Myriam, and Andreas Wenger. &#8220;Cyber Security Meets Security Politics:<br>Complex Technology, Fragmented Politics, and Networked Science.&#8221; Contemporary Security<br>Policy, vol. 40, no. 3, 2019, pp. 287-292. Taylor &amp; Francis Online,<br>doi:10.1080\/13523260.2019.1678855.<br>Carley, Kathleen M. &#8220;Social Cybersecurity: An Emerging Science.&#8221; ResearchGate, 2020,<br>ResearchGate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alexander TrevinoProfessor UmphletCYSE 201SAugust 1, 2024Using Social Sciences as a Security AnalystAs a passionate college student embarking on a cybersecurity career, I&#8217;m discovering justhow vital it is to combine technical skills with social sciences. The role of a security analyst&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/atrev004\/2024\/08\/05\/career-paper\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26774,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/72"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/users\/26774"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/comments?post=72"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/72\/revisions"}],"predecessor-version":[{"id":73,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/72\/revisions\/73"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/media?parent=72"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/categories?post=72"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/tags?post=72"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}