Cybersecurity Should Be Placed Under the Humanities, Not Technology

Thomas Holt Russell
13 min readJul 6, 2023

It’s the Difference Between Technology Training and Technology Education

I am not the first person who thinks that technolgy education should be firmly placed under the topic of humanities. In 1969, Paul Goodman stated that technology was a branch of moral philosophy, not science. He went on to state;

“…technology must have its proper place on the faculty as a learned profession important in modern society, along with medicine, law, the humanities, and natural philosophy, learning from them and having something to teach them. As a moral philosopher, a technician should be able to criticize the programs given him to implement. As a professional in a community of learned professionals, a technologist must have a different kind of training and develop a different character than we see at present among technicians and engineers. He should know something about the social sciences, law, the fine arts, medicine, and relevant natural sciences.”

For this topic, I consider cybersecurty to be under the umbrella of STEM and technology in general, under a wider scope. The apparent connection between technology and humanities is easily understood philosophically. Paul Goodman saw that in 1969, well before the digital age. Even now, we still consider STEM education separate and less important than common core courses, even though everything we experience is deeply seated in digital technology. Now is a great time to start making significant changes in our education system regarding technology. Even with the best efforts of educators, policymakers, and industry, America needs to do a better job of educating enough people to fill the positions of the future.

One of the reasons is that all STEM courses should be part of the common core curriculum, mainly outside the common core. In most high schools, you can graduate without taking cybersecurity or other STEM courses. Since cybersecurity is an elective, most students choose to skip cybersecurity courses. The cybersecurity industry has an awful marketing department. The image of people sitting behind the glow of a computer monitor, pecking on a keyboard as letters and numbers in the form of code scroll on the screen, is not an image that most people find desirable.

Secondly, unlike common core courses, technology is an island to itself. We need to have technological literacy. Technology literacy is as critical as cultural literacy. Cultural literacy is the thread of commonality that we can agree on. It is facts and feelings that we should all share as a nation, even if subjective. But many think technology is a binary choice; either you are in the industry or not. That thinking may have been acceptable thirty years ago when there was a more apparent distinction between the technology industry and everyone else. However, today, every industry is technology. Healthcare, manufacturing, military complex, construction, and law enforcement are all equally neck deep in their use and dependency on technology.

Sometimes we confuse teaching students how to use technology with technology education. Teaching students to code or engineer a network differs from technology education. In his book, Building a Bridge to the 18th Century, Neil Postman correctly pointed out that children learn how to use computers independently. He is correct. When did you last see a teenager or adolescent read the directions for playing a new video game? Technology education ensures that students learn the social, political, and economic impact of technology development, not how to use technology.

The good news is that we can increase the digital competency of America’s students by making a few changes in policy. Every citizen needs to read and write; just as important, every citizen must be taught cybersecurity safety and ethics. These items must be a permanent part of all courses. It is a manageable task. Many educators are already doing it. First, I will review what STEM subjects and topics can be incorporated into common core courses. After that, I will take a step further to outline how this STEM instruction can quickly morph into cybersecurity topics.

English is an excellent example of a course embedded (intentionally and unintentionally) in every course. In America, we have classes for English, and we use that skill in all of our other classes. English is a course that has an immediate payoff. By its nature, it is also the practical bedrock of our learning. Math is just as important as English. However, the practical use of math is not practiced daily by most people, but we agree it is crucial to learn at least to a certain level. The same can be said of science. Technology’s growing ubiquities’ is practiced daily. Society is wrapped in technology. Make it a common core course, and the quickest way is to start with history/humanities first.

Why Should Technology Be Put into Humanities Subjects?

The history of technology provides fascinating insights into the broader socio-economic and environmental context of their times.

Technology is not just a collection of tools or gadgets; it reflects our culture, values, and humanity. When we study technology, we learn more than just the mechanisms of machines or the language of code. We are studying the human decisions, biases, ethics, and social structures that underpin these creations. We are investigating how these inventions shape and are shaped by human societies, institutions, and interactions.

Each new technology is a new way of telling a story about our world and our place in it. The shift from oral to written culture, the invention of the printing press, the dawn of the television age, and now the digital revolution have rewritten our society’s narrative. They change not just what we do but how we think, relate to one another, and understand our own human experience.

Just as literature, art, history, and philosophy courses delve into the human condition, a humanities-focused study of technology would explore questions like: What does this technology enable us to do, and at what cost? Who benefits from it, and who suffers? What values does it reflect, and what values does it propagate?

Studying technology as a humanities course also equips students with the critical thinking skills necessary to navigate our digital world. We need a generation who can ask tough questions, critically evaluate new technologies, and steer the future of technological development in a direction that truly serves humanity.

The study of technology should be broader than technical skills and knowledge. We must approach technology as a narrative of human progress, a product of human culture, and a powerful force shaping human experience. This is why technology should be taught not just as a science but as a humanities course.

Connecting cybersecurity to humanities can offer insightful perspectives and broaden the scope of learning in areas such as ethics, digital culture, law and policy, history, literature and language, art and media, and philosophy.

Cybersecurity involves essential ethical considerations, such as privacy rights, data ownership, digital surveillance, and responsibilities in digital spaces. These are topics often explored in philosophy and ethics courses within the humanities. Understanding cybersecurity’s societal and cultural implications can be a crucial area of focus in sociology, anthropology, or cultural studies. Discussions could include how cyber threats and the measures taken to prevent them impact different societies or cultural groups.

Legal studies within the humanities can delve into the legislation around cybersecurity, privacy laws, and how they’ve evolved. It can also explore international dimensions such as cyber warfare and international agreements on cybercrime. As discussed earlier, the historical development of cybersecurity, major cyber incidents, and their impacts can be explored in history courses. This can provide students with a better understanding of today’s cybersecurity landscape.

In literature courses, students can analyze texts (novels, plays, films, etc.) dealing with cybersecurity, privacy, and technology themes. Language studies can explore linguistic aspects of cyber communication and the importance of clear, accessible language in cybersecurity policies and education. Art and Media Studies: Students can explore how cybersecurity issues are represented and discussed in different media, from news reports to movies to social media. This can also include the creation of visualizations or representations of cyber threats, data breaches, and encryption.

In philosophical discussions, deep questions related to cybersecurity, such as “What is the nature of privacy in the digital age?” or “What ethical responsibilities do we have in digital spaces?” can be explored.

Incorporating cybersecurity into humanities education fosters a comprehensive understanding of our digital world, cultivates ethical awareness and critical thinking, and promotes responsible digital citizenship. It’s not just about technical skills but also about understanding cybersecurity’s societal and human implications.

Below are some ways to incorporate technology into other courses to benefit from a well-rounded education.

Math

Cybersecurity is inherently a mathematical field. There are several areas in cybersecurity where the principles of mathematics are applied. Here are a few ways to tie these subjects together in a classroom setting:

Cryptography: Cryptography is the practice of securing communication and heavily relies on complex mathematics. Modern encryption algorithms used in cybersecurity, like RSA, Diffie-Hellman, and Elliptic Curve Cryptography, are based on number theory and abstract algebra concepts. Teaching students about prime numbers, modular arithmetic, or the difficulty of factoring large numbers can illustrate how math provides the basis for secure communication over the Internet.

Probability and Statistics: Cybersecurity professionals need to understand the likelihood of certain types of cyber attacks, and they often use statistical models to analyze past security incidents to predict future risks. They also use these skills to interpret the outputs of various security tools, which often provide data about the probability that a particular event (like a cyber attack) will occur.

Boolean Algebra and Logic Gates: Boolean algebra is fundamental to computer science, which underpins cybersecurity. Boolean algebra allows computers to solve complex problems by breaking them down into more straightforward binary problems (true or false, yes or no, 1 or 0). Logic gates, the building blocks of digital circuits, are directly tied to Boolean algebra.

Graph Theory: In network security, graph theory plays an essential role. Networks of computers can be represented as graphs, with computers as nodes and connections as edges. Then, various graph algorithms can be used to optimize network performance or identify vulnerabilities.

Machine Learning: Machine Learning algorithms, which are mathematical models, are often used in cybersecurity to detect anomalies, predict attacks, or identify malicious behavior. They require knowledge of calculus, linear algebra, and statistics.

By integrating these math principles into cybersecurity education, students can better understand the theoretical underpinnings of the field. They also get practical knowledge on how to apply these principles in real-world cybersecurity scenarios. It could also make math lessons more engaging by demonstrating how these concepts are used to solve critical real-world problems.

Science

Cybersecurity can be linked to various scientific disciplines, as it involves computer science, psychology, and even physics principles. Here’s how you might tie it to science in your teaching:

Computer Science: Cybersecurity is a subset of computer science, a scientific discipline. It involves algorithms, data structures, computation, and information systems — all critical areas in computer science. Understanding the fundamental science of how computers and networks operate is essential to understanding how to secure them.

Physics: The principles of quantum mechanics are leading to new ways to encrypt and secure data through quantum cryptography. Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. This allows the communication parties to detect the presence of any third party trying to gain knowledge of the key.

Biology: Concepts from biology, particularly the idea of viruses and how they spread, are often used in cybersecurity to understand how malware can infect computer systems. Additionally, the idea of an immune system has been used as a model for developing systems that can detect and eliminate threats.

Psychology: Social engineering, a significant part of cybersecurity, is deeply rooted in psychological principles. It involves manipulating individuals to disclose confidential information. Understanding the psychological tricks used in social engineering can help students be more aware of these types of threats. This also extends to the study of human behavior and user habits in maintaining or breaking the security of systems.

Chemistry: The science of steganography, which is the practice of concealing a file, message, image, or video within another file, message, image, or video, parallels chemistry much like a chemist might use a solvent to reveal a letter written in invisible ink, a cybersecurity professional uses steganalysis to detect hidden information in digital files.

In all these ways, you can incorporate science into your cybersecurity teaching. By doing so, you can help students see the interconnectedness of different fields and how they all come together in the real world.

English

Incorporating cybersecurity into English studies may seem challenging, but it’s achievable. Here are several ways you can tie these subjects together:

Technical Writing: Cybersecurity professionals often need to write reports, document their findings, and communicate complex technical concepts to a non-technical audience. Studying technical writing and developing good writing skills can be very beneficial in the cybersecurity field. Students can be assigned to write essays or reports on cybersecurity topics, practicing their technical writing skills.

Critical Reading and Analysis: A significant portion of cybersecurity involves reviewing and interpreting complex documents such as legal compliance guidelines, technical manuals, or threat intelligence reports. Developing critical reading skills can assist students in dissecting these documents effectively.

Cybersecurity Literature: There are numerous non-fiction books that explore various aspects of cybersecurity, from the history of cryptography to the rise of global hacking cultures. Examples include “The Code Book” by Simon Singh, “Ghost in the Wires” by Kevin Mitnick, and “Future Crimes” by Marc Goodman. Reading and discussing such books can provide insights into the world of cybersecurity.

Digital Citizenship and Ethics: Discussing topics like privacy, cyberbullying, online ethics, and digital rights and responsibilities can create meaningful conversation in an English class while also touching upon essential elements of cybersecurity.

Persuasive Writing and Debates: Cybersecurity encompasses many contentious issues that are great for persuasive essays and debates. These could include topics like the balance between privacy and security, the ethics of hacking, net neutrality, or the role of government in cybersecurity.

Narrative and Storytelling: Cybersecurity events can be transformed into narratives for students to analyze or create. This could involve writing creative narratives about hypothetical cyber attacks or analyzing the narrative of real-world cyber incidents.

By integrating cybersecurity topics into English lessons, you can help students understand the broad societal impacts of cybersecurity and develop important language and analytical skills crucial to cybersecurity.

***

During the 17th and 18th centuries, information was not considered a commodity to be sold and purchased. During that time, information was not thought to have worth unless it was embedded in some context.

Cybersecurity in other STEM courses

Music

At first glance, the connection between music and cybersecurity might not seem obvious. Still, upon closer examination, you can find several intersections and ways to incorporate music into cybersecurity education creatively:

Cryptography and Music: Music can be used to introduce students to the basic concepts of cryptography, which is a critical part of cybersecurity. For instance, a teacher could assign students to develop a simple cipher using musical notes instead of letters. They could also learn about historical cases in which music was used to encode messages, such as in wartime.

Frequency Analysis: In music theory and cybersecurity, frequency analysis plays a key role. In music, frequency determines pitch; in cybersecurity, frequency analysis is used in deciphering encrypted messages. Exploring these parallels can help students understand the concept in a new light.

Algorithmic Composition: This refers to creating music based on a set of rules or an algorithm. Understanding how algorithms work is crucial in cybersecurity, and composing music using algorithms can be a fun and engaging way to introduce this concept.

Sound-based Authentication: Some security systems use sound or voice recognition as a form of authentication. A discussion around this could lead to an exploration of acoustics and the unique properties of sound that enable this kind of security.

Sonic Representation of Data (Sonification): In some advanced applications, data from network traffic or system logs can be converted into sound waves to detect anomalies or intrusions. Understanding how music can represent different types of data could be a fascinating topic of study.

Social and Ethical Discussions: Popular music often reflects societal issues and concerns. Songs referencing privacy, surveillance, hacking, or other cybersecurity-related themes could serve as springboards for class discussion on these topics.

By finding these connections and integrating music into cybersecurity education, you can provide students with a multidisciplinary understanding of cybersecurity beyond ordinary technical skills, incorporating creativity, critical thinking, and cultural awareness.

Art

Integrating art with cybersecurity can offer a unique perspective and make learning about cybersecurity principles more engaging. Here are a few ways you could potentially combine the two:

Visualizing Data and Threats: Art can help make complex cybersecurity concepts more understandable. Students can use artistic skills to visualize data breaches, threat landscapes, or the inner workings of a computer network. This can be done through infographics, diagrams, or even more abstract visual representations.

Understanding User Interfaces and Experience: A crucial part of cybersecurity is making sure security systems are user-friendly. Students can explore the principles of design and usability to create mock-ups of user interfaces for security software that are both functional and aesthetically pleasing.

Digital Art and Copyright: Understanding copyright principles is essential in a digital world. Lessons could cover protecting digital artworks from theft and appropriately using and referencing others’ works.

Art and Cryptography: Much like music, art can be used to introduce students to the basic concepts of cryptography. Students could create artworks with hidden messages or use a particular artistic method as a cipher.

Storytelling and Cybersecurity: Storytelling is a powerful tool in teaching complex concepts. Students could create comic strips, animations, or storyboards to tell the story of a cybersecurity breach and how it was resolved. This approach can foster an understanding of cybersecurity concepts and protocols.

Exploring Ethical Implications through Art: Art often serves to make statements about societal issues. Students could create artwork exploring the ethical implications of cybersecurity, such as privacy concerns, the consequences of cybercrime, or the dilemmas cybersecurity professionals face.

Incorporating art into cybersecurity training can foster creativity, critical thinking, and a deeper understanding of cybersecurity concepts. It can also help to develop communication skills as students learn to represent and explain complex cybersecurity issues visually.

Conclusion

Cybersecurity, as an interdisciplinary subject, can be seamlessly integrated into all common core subjects, promoting technical skills and nurturing critical thinking, ethics, literacy, and creativity. Moreover, incorporating cybersecurity into humanities education fosters a comprehensive understanding of our digital world, cultivating ethical awareness and encouraging responsible digital citizenship. Ultimately, it underscores that mastering cybersecurity isn’t just about technical prowess but equally about understanding its societal and human implications.

--

--

Thomas Holt Russell

Founder & director of SEMtech, Writer, educator, photographer, and modern-day Luddite and Secular Humanist. http://thomasholtrussell.zenfolio.com/ My writing is