Feature be adopted in that ICS professionals must engage in knowledge translation concerning how technical affordances relate to a users' mental model of a system. Users' knowledge and perception must guide the design, and their attention must be focused on design features that might threaten their conception of privacy. In that their understanding of privacy will likely evolve over time, it will be necessary to continually engage users. Rather than adopting position of cultural absolutism or relativism, this review illustrates how shared social cognitive processes related to interpersonal monitoring and regulation can manifest as different representations of privacy and security. To this end, cybersecurity requires understanding users' mental models of privacy and security. At a basic level, any surveillance system reflects a need to monitor and regulate the behaviors of those within a social network [21]. Faced with capacity limitations, a sociotechnical system is created that incorporates sensors and nonhuman agents to process information. ICS professionals must ensure that they are aware of technical affordances that relate to the security and privacy of software. Wherever possible, errors must be avoided, vulnerabilities identified, and