What would have been a more ethical way to implement Google Street View? Google Street View is a feature in Google Maps and Google Earth that allows users to view streets all around the world. In the Vaidhyanathan article, it states that many countries such as the Netherlands, United Kingdom, France, United States, and Japan…
Author: acuff007
Case Analysis 1 (5.4)
Did Manning act out of loyalty to the United States when she released the footage in the video? Do her actions constitute a moral or immoral case of whistleblowing? The youtube video titled “Collateral Murder” discusses the leaking of a series of military videos of the US air force firing at Iraqis. Within this discussion,…
Discussion Board: From Verbeek’s writing (Mod 7, Reading 4) Designing the Public Sphere: Information Technologies and the Politics of Mediation
Markets, businesses, groups, and individuals need to all have different regulations or limitations, following the diminish of state power, intelligification and networking of the material world. The intelligification of everyday objects, such as refrigerators, phones, glasses, and cars have become a part of our normal day to day lives. While they have their advantages, there…
Discussion Board: The “Short Arm” of Predictive Knowledge (Module 7, Reading 1)
In the Jonas Reading, the approach of cyber-policy and infrastructure could be based on the “short arm” of predictive knowledge. The short arm predictions were used to predict the future of man based upon the behavior that someone has done in the context of the historical texts. Since, cyber-policy and infrastructure are advancing everyday it…
Discussion Board: Opportunities for Workplace Deviance
Workplace deviance is defined as behaviors that violate organizational norms, in doing so threatening the well-being of the organization and the employees within it. Cyber Technology could increase white-collar crimes within the workplace. White-collar crimes are known as frauds that are committed by business and government professionals. An instance of this is someone in the…
Discussion Board: Ethical Considerations CRSIPR Gene Editing
There are some ethical considerations with biocybersecurity, such as the risks that have never been thought of before and vulnerabilities. The risks could be seen by taking a DNA test from websites like 23andme or ancestry.com because hackers could use your DNA to put malware in it that can cause problems for scientists in the…
Discussion Board: Protecting Availability
As the CISO, I would first implement two-factor authentication. The company would need this because it is important to have another way of identification of employees and others, incase they don’t remember their passwords or other identification methods. Next, the company would need an incident report team so that if something occurs, it can be…
Discussion Board: The NIST Cybersecurity Framework
A benefit that an organization can gain from using the framework for improvement is providing a structure for them to strengthen their cybersecurity in critical infrastructure as well as in other sectors. I would use this framework as a way to analyze potential risks within the workplace and prevent those risks from affecting the organization…
Discussion Board: Going Job Hunting
All 50 of the cybersecurity titles on the list are unique, but the two that I chose to research are cybercrime investigator and automotive security engineer. The disciplines represented in all 50 jobs are the studies in the cybersecurity field and IT. My biggest surprise with reading the article with each job listed is that…