Case Analysis 2 (1.4)

What would have been a more ethical way to implement Google Street View? Google Street View is a feature in Google Maps and Google Earth that allows users to view streets all around the world. In the Vaidhyanathan article, it states that many countries such as the Netherlands, United Kingdom, France, United States, and Japan…

Case Analysis 1 (5.4)

Did Manning act out of loyalty to the United States when she released the footage in the video? Do her actions constitute a moral or immoral case of whistleblowing? The youtube video titled “Collateral Murder” discusses the leaking of a series of military videos of the US air force firing at Iraqis. Within this discussion,…

Discussion Board: From Verbeek’s writing (Mod 7, Reading 4) Designing the Public Sphere: Information Technologies and the Politics of Mediation

Markets, businesses, groups, and individuals need to all have different regulations or limitations, following the diminish of state power, intelligification and networking of the material world. The intelligification of everyday objects, such as refrigerators, phones, glasses, and cars have become a part of our normal day to day lives. While they have their advantages, there…

Discussion Board: Opportunities for Workplace Deviance

Workplace deviance is defined as behaviors that violate organizational norms, in doing so threatening the well-being of the organization and the employees within it. Cyber Technology could increase white-collar crimes within the workplace. White-collar crimes are known as frauds that are committed by business and government professionals. An instance of this is someone in the…

Discussion Board: Ethical Considerations CRSIPR Gene Editing

There are some ethical considerations with biocybersecurity, such as the risks that have never been thought of before and vulnerabilities. The risks could be seen by taking a DNA test from websites like 23andme or ancestry.com because hackers could use your DNA to put malware in it that can cause problems for scientists in the…

Discussion Board: Protecting Availability

As the CISO, I would first implement two-factor authentication. The company would need this because it is important to have another way of identification of employees and others, incase they don’t remember their passwords or other identification methods. Next, the company would need an incident report team so that if something occurs, it can be…

Discussion Board: The NIST Cybersecurity Framework

A benefit that an organization can gain from using the framework for improvement is providing a structure for them to strengthen their cybersecurity in critical infrastructure as well as in other sectors. I would use this framework as a way to analyze potential risks within the workplace and prevent those risks from affecting the organization…

Discussion Board: Going Job Hunting

All 50 of the cybersecurity titles on the list are unique, but the two that I chose to research are cybercrime investigator and automotive security engineer. The disciplines represented in all 50 jobs are the studies in the cybersecurity field and IT. My biggest surprise with reading the article with each job listed is that…