module 6

1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Society has become so dependent on technology; it is hard to live in a world without it. So much of the things that go on day to day rely on technology from the way schools teach to making a cup of coffee. Technology has grown faster than ever before. New inventions are being created, and improvements on old technology are already being thought of every second of every day. With all this progress, it is hard for society and the government to keep up. Because technology is still new, it is hard for the government to come up with laws quickly. People do not know what technology is fully capable of, and these laws are slow to pass because of it. The best way to approach cyber-policy is education. People need to be educated on how the technology works and the crimes associated with it. More and more, criminals are finding more exploits for this technology, so it is crucial to educate and inform. In the end, it is impossible to try and keep up with changes in crime techniques. It is better to have a set of rules that need to be followed to regulate what happens online. There is never going to be a perfect solution to enacting laws in the world of cyber-policy. The only thing that can be done is education and training.

2. How does cyber technology impact interactions between offenders and victims?

Before the advent of technology, most crimes were hard to spot, and most crimes happened physically. But now, with technology, things have become a lot easier. Users can see when cyber crimes are happening and, at some points, find out who is committing the crime. In some ways, cyber technology has made the interaction between the offenders and the victims more significant as the offender can pose as a person that the user would know. They may be posing as a family member or a friend online to gain information. In the old days, a person had to do a lot of work to have an interaction with another person to steal there info. It allows the offender to find victims easier and without much effort. Gone are the day’s criminals had to jump through hoops to find a vulnerable person to take advantage of. This is why it is essential to be aware of who the user is talking to and where info goes. We live in a time where people can be connected in an instant. This is different from the old ways in which to connect with another person they would have to be present physically in order to be connected. It shows that people need to be more careful with who they talk to online and how they present themselves online.

Leave a Reply

Your email address will not be published. Required fields are marked *