Journal 6:
1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
2. How does cyber technology impact interactions between offenders and victims?
The first thing that arises in mind is how to secure the company’s data to secure its assets because today’s data is money, so you have to keep it insecure to avoid any measurable problem.
Every organization, either it is a small one or a big one, must follow strong security policies and avoid the many types of breaches and threats. There are aspects of security policy that businesses should be approaching:
1) company must think security is also important and essential part of the organization.
2) company must have an awareness of possible risks
3) requirement for experts to prevent the security of the company.
4) must set up a good security policy and infrastructure to avoid the many types of vulnerabilities.
5) the company have to learn from others mistake and secure them firmly.
On the other hand, the impact of technology on the interaction between the victims and offenders is very noticeable. The internet creates many opportunities to harm and victimize other people on a scale that could be impossible. Offenders can target people solely through the internet or use the internet to find the personal information they may be trying to stalk or harass in real life. Especially on social media, people tend to post an abundance of personal data that offenders may use against you—for example, posting pictures while on vacation could inform a possible offender that your house is empty and could easily be robbed. Another way the internet sets up people to be victims is by sharing something that was supposed to be private on a public form, shared without consent, or even used to blackmail. Even scarier is there have been instances of webcams being hacked on personal computers. Predators also thrive on the internet, trying to convince their victims to meet them in person, more than likely with evil intentions.
RFERENCE:
- Cybersecurity Policy Making at a Turning Point. (2012). OECD Digital Economy Papers. https://doi.org/10.1787/5k8zq92vdgtl-en
- Weulen Kranenbarg, M., Holt, T. J., & van Gelder, J.-L. (2017). Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap. Deviant Behavior, 40(1), 40–55. https://doi.org/10.1080/01639625.2017.1411030
Leave a Reply