Cybersecurity, Technology, and Society
This course provided an interdisciplinary understanding of how technology and cybersecurity impact society. It examined the ethical, legal, and social implications of cybersecurity, privacy, and emerging technological challenges. Key topics included cyber threats, data privacy, social media’s influence, and the role of government and organizations in ensuring cybersecurity. Students were encouraged to critically analyze real-world scenarios to understand how technology and societal norms intersect.
Course Materials
The course utilized a variety of materials to support learning, including:
• Textbook Readings: Focused on the foundations of cybersecurity and its societal implications.
• Case Studies: Examined real-world breaches and their legal and ethical ramifications.
• Research Articles: Provided insights into current issues, such as data privacy laws and AI ethics.
• Documentaries and Videos: Highlighted the evolving nature of cybersecurity threats and their societal impact.
• Class Discussions: Encouraged critical debates on topics such as surveillance, digital rights, and ethical hacking.
These materials helped bridge the gap between technical concepts and their broader societal applications, fostering a holistic understanding of the field.
Entry #1:
I’m interested in cybersecurity technology because I like helping others. not only there is unlimited growth, there is plenty of variety and there is a lot of career option. it feels good to protect peoples’ livelihoods and privacy. computer science, criminal justice, computer engineering, and information technology are the four majors I picked to relate to cybersecurity. all the choosing majors require some computer knowledge.
Entry #2
Describe four ethical issues that arise when storing electronic information about individuals. Compare cybersecurity risks in the U.S. and another country.
The four ethical difficulties that arise from storing electronic information about individuals are privacy and confidentiality, security breaches, system implementation challenges, and data errors. Privacy and confidentiality are concerned with individual information/data that must be secured using secure protection mechanisms, yet the data can only be shared with those who have authorization. When an individual’s electronic data is made available to a third party without permission from an authorized person, a security breach occurs. System implementation challenges must be overcome in order to store electronic data in a secure system storage, including issues such as system efficiency, resource waste, proper use of platforms and services, and a lack of resources required for secure electronic data storage. Data inaccuracies are caused by duplicate electronic and inaccurate information on a person in the system. With the growth of the internet, the entire globe now faces cyber security concerns owing to cyber attacks, data breaches, and ongoing challenge and human knowledge. In comparison to other countries, the United States ranks fifth, trailing Japan, France, Canada, and Denmark.
Entry #3
How has cyber technology created opportunities for workplace deviance?
Cyber devianve can be defined as engaging in criminal behaviors with the facilitation of technology. The integration of cyber technology into workplaces has undeniably brought about numerous advantages, but it has also created opportunities for workplace deviance. The digital landscape introduces new avenues for employees to engage in various forms of misconduct, challenging traditional understandings of workplace behavior.
One notable way cyber technology facilitates deviance is through unauthorized access and misuse of company resources. Employees may exploit their technical skills to access sensitive information, compromise data integrity, or engage in activities detrimental to the organization. This form of deviance not only poses security risks but can also lead to financial losses and reputational damage.
The anonymity afforded by online platforms contributes to another dimension of workplace deviance. In virtual spaces, employees might feel shielded from direct consequences, emboldening them to engage in behaviors like cyberbullying, harassment, or spreading malicious rumors about colleagues. This shift from face-to-face interactions to digital communication platforms creates an environment where deviant actions can go unnoticed or unattributed.
Moreover, the rise of remote work has introduced challenges in monitoring and controlling employee behavior. The blurred boundaries between personal and professional spaces in remote settings can lead to increased opportunities for time theft, where employees engage in non-work activities during paid hours. The absence of direct supervision can create an environment conducive to slacking off or engaging in activities contrary to organizational norms.
To address these challenges, organizations need to implement robust cybersecurity measures, provide comprehensive training on digital ethics, and establish clear guidelines for remote work. By fostering a culture of responsible technology use and maintaining open communication channels, employers can mitigate the opportunities for workplace deviance presented by cyber technology.
Entry #4
What are the costs and benefits of developing cybersecurity programs in business?
A cyberattack can affect your business operations, resulting in downtime and productivity loss. Having a strong cybersecurity policy in place helps to ensure the continuity of your operations and reduces the risk of costly interruptions. Strong cybersecurity is always worth the investment. Aside from the immediate financial cost of cybercrime, which can be significant, the long-term harm to your company’s reputation if confidential data is exposed can be severe. Some of the benefits include, but are not limited to, preserving personal data, enhancing productivity, regulating compliance, assisting the remote workspace, educating and training the workforce, and, most importantly, maintaining trust and credibility. The cost of implementing cybersecurity programs in company is not only monetary; it may also include the penalties of failing to implement a cybersecurity program in their organization. They could become a target, resulting in sensitive data leaks, credit card information, social security numbers, bank accounts, and other information being taken.
Saxena, Ayush. “Importance of Cyber Security: Benefits and Disadvantages.” Sprinto, 1 Sept. 2023, sprinto.com/blog/importance-of-cyber-security/.
Entry #5
- How can you tell if your computer is safe?
- Describe three ways that computers have made the world safer and less safe.
Ensuring the safety of your computer involves several key practices:
1. Antivirus and Anti-malware Software: Install reputable antivirus and anti-malware software to safeguard your computer against malicious threats. Regularly update these programs to ensure they have the latest threat definitions. Scheduled scans and real-time protection features can help detect and mitigate potential risks.
2. Operating System and Software Updates: Keep your operating system (OS) and all installed software up to date. Developers release updates to patch security vulnerabilities and enhance overall system security. Enable automatic updates whenever possible to ensure you receive the latest security patches promptly.
3. Firewall Protection: Activate and configure your computer’s firewall. Firewalls act as a barrier between your computer and potential threats from the internet. They monitor and control incoming and outgoing network traffic, providing an additional layer of defense against unauthorized access and cyberattacks.
As for the impact of computers on the world’s safety, they have both positive and negative implications:
Safer:
1. Improved Communication and Emergency Response: Computers enable faster and more efficient communication, aiding in emergency response situations. Emergency services can receive and disseminate critical information rapidly, enhancing their ability to coordinate and respond to crises.
2. Advancements in Medicine: Computers have revolutionized medical research, diagnostics, and treatment. From analyzing vast datasets to simulating complex biological processes, computers contribute to medical breakthroughs, improving patient outcomes and overall healthcare safety.
3. Enhanced Transportation Safety: Computer technology has significantly improved transportation safety through innovations such as advanced driver assistance systems, traffic management, and aviation navigation systems. These technologies reduce the likelihood of accidents and enhance overall safety in the transportation sector.
Less Safe:
1. Cybersecurity Threats: The interconnected nature of computers introduces cybersecurity threats, including malware, ransomware, and phishing attacks. These pose risks to personal information, financial data, and even critical infrastructure, potentially compromising overall safety.
2. Privacy Concerns: The digitization of information raises concerns about privacy. Personal data stored on computers can be vulnerable to unauthorized access, leading to identity theft, surveillance, or misuse of sensitive information.
3. Technological Dependence: Increased reliance on computers and interconnected systems creates vulnerabilities. Disruptions, whether caused by cyberattacks, technical failures, or natural disasters, can have widespread consequences, impacting essential services and infrastructure, and potentially compromising safety on a larger scale.
Entry #6
- How do engineers make cyber networks safer?
- What is the overlap between criminal justice and cybercrime? how does this overlap relate to the other disciplines discussed in class?
Engineers make major contributions to cyber network security through a combination of technical understanding and strategic implementations:
- Security Protocols and Encryption Engineers create and implement strong security mechanisms to ensure the integrity and confidentiality of data. Encryption techniques are critical for safeguarding sensitive data during transmission and storage and preventing unauthorized access.
- Firewalls and Intrusion Prevention Systems: Firewalls and intrusion prevention systems are designed and deployed by engineers to monitor and manage network traffic. These techniques serve as obstacles to illegal access and aid in the detection and mitigation of potential cyber threats in real time.
- Continuous Monitoring, Routine Security Audits, and Prompt Software upgrades: Continuous monitoring, routine security audits, and prompt software upgrades are critical to discovering vulnerabilities and ensuring that security measures are in sync with the growing threat landscape.
The overlap between criminal justice and cybercrime is visible in several ways:
- Digital Forensics: To investigate cybercrime, both disciplines use digital forensics techniques. These approaches are used by criminal justice professionals to collect and analyze electronic evidence, while cybersecurity specialists utilize them to determine the origin and impact of cyber attacks.
- Legal Framework and Law Enforcement: Criminal justice professionals play a critical role in creating and enforcing cybercrime legislation. They cooperate with cybersecurity professionals to develop legal frameworks that meet the difficulties of digital offenses.
This overlap extends to other areas covered in class, particularly the ethical issues surrounding cybersecurity. Engineering, criminal justice, and ethics all intersect in ethical hacking, responsible disclosure, and privacy concerns. Recognizing the ethical consequences of technical breakthroughs necessitates interdisciplinary teamwork in navigating the complex environment of cyber threats, ensuring a comprehensive approach to cybersecurity that prioritizes both safety and ethical norms.
Entry #7
- How does cyber technology impact interactions between offenders and victims?
- How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?
Cyber technology has a significant impact on interactions between criminals and victims, offering both obstacles and opportunities in the criminal sphere. Offenders can use the internet’s anonymity and reach to commit a variety of cybercrimes such as hacking, online abuse, and fraud. The internet landscape gives perpetrators new ways to target victims all around the world, often crossing national boundaries.
In the digital age, victims, on the other hand, face new challenges. Identity theft, online harassment, and financial fraud are all made more likely by advances in cyber technology. Because the digital arena may lack the usual support mechanisms provided in face-to-face contacts, the psychological impact on victims can be severe. The issue of identifying and managing emerging risks in a quickly expanding technology context necessitates a comprehensive understanding of the “short arm” of predictive knowledge. Policymakers must create adaptable frameworks to deal with growing cyber dangers. This includes investing in cybersecurity education, encouraging international cooperation, and changing policy on a regular basis to handle emerging threats.
Collaboration among government, industry, and cybersecurity specialists is essential for building successful policies and resilient infrastructure. Policymakers should prioritize the creation of regulations that strike a balance between security and individual privacy rights. Furthermore, given the unpredictable nature of technical breakthroughs, investments in research and development are critical for staying ahead of cyber threats. Public-private partnerships play a pivotal role in establishing a robust cyber policy framework. Encouraging information sharing, threat intelligence collaboration, and standardizing cybersecurity practices across industries can enhance collective resilience against cyber threats. By acknowledging the limitations of predictive knowledge, policymakers can create adaptive policies that promote cybersecurity while respecting individual freedoms in the dynamic landscape of cyberspace.