1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
Overall, cyber-attacks are becoming more common, so businesses must educate themselves on cybersecurity and cyber-policy in order to protect themselves. First, a company’s cyber-policy must be discussed with all employees. This informs everyone in the company about the policy, which can lead to a successful cybersecurity program. Due to the ability to simply be prepared for a cyberattack, the policy is one of the most important parts of the company’s cybersecurity program. This allows the company to mitigate the damage that would have occurred if they had not been prepared for the attack. One issue is that people are constantly inventing new ways to commit cyberattacks, making policy formulation difficult. This is why when policies are made they should be very simple in order to try to cover the basics that could occur. Also it is important to look ahead in order to try to lessen the damage that occurs from the cyberattack.
2. How does cyber technology impact interactions between offenders and victims?
When a typical crime occurs, the interactions between offenders and victims are different. This interaction is typically conducted via the internet. The majority of offenders commit the crime via the internet, and the majority of the time, the offender does not know their victims. I believe this makes it more difficult to find the offender because the offender is not seen committing the crime. In addition, some offenders may use technology to learn more about the victim they intend to attack. As previously stated, it is frightening to realize that a simple Google search of your name yields all of your personal information. Because of the information available on the internet, it would be very easy for someone to commit a crime against me. Although cybercrimes are done over the internet, so there would be no social in person interaction, there can still be interaction through technology. For example, the act of phishing is when someone sends an email to another person, pretending that it is coming from an actual company in order to get information from the victim. This is still a form of interaction, but it is just not in person.