How Should We Approach the Development of Cyber-policy and -infrastructure given the “short arm” of Predictive Knowledge?

The “short arm” of predictive knowledge refers to the viewpoint and ethical conduct of each situation being immediate, and, as there is no way to omnisciently know the future repercussions of the decision made, there is no way to evaluate the shortcomings of said decision. As we approach the development of cyber policy and cyber infrastructure, this lack of omniscience must be taken into consideration. Policies and infrastructure must be consistently evaluated and improved in order to remain physically sound, to prevent unnecessary breaches, as well as ethically sound, to ensure the well-being of those reliant upon the infrastructure is taken into consideration.

The cyber policy sets the standards for acceptable behavior with the cyber medium for actions such as encryption or the use of social media. By consistently improving cyber policies, ease of use and safety for users are being improved. There are clearly set boundaries that deter threats, both exterior and insider, as well as privacy implications by design. As vulnerabilities are discovered and potentially exploited, there will be made an available opportunity to improve policies in order to provide greater protection. If this opportunity is not capitalized upon, the ethics of the situation must be called into question. Developers owe it to consumers to continuously update and improve their products.

Cyber infrastructure is intertwined with the responsibility of maintaining an updated cyber policy. Cyber infrastructure refers to the network that connects systems and files through the cyber medium. It is vital to maintain an up-to-date and safe infrastructure to ensure the vitality of economic, public health, safety, and welfare systems. If the infrastructure of a country is at risk, as is the well-being of the country. Without secure infrastructure, there will be a risk to citizens’ livelihoods. As issues with the infrastructure of society are discovered, it is critical to patch the holes and attempt to create a more secure future system.

Leave a Reply

Your email address will not be published. Required fields are marked *