Hans Jonas’s concept of the “short arm” of predictive knowledge highlights a major limitation in our ability to foresee the long-term consequences of emerging technologies. When applying this to the development of cyber-policy and infrastructure, it becomes clear that traditional reactive models are no longer sufficient. Cyber threats evolve faster than our regulations, and by…
Category: CYSE 200T
Hacking Humans
The article “Hacking Humans: Protecting Our DNA From Cybercriminals” highlights the increasing risks associated with digitizing human DNA, particularly through direct-to-consumer DNA testing services. While these services have gained popularity due to curiosity about ancestry and medical advancements, security and ethical concerns are issues as well. One of the main concerns is the DNA is…
Cyber Roles & Responsibilities
The role I choose was the Information Security Officer because it plays a pivotal role in an organization’s framework in cybersecurity. The ISO ensures that security policies, risk management strategies, and compliance efforts align with industry standards and regulations. This role is crucial for maintaining the integrity, confidentiality, and availability of the organization’s information assets….
How has cyber technology created opportunities for workplace deviance?
Cyber technology has made it a lot easier for people to break the rules at work without getting caught, at least not yet. Workplace deviance is defined by violating company policies. Since everything is digital and online, it is hard to keep track of what everyone is doing. Employees can steal sensitive data or share…