Entry 7

How does cyber technology impact interactions between offenders and victims?

Technology has changed everyones ability to access information, it has changed where, when, who, and how much information we can gather. The internet makes information available that may otherwise be inaccessible. This alone has changed the relationship between the offenders of crimes and their victims. For instance, there are now websites that describe crimes and even the offenders of such crimes in local neighborhoods. Nowadays, it is common to use search engines, virtual maps, and online forums to find information about living in a certain area. Sometime these forums contain real-time information that can influence the decisions of potential victims and the offenders. Also some information on the Web changes in a matter of seconds – unlike printed text. Dynamic information can prevent or assist crimes by influencing the behavior of potential victims and criminals. For example potential victims, can avoid walking down particular streets based on crime alerts received from apps or websites. Potential offenders, on the other hand, can use dynamic information such as location updates on social networking sites such as Facebook, Instagram, or even Snapchat where peoples locations can be tracked in real time while they’re using the app. By using these platforms to determine someone’s location a criminal offender could figure out the best time to burglarize a home or worse to physically harm the victim. In both of these examples the potential victims and criminals can gain knowledge from real time updates of the abundant amount of data available online. To conclude, dynamic information about a vast number of topics on the internet provides potential victims and offenders with an abundance of information that is cognitively processed and thereby, potentially influences subsequent behavior.

https://core.ac.uk/download/pdf/236973915.pdf

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

When it comes to developing cyber-policy and infrastructure, it is important to acknowledge the limitations of predictive knowledge. This means that we cannot predict with certainty what new cyber threats will emerge in the future, and as there is no way to omnisciently know the future repercussions of the decision made, there is no way to evaluate the shortcomings of the decision. When we are approaching the discussions of developing cyber policy and cyber infrastructure, we have to take in the consideration the lack of the unknown.

In a cyber security policy you need outline what technology and information assets that need to be protected, what the threat to those assets could be, and what rules and controls need to be set up to protect them and your business. It is important to create a cyber security policy for your business – particularly if you have employees. By doing this it will help your employees to understand the role in protecting the technology and information assets of your business. When you go to prepare your policies, you need to ensure it will guide your employees on the type of business information that can be shared and where it can be shared, the types of acceptable devices and online materials that can be used, and how to handle and store sensitive material.

Cyber infrastructure is intertwined with the responsibility of maintaining updated cyber policy. Cyber infrastructure is the collection of information technology systems and software, physical and information assets, processes, and people that enables an organization to efficiently and securely function in cyberspace. With a well-established cyber infrastructure, individual researchers will have the power of the world’s highest-performance digital resources at their disposal. Along with teams of researchers that will attempt to answer questions that had previously been unapproachable because the requirements were too much, too hard, too long, or too complex to answer.

https://business.gov.au/online/cyber-security/create-a-cyber-security-policy

https://www.nsf.gov/news/special_reports/cyber/Cyberinfrastructure%20_NSF.pdf

Leave a Reply

Your email address will not be published. Required fields are marked *