{"id":311,"date":"2025-04-02T18:55:12","date_gmt":"2025-04-02T18:55:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/?p=311"},"modified":"2025-04-02T19:14:39","modified_gmt":"2025-04-02T19:14:39","slug":"cyberattacks-cyber-threats-and-attitudes-towards-cybersecurity-policies","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/2025\/04\/02\/cyberattacks-cyber-threats-and-attitudes-towards-cybersecurity-policies\/","title":{"rendered":"Cyberattacks, Cyber Threats, and Attitudes Towards Cybersecurity Policies"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-small-font-size\">By Emiliano Sanchez<\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-small-font-size\">Article Review <\/h2>\n\n\n\n<p class=\"has-text-align-left is-style-plain has-small-font-size\">In this article the authors composed an experiment to detail how the influence of different<br>types of cyberattacks have on policies and the people&#8217;s attitudes towards those policies. The<br>authors seek to answer two main questions. Does increased exposure to cyberattacks call for a<br>society to address the problem with more intrusive cybersecurity policies? And how does the<br>way people perceive these cyberthreats affect the relationship between the exposure and the<br>policies? The authors utilized a controlled randomized survey experiment that provides the data<br>of how exposure to lethal and nonlethal cyberattacks develop specific cybersecurity policies.<br>The authors found, with about 1,022 Israeli participants being exposed to simulated televised<br>lethal and nonlethal cyberattacks, the exposure of the lethal cyberattacks led to the development<br>of more intrusive cybersecurity policies. The authors also discovered the factor that was leading<br>to the development of more strict policies was their threat perception, also the severity of<br>exposure altered the level of urgency in support for these cyber policies.<\/p>\n\n\n\n<p class=\"has-text-align-left has-small-font-size\">So the first question posed by the authors discusses the exposure of the different types of<br>cyber attacks. Whether lethal or nonlethal, and how the reaction of society plays a role in the<br>urgency for policy making to thwart these attacks. They argued that due to the perceived threat<br>of lethal cyberattacks, society is in full support for the government to take action. However, this<br>action is at the cost of rights to privacy online. I think what the authors failed to address is<br>whether the media should be allowed to cover incidents of lethal cyberattacks due to the results<br>of the public reaction. The authors suggest lethal cyberattacks may be considered cyberterrorism<br>or a politically motivated cyber attack, either or, the exposure results in a public outcry for the<br>government to act. As we have learned in our class modules most media outlets tend to take an<br>incident and over exaggerate the situation as a whole in order to fear monger society and push<br>them to fulfill a politically motivated or policy specific agenda. Especially in the growing age of<br>disinformation from media outlets. While the public does have a right to know when incidents<br>occur, I think the better solution would be privacy of incidents over the cost of the public&#8217;s<br>privacy online. Taking away privacy online puts the public under a scope and treats everyone as<br><br>a criminal. I also think another solution to be effective in online safety would be to educate the<br>public and build upon their human firewall. With the rapid growth of integrating technology in<br>everyday products the main targets of education should be families and youth who know very<br>little about the cyber world and the vulnerabilities that are presented from the result of internet of<br>things technology. While the authors emphasize that this experiment presents the threat of<br>targeting critical infrastructure that affects the public as a whole and causes urgency which it<br>should, I don\u2019t think broadcasting it would aid in finding a solution rather just making it worse.<br>This is because the authors findings also suggest the reaction to nonlethal cyberattacks had a<br>lesser degree of reaction to develop policies. The solution I think would be for the government<br>to be ahead in developing direct action plans in place for critical infrastructure attacks in<br>cyberspace. The media would only be allowed to cover incidents when they\u2019re dealt with<br>entirely and have them under control.<\/p>\n\n\n\n<p class=\"has-text-align-left has-small-font-size\">Indeed due to the evidence and findings from the authors, the public&#8217;s exposure to lethal<br>cyberattacks will result in stricter policies online for everyone. Making the privacy of citizens a<br>casualty in the battle of cyberspace. Also due to the public\u2019s immediate turn to government<br>solutions verifies the concern that the public chooses governmental regulation over<br>interventionists forms of cybersecurity policies. The authors also suggest that lethal cyberattacks<br>are nuanced and early in their age, while this may be the case, the media presenting this to the<br>public can only cause more damage to a society with disinformation and blowing up a situation<br>presenting more myths about cybersecurity. Accurate education of government and critical<br>infrastructure employees as well as updating hardware and software can minimize the threat of<br>cyberattacks upon said structures which will ensure the public maintains privacy rights online<br>and the government can properly protect its citizens from the growing online threats.<\/p>\n\n\n\n<p class=\"has-text-align-left has-small-font-size\">Reference: Snider, Keren L. G., et al. &#8220;Cyberattacks, Cyber Threats, and Attitudes toward<br>Cybersecurity Policies.&#8221; Journal of Cybersecurity, vol. 7, no. 1, 2021, pp. 1-11,<br><a href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyab019\">https:\/\/doi.org\/10.1093\/cybsec\/tyab019<\/a>. Accessed 1 Apr. 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Emiliano Sanchez Article Review In this article the authors composed an experiment to detail how the influence of differenttypes of cyberattacks have on policies and the people&#8217;s attitudes towards those policies. Theauthors seek to answer two main questions. Does increased exposure to cyberattacks call for asociety to address the problem with more intrusive cybersecurity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/2025\/04\/02\/cyberattacks-cyber-threats-and-attitudes-towards-cybersecurity-policies\/\">Read More<\/a><\/div>\n","protected":false},"author":29794,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts\/311"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/users\/29794"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts\/311\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/categories?post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/tags?post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}