From Verbeek’s writing (Mod 7, Reading 4) Designing the Public Sphere: Information Technologies and the Politics of Mediation

The new regulations and the markets, businesses, groups, and individuals creating and using them, should look at Verbeek’s  accompaniment perception. I believe that there should not be any banning from any markets, businesses, groups, nor individuals. By banning anything, we prevent the negative getting out, but also  withhold the positives. So regulation should center boosting up the…

Opportunities for Workplace Deviance

SAVION SMITH As we know, the internet has been one of the places where people harass, bully, or violate others. On the internet, it may be harder to catch because it is not in person.  Cyber technology has given opportunities for workplace deviance. It is so easy for an employee to harm the organization online…

Protecting Availability

 A Chief Information security officer (CISO) has many responsibilities that comes with working for an organization. They work alongside cybersecurity teams, business and IT managers, company officers, etc. Their job is to maintain and monitor the security of their organizations databases , systems, computers, websites, applications, and more. Availability is important because it ensures data…