In a world where technology is becoming more “intelligent” and threaded into almost everything we do, I think Verbeek is really asking us to look honestly at how power is shifting. If the state is losing some of its influence while technologies quietly shape our choices, behaviors, and even our understanding of public issues, then…
Author: tsmit175
The “Short Arm” of Predictive Knowledge
When we think about creating cyber-policy today, Jonas’s point about our limited ability to predict the future feels especially relevant. Digital systems grow and spread so quickly that even the people designing them often don’t fully understand how they’ll affect society years down the line. Jonas argues that this gap, our huge technological power but…
Opportunities for Workplace Deviance
Cyber technology has changed the way we work, but it’s also made it a lot easier for people to slip into questionable behavior without anyone noticing. When so much of our daily work happens online, it doesn’t take much for someone to misuse information or hide what they’re really doing behind a screen. I noticed…
Components of a Business
Hello!The components of a business are listed below. -Research and Development -Customer Service -Legal -Procurement -Project Management These roles set a clear vision and strategy that will move the organization in the direction planned.I like to consider IT the back bone of an organization and helps it run smooth. The IT department touches every single…
Cyber Roles & Responsibilities
One critical role outlined in NIST 800-12 is the System Administrator. This individual or sometimes an entire team that is responsible for setting up and maintaining systems or specific components of those systems. Their work often includes installing and updating software and hardware, managing user accounts, ensuring regular system backups, recovering data when needed, and…
Discussion Board: The NIST Cybersecurity Framework
Hello everyone! I think organizations can gain a lot from using the NIST Cybersecurity Framework because it gives them a clear, flexible way to understand and manage cybersecurity risks without having to start completely from scratch. One of the biggest benefits is that it helps align cybersecurity activities with business goals which makes it easier…