{"id":300,"date":"2021-12-09T04:51:39","date_gmt":"2021-12-09T04:51:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tmcenery\/?p=300"},"modified":"2021-12-09T04:51:40","modified_gmt":"2021-12-09T04:51:40","slug":"journal-entry-13-the-power-and-dangers-of-computer-technology","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tmcenery\/2021\/12\/09\/journal-entry-13-the-power-and-dangers-of-computer-technology\/","title":{"rendered":"Journal Entry #13 \u2013 The Power and Dangers of Computer Technology"},"content":{"rendered":"\n<p>The technology\/information age has significantly changed and enhanced collaboration by virtually connecting everyone through a digital medium, thereby removing borders and boundaries that disconnect the physical world. It has also placed information, regardless of validity, at the fingertips of every connected user. Finally, according to Moore\u2019s Law, the advancement of computer technology continues to double the computing power every two years through a continually evolving integrated circuit chip. This ability to leverage this advanced computing power, collaborate with the world, and share information has launched the world into a new age accelerating modern advancement of technology. With increased power comes increased danger, as people exploit these same advantages for adverse reasons. As life has evolved through man\u2019s first use of tools, society and its underlying morals and ethics have adapted over time. The challenge in the current era is that the power and dangers of technology move at a lightning-fast speed, that limits society\u2019s capability adapt not only morally and ethically, but legally. This \u201cshort-arm\u201d of predictive knowledge makes it very difficult to establish cyber policy and -infrastructure that is not antiquated or insufficient on inception.<\/p>\n\n\n\n<p>In order to keep up with a continuously moving target, several considerations must be made with respect to timeliness, flexibility, agility, and politics when establishing cyber policy. With the rapid evolution of technology, \u201cbad actors\u201d continually find ways to exploit technology in new and innovative ways to facilitate fraud and other abuses. Policy that gets tied up in bureaucracy cannot protect people and information, and infrastructure from inherent dangers as it delays adoption and reduces its overall worth. Part of the challenge with rapid implementation of policy is through its inflexibility that does not allow for course corrections. Policy development must be agile enough to rapidly adjust if it is to keep up with rapid technological changes. Of great importance, cyber policy must be established independent of politics that serve to polarize decision and convolute policy and subsequent decision making. Politically polarizing arguments delay implementation of uniform policy that is continually at risk of becoming insignificant. <\/p>\n\n\n\n<p>Finally, risk identification and mitigation must be used to prioritize the establishment of cyber policy and -infrastructure. The costs associated with incorporating cyber strategy and subsequent policy are not only expensive but can have a short shelf life. Cyber risk cannot be eliminated; hence the cost curve to mitigate risk exponentially increases based on increased level of cybersecurity associated with risk mitigation. Ultimately, 100% secure is not obtainable, so a risk assessment that considers value is the only way to remain fiscally responsible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The technology\/information age has significantly changed and enhanced collaboration by virtually connecting everyone through a digital medium, thereby removing borders and boundaries that disconnect the physical world. It has also placed information, regardless of validity, at the fingertips of every connected user. Finally, according to Moore\u2019s Law, the advancement of computer technology continues to double&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tmcenery\/2021\/12\/09\/journal-entry-13-the-power-and-dangers-of-computer-technology\/\">Read More<\/a><\/div>\n","protected":false},"author":21695,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/posts\/300"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/users\/21695"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/posts\/300\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}