7,844 research outputs found
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Moreover, can you really expect to deter state and non-state actors from employing such code and similarly hostile cyber methodologies if all they think that they are risking is being labeled as a cyber-vandal subject only to law enforcement measures? Or might they act differently if it were made clear to them that such activity is considered an armed attack \u27 against the United States and that they are in jeopardy of being on the receiving end of a forceful, law-of-war response by the most powerful military on the planet?
Of course, if something really is just vandalism, the law enforcement paradigm, with its very limited response options, would suffice. But when malevolent cyber activity endangers the reliability of the internet in a world heavily dependent on a secure cyberspace, it is not merely vandalism. Rather, it is a national and international security threat that ought to be characterized and treated as such. Unfortunately, the United States\u27 current approach is too inscrutable and even contradictory to send an effective deterrence message to potential cyber actors. This needs to change
Preparing millennials as digital citizens and socially and environmentally responsible business professionals in a socially irresponsible climate
As of 2015, a millennial born in the 1990's became the largest population in
the workplace and are still growing. Studies indicate that a millennial is tech
savvy but lag in the exercise of digital responsibility. In addition, they are
passive towards environmental sustainability and fail to grasp the importance
of social responsibility. This paper provides a review of such findings
relating to business communications educators in their classrooms. The
literature should enable the development of a millennial as an excellent global
citizen through business communications curricula that emphasizes digital
citizenship, environmental sustainability and social responsibility. The
impetus for this work is to provide guidance in the development of courses and
teaching strategies customized to the development of each millennial as a
digital, environmental and socially responsible global citizen
After the Gold Rush: The Boom of the Internet of Things, and the Busts of Data-Security and Privacy
This Article addresses the impact that the lack of oversight of the Internet of Things has on digital privacy. While the Internet of Things is but one vehicle for technological innovation, it has created a broad glimpse into domestic life, thus triggering several privacy issues that the law is attempting to keep pace with. What the Internet of Things can reveal is beyond the control of the individual, as it collects information about every practical aspect of an individual’s life, and provides essentially unfettered access into the mind of its users. This Article proposes that the federal government and the state governments bend toward consumer protection while creating a cogent and predictable body of law surrounding the Internet of Things. Through privacy-by-design or self-help, it is imperative that the Internet of Things—and any of its unforeseen progeny—develop with an eye toward safeguarding individual privacy while allowing technological development
Recommended from our members
Data standardization
With data rapidly becoming the lifeblood of the global economy, the ability to improve its use significantly affects both social and private welfare. Data standardization is key to facilitating and improving the use of data when data portability and interoperability are needed. Absent data standardization, a “Tower of Babel” of different databases may be created, limiting synergetic knowledge production. Based on interviews with data scientists, this Article identifies three main technological obstacles to data portability and interoperability: metadata uncertainties, data transfer obstacles, and missing data. It then explains how data standardization can remove at least some of these obstacles and lead to smoother data flows and better machine learning. The Article then identifies and analyzes additional effects of data standardization. As shown, data standardization has the potential to support a competitive and distributed data collection ecosystem and lead to easier policing in cases where rights are infringed or unjustified harms are created by data-fed algorithms. At the same time, increasing the scale and scope of data analysis can create negative externalities in the form of better profiling, increased harms to privacy, and cybersecurity harms. Standardization also has implications for investment and innovation, especially if lock-in to an inefficient standard occurs. The Article then explores whether market-led standardization initiatives can be relied upon to increase welfare, and the role governmental-facilitated data standardization should play, if at all
The future of Cybersecurity in Italy: Strategic focus area
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
Internet of Things (IoT): Cybersecurity Risks in Healthcare
The rapid growth and investment in the Internet of Things (IoT) has significantly impacted how individuals and industries operate. The Internet of Things (IoT) refers to a network of physical, technology-embedded objects that communicate, detect, and interact with their external environment or internal state (Hung, 2017). According to Tankovska (2020), IoT devices are estimated to reach 21.5 billion units by 2025. This technological boom is leading various industrial sectors to notice a quick increase in cybersecurity risks and threats. One industrial sector has been particularly vulnerable to numerous cyber threats across the globe: healthcare. Oliver Noble (2020), a data encryption specialist at NordLocker, suggests that cybercriminals target healthcare institutions because they store an overwhelming amount of patient information that is private, personal, and unchangeable. Healthcare organizations have a difficult time securing their cybersecurity infrastructure and the reasons for this will be further discussed in this paper
- …