2
Running head: PUBLIC SAFETY ADMINISTRATORS
2
PUBLIC SAFETY ADMINISTRATORS
Public Safety Administrators
Michael Petras
University of Maryland University College
Public safety administration entails the coordination of the resources that would be used in the safety and security of the community. Mainly, public safety administrators include the police officers, the emergency teams, fire departments, and even medical service providers. The main aim or role of the public safety administrators is to ensure that the general public is protected from various threats that may arise as they interact within the environment. However, recently, there have been some challenges that have been an issue in the provision of public safety administrations. The effect of social media use in the public has been a challenge to the public safety administration because of the technicality involved in the use of the same. Therefore, there is a need to understand social media use as a challenge to the public safety administration.
In the use of social media, it is expected that the lawmakers, litigators and even the community members shape the federal, state and local law and departmental policy regarding what information the public safety administrators access when trying to protect individuals from areas such as cybercrime and bullying (Beckett, 2018). The use of social media puts so many individuals at a lot of risks that need protection from public safety administrators. It is as a result of this need to protect the public that laws have been put into place laws on the type of data and transparency required to protect the public. Some of these laws have been a challenge to the security providers and therefore become an issue that needs to be addressed.
The issue of transparency and access to public data from the public using social media came into existence when there was a rise in modern technology. The arrival of the new technology that could enable people to interact online is the one that resulted to lawmakers coming up with policies that would require the public safety administrators become more transparent on the data they access and the extent of the data they access from the public (Namkoong et al., 2017). The policymakers argued that the public safety administrators in their line of duty were accessing private data, which is illegal. They then came up with laws prohibiting the same, and that made it a challenge to protect the public who are on social media platforms.
The history of the issue is dated from the digital age, whereby the users of social media platforms such as Facebook, Twitter, and even Instagram started sharing the geographic location and other data in public. However, watchdog or public safety administrators could use this data to come up with ways to protect the public and ensure public safety. However, some of the ways that the data was being used entailed some discriminatory surveillance and even tended to violate privac.
Running Head: SOCIAL MEDIA EFFECT 1
SOCIAL MEDIA EFFECT 14
Social Media Effect to Public Safety Administration
Michael Petras
University of Maryland University College
Introduction
Regulation of social media usage has led to lawmakers, community members, and even the litigators in shaping their policies. This is done based on federal, local, and state laws while also realigning the information that they are sharing online. This is concerning the public safety administration that is usually affected by the continued use of social media platforms. Public safety administration is also based on restricting access to personal information while trying to protect citizens from various issues such as bullying and cybercrime. Social media usage has continued to put more people at risk, and there is a need for the provision of public safety protection by the relevant administrators. This needs to be tied to the generation of federal laws that protect information and data from various individuals that have been posted on social media platforms while encouraging the much-needed transparency in the protection of the public. Continued social media usage by the general public has also brought about the issue of stolen identity due to the emergence of modern technology. The new technology arrival has been the leading cause of the interaction of many people on social media platforms (Beckett, 2018). Those tasked with policymaking have always argued that the administration of public safety should be in line with the duty to protect the privacy or access to information and data from various individuals. In that regard, this paper aims at analyzing the issue of social media usage as it affects the administration of public safety at all times.
Resources
Public safety administration often encompasses the release and coordination of various resources, which can be able to ensure the safety and security of the community as a whole (Gintova, 2018). Administration of public safety is inclusive of many departments such as the police, the emergency services, the medical services, and even the fire department. Public safety administration also happens to be affected by limited resources when it comes to preventing the processes involved from working efficiently. This can be linked to the limiting resources by the government while ensuring the safety and the security of the general public (Baym, 2015). The general public will always rely upon a variety of services that come from the relevant governments to enable the provision of safety and security to the public in their daily lives. However, limited resources will end up hampering the whole process as systems and policies seize to operate with the much-needed efficiency (Wohn & Bowe, 2016).
Public safety administration services hap.
State Management Mechanisms for the Exchange of Information Regarding Cyberat...Igor Britchenko
The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
Protecting personal information privacy has become a controversial issue among online social network
providers and users. Most social network providers have developed several techniques to decrease threats
and risks to the users’ privacy. These risks include the misuse of personal information which may lead to
illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their
personal information privacy, as well as the suitability of the privacy systems which they use to modify
privacy settings. Survey results show high percentage of the use of smart phones for web services but the
current privacy settings for online social networks need to be improved to support different type of mobile
phones screens. Because most users use their mobilephones for Internet services, privacy settings that are
compatible with mobile phones need to be developed. The method of selecting privacy settings should also
be simplified to provide users with a clear picture of the data that will be shared with others. Results of this
study can be used to develop a new privacy system which will help users control their personal information
easily from different devices, including mobile Internet devices and computers.
This document discusses cyber security and its role in ensuring safe internet use. It makes three key points:
1) Cyber security plays an important role in protecting internet users by securing both hardware and software infrastructure, as well as the information transmitted. This helps guarantee a safe online environment.
2) Regulations and strategies at national and international levels aim to create a comfortable environment for internet users while addressing negative aspects like cybercrime. Laws govern internet usage while respecting freedom of access to information.
3) There is sometimes a tension between individuals' right to access information and freedom of expression online, and the need for cyber security to protect others and national security. Restrictions on these rights only apply as outlined in international law
Running head: CYBER SECURITY
1
CYBER SECURITY/EMERGENCY MANAGEMENT POLICY
2
The term "Running head" is formatted as Running head:
Cyber Security/Emergency Management Policy
American Public University (EDMG 600)
Dr. Darrell Dantzler
05/09/2018
Cyber Security/Emergency Management Policy
Begin the paper with an introduction of your topic. An introduction has an attention getter, purpose or thesis statement, and an overview. An attention getter can begin with any of the 6 ways: (1) Anecdote, (2) Question, (3) Quotation, (4) Humor, (5) Shocking Statistic, or a (6) combination of them (http://classroom.synonym.com/5-types-attention-getters-essays-2877.html). After you introduce the topic, state the purpose of the paper. The purpose can be as simple as restating the objective of the assignment. The purpose of this paper is to (state purpose). (Overview) The paper will address the following: (List topics)
Part 1
After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cyber security/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cyber security issues at the state level.
Cyber Security
Cybercrimes are increasingly becoming more common in all sectors in the world. This has made cyber
security a top agenda for everyone in the world. This has resulted in the conventions and creation of agencies and structures that will facilitate cyber security (Deloitte-NASCIO. 2013, p 16).According to the author, a number of cyber laws have been formulated and more are being formulated to handle this challenge. For this matter, protecting our companies from various incidences of cyber-crimes, we will need to formulate clear and organised policies that will pit every structure in place to check the menace (Deloitte-NASCIO. 2013, p 34).Since internet is a gala for vast information in which everyone and business navigate through, with different intentions, protecting personal and company sensitive information is increasingly becoming a challenge (Moore et al., 2010, p 56). Cyber security policy will try to track the paths of the internet users in order to control their navigation and keep it on the recommended or acceptable tracks. Allowing internet users to deviate from the pre-determined and acceptable paths, as are stipulated in the policy, will lead to discrepancy in the use of information on the internet thus risking accessibility and sharing of sensitive information without permission (illegal). When personalised or sensitive information reached the public pages of the internet, it becomes irretrievable and loses secrecy. This is the major concern of most governments. Hackers have been able to exploit the Operating System (OS) of people’s computers, accessing and leaving the gathered information in the public dom ...
This document discusses cybersecurity risks facing institutions and proposes countermeasures. It begins by explaining how the expansion of cyber space has increased cyber risks and how most countries have developed national cybersecurity strategies in response. However, it notes that institutions also need their own robust cybersecurity strategies to protect against modern cyber threats targeting both infrastructure and personnel.
The document then presents a case study analyzing how open source intelligence (OSINT) techniques using social media and other online sources can expose sensitive personal and institutional data. It demonstrates how cyber criminals could potentially gather usernames, email addresses, location data and other metadata about employees and systems.
Finally, it recommends several countermeasures institutions should take. These include educating employees about metadata risks, implementing
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxjeanettehully
Running head: FEASIBILITY REPORT 1
FEASIBILITY REPORT 6
Feasibility Report
Student’s Name
Institution
Date
MEMO
TO: Manager
FROM:
DATE:
SUBJECT:
This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore, this memo is very vital for an individual to read and understand various aspects.
Feasibility Report
It takes much time in planning and preparing to implement a solution to the major problem in society. During the planning and preparation process, the proposed solution should be tested and determined if it is feasible to provide the solution or not. Cybercrime in united states has been a significant problem and need to be addressed and solution provided to reduce the cybercrime.
One of the proposed solutions to this major problem is providing cybersecurity among very individual. This will enable most of the people to understand and know the importance of cybersecurity and thus leading to the reduction of the negative loses that is caused by the cybercrime in society every year. Another thing that will ensure that the individuals in the nation are protected from the impact of the cybercrime is educating them on ways they can protect themselves over the cybercrime attempts.
This report will majorly focus on looking at the proposed solution provided and determine if the answers are feasible or need some changes. The essential aspects that the story will focus on include the social impact, the economic effect, and other elements which will be determined if it can provide a solution to the problem.
The Social Impact
When looking for a potential solution to be implemented to solve a specific major problem in society, a positive impact is always the main objective. When the proposed solution is applied, such as implementing cybersecurity in the daily lives of the individuals in the society it will bring a lot of positive impacts on them. For instance, when the cybersecurity is made the main focus in the in every place, i.e. schools and workplace, majority of the individuals will be aware of these threats and ways of preventing them from affecting their daily lives. This will also reduce the loss that most of the individuals incur due to the cybercrime and lack of security in their day-to-day business operations (Help Net Security, 2015).
When the cybersecurity is introduced in society It will bring much social impact to the life of the individuals since it will educate people about the dynamic changes that occur in uses of the technology. When this provides a solution to the cybercrime problem in the society, it will be adopted by every nation, and thus the cybercrime problem is reduced and making every ...
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxwlynn1
Running head: FEASIBILITY REPORT 1
FEASIBILITY REPORT 6
Feasibility Report
Student’s Name
Institution
Date
MEMO
TO: Manager
FROM:
DATE:
SUBJECT:
This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore, this memo is very vital for an individual to read and understand various aspects.
Feasibility Report
It takes much time in planning and preparing to implement a solution to the major problem in society. During the planning and preparation process, the proposed solution should be tested and determined if it is feasible to provide the solution or not. Cybercrime in united states has been a significant problem and need to be addressed and solution provided to reduce the cybercrime.
One of the proposed solutions to this major problem is providing cybersecurity among very individual. This will enable most of the people to understand and know the importance of cybersecurity and thus leading to the reduction of the negative loses that is caused by the cybercrime in society every year. Another thing that will ensure that the individuals in the nation are protected from the impact of the cybercrime is educating them on ways they can protect themselves over the cybercrime attempts.
This report will majorly focus on looking at the proposed solution provided and determine if the answers are feasible or need some changes. The essential aspects that the story will focus on include the social impact, the economic effect, and other elements which will be determined if it can provide a solution to the problem.
The Social Impact
When looking for a potential solution to be implemented to solve a specific major problem in society, a positive impact is always the main objective. When the proposed solution is applied, such as implementing cybersecurity in the daily lives of the individuals in the society it will bring a lot of positive impacts on them. For instance, when the cybersecurity is made the main focus in the in every place, i.e. schools and workplace, majority of the individuals will be aware of these threats and ways of preventing them from affecting their daily lives. This will also reduce the loss that most of the individuals incur due to the cybercrime and lack of security in their day-to-day business operations (Help Net Security, 2015).
When the cybersecurity is introduced in society It will bring much social impact to the life of the individuals since it will educate people about the dynamic changes that occur in uses of the technology. When this provides a solution to the cybercrime problem in the society, it will be adopted by every nation, and thus the cybercrime problem is reduced and making every .
Running Head: SOCIAL MEDIA EFFECT 1
SOCIAL MEDIA EFFECT 14
Social Media Effect to Public Safety Administration
Michael Petras
University of Maryland University College
Introduction
Regulation of social media usage has led to lawmakers, community members, and even the litigators in shaping their policies. This is done based on federal, local, and state laws while also realigning the information that they are sharing online. This is concerning the public safety administration that is usually affected by the continued use of social media platforms. Public safety administration is also based on restricting access to personal information while trying to protect citizens from various issues such as bullying and cybercrime. Social media usage has continued to put more people at risk, and there is a need for the provision of public safety protection by the relevant administrators. This needs to be tied to the generation of federal laws that protect information and data from various individuals that have been posted on social media platforms while encouraging the much-needed transparency in the protection of the public. Continued social media usage by the general public has also brought about the issue of stolen identity due to the emergence of modern technology. The new technology arrival has been the leading cause of the interaction of many people on social media platforms (Beckett, 2018). Those tasked with policymaking have always argued that the administration of public safety should be in line with the duty to protect the privacy or access to information and data from various individuals. In that regard, this paper aims at analyzing the issue of social media usage as it affects the administration of public safety at all times.
Resources
Public safety administration often encompasses the release and coordination of various resources, which can be able to ensure the safety and security of the community as a whole (Gintova, 2018). Administration of public safety is inclusive of many departments such as the police, the emergency services, the medical services, and even the fire department. Public safety administration also happens to be affected by limited resources when it comes to preventing the processes involved from working efficiently. This can be linked to the limiting resources by the government while ensuring the safety and the security of the general public (Baym, 2015). The general public will always rely upon a variety of services that come from the relevant governments to enable the provision of safety and security to the public in their daily lives. However, limited resources will end up hampering the whole process as systems and policies seize to operate with the much-needed efficiency (Wohn & Bowe, 2016).
Public safety administration services hap.
State Management Mechanisms for the Exchange of Information Regarding Cyberat...Igor Britchenko
The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
Protecting personal information privacy has become a controversial issue among online social network
providers and users. Most social network providers have developed several techniques to decrease threats
and risks to the users’ privacy. These risks include the misuse of personal information which may lead to
illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their
personal information privacy, as well as the suitability of the privacy systems which they use to modify
privacy settings. Survey results show high percentage of the use of smart phones for web services but the
current privacy settings for online social networks need to be improved to support different type of mobile
phones screens. Because most users use their mobilephones for Internet services, privacy settings that are
compatible with mobile phones need to be developed. The method of selecting privacy settings should also
be simplified to provide users with a clear picture of the data that will be shared with others. Results of this
study can be used to develop a new privacy system which will help users control their personal information
easily from different devices, including mobile Internet devices and computers.
This document discusses cyber security and its role in ensuring safe internet use. It makes three key points:
1) Cyber security plays an important role in protecting internet users by securing both hardware and software infrastructure, as well as the information transmitted. This helps guarantee a safe online environment.
2) Regulations and strategies at national and international levels aim to create a comfortable environment for internet users while addressing negative aspects like cybercrime. Laws govern internet usage while respecting freedom of access to information.
3) There is sometimes a tension between individuals' right to access information and freedom of expression online, and the need for cyber security to protect others and national security. Restrictions on these rights only apply as outlined in international law
Running head: CYBER SECURITY
1
CYBER SECURITY/EMERGENCY MANAGEMENT POLICY
2
The term "Running head" is formatted as Running head:
Cyber Security/Emergency Management Policy
American Public University (EDMG 600)
Dr. Darrell Dantzler
05/09/2018
Cyber Security/Emergency Management Policy
Begin the paper with an introduction of your topic. An introduction has an attention getter, purpose or thesis statement, and an overview. An attention getter can begin with any of the 6 ways: (1) Anecdote, (2) Question, (3) Quotation, (4) Humor, (5) Shocking Statistic, or a (6) combination of them (http://classroom.synonym.com/5-types-attention-getters-essays-2877.html). After you introduce the topic, state the purpose of the paper. The purpose can be as simple as restating the objective of the assignment. The purpose of this paper is to (state purpose). (Overview) The paper will address the following: (List topics)
Part 1
After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cyber security/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cyber security issues at the state level.
Cyber Security
Cybercrimes are increasingly becoming more common in all sectors in the world. This has made cyber
security a top agenda for everyone in the world. This has resulted in the conventions and creation of agencies and structures that will facilitate cyber security (Deloitte-NASCIO. 2013, p 16).According to the author, a number of cyber laws have been formulated and more are being formulated to handle this challenge. For this matter, protecting our companies from various incidences of cyber-crimes, we will need to formulate clear and organised policies that will pit every structure in place to check the menace (Deloitte-NASCIO. 2013, p 34).Since internet is a gala for vast information in which everyone and business navigate through, with different intentions, protecting personal and company sensitive information is increasingly becoming a challenge (Moore et al., 2010, p 56). Cyber security policy will try to track the paths of the internet users in order to control their navigation and keep it on the recommended or acceptable tracks. Allowing internet users to deviate from the pre-determined and acceptable paths, as are stipulated in the policy, will lead to discrepancy in the use of information on the internet thus risking accessibility and sharing of sensitive information without permission (illegal). When personalised or sensitive information reached the public pages of the internet, it becomes irretrievable and loses secrecy. This is the major concern of most governments. Hackers have been able to exploit the Operating System (OS) of people’s computers, accessing and leaving the gathered information in the public dom ...
This document discusses cybersecurity risks facing institutions and proposes countermeasures. It begins by explaining how the expansion of cyber space has increased cyber risks and how most countries have developed national cybersecurity strategies in response. However, it notes that institutions also need their own robust cybersecurity strategies to protect against modern cyber threats targeting both infrastructure and personnel.
The document then presents a case study analyzing how open source intelligence (OSINT) techniques using social media and other online sources can expose sensitive personal and institutional data. It demonstrates how cyber criminals could potentially gather usernames, email addresses, location data and other metadata about employees and systems.
Finally, it recommends several countermeasures institutions should take. These include educating employees about metadata risks, implementing
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxjeanettehully
Running head: FEASIBILITY REPORT 1
FEASIBILITY REPORT 6
Feasibility Report
Student’s Name
Institution
Date
MEMO
TO: Manager
FROM:
DATE:
SUBJECT:
This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore, this memo is very vital for an individual to read and understand various aspects.
Feasibility Report
It takes much time in planning and preparing to implement a solution to the major problem in society. During the planning and preparation process, the proposed solution should be tested and determined if it is feasible to provide the solution or not. Cybercrime in united states has been a significant problem and need to be addressed and solution provided to reduce the cybercrime.
One of the proposed solutions to this major problem is providing cybersecurity among very individual. This will enable most of the people to understand and know the importance of cybersecurity and thus leading to the reduction of the negative loses that is caused by the cybercrime in society every year. Another thing that will ensure that the individuals in the nation are protected from the impact of the cybercrime is educating them on ways they can protect themselves over the cybercrime attempts.
This report will majorly focus on looking at the proposed solution provided and determine if the answers are feasible or need some changes. The essential aspects that the story will focus on include the social impact, the economic effect, and other elements which will be determined if it can provide a solution to the problem.
The Social Impact
When looking for a potential solution to be implemented to solve a specific major problem in society, a positive impact is always the main objective. When the proposed solution is applied, such as implementing cybersecurity in the daily lives of the individuals in the society it will bring a lot of positive impacts on them. For instance, when the cybersecurity is made the main focus in the in every place, i.e. schools and workplace, majority of the individuals will be aware of these threats and ways of preventing them from affecting their daily lives. This will also reduce the loss that most of the individuals incur due to the cybercrime and lack of security in their day-to-day business operations (Help Net Security, 2015).
When the cybersecurity is introduced in society It will bring much social impact to the life of the individuals since it will educate people about the dynamic changes that occur in uses of the technology. When this provides a solution to the cybercrime problem in the society, it will be adopted by every nation, and thus the cybercrime problem is reduced and making every ...
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxwlynn1
Running head: FEASIBILITY REPORT 1
FEASIBILITY REPORT 6
Feasibility Report
Student’s Name
Institution
Date
MEMO
TO: Manager
FROM:
DATE:
SUBJECT:
This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore, this memo is very vital for an individual to read and understand various aspects.
Feasibility Report
It takes much time in planning and preparing to implement a solution to the major problem in society. During the planning and preparation process, the proposed solution should be tested and determined if it is feasible to provide the solution or not. Cybercrime in united states has been a significant problem and need to be addressed and solution provided to reduce the cybercrime.
One of the proposed solutions to this major problem is providing cybersecurity among very individual. This will enable most of the people to understand and know the importance of cybersecurity and thus leading to the reduction of the negative loses that is caused by the cybercrime in society every year. Another thing that will ensure that the individuals in the nation are protected from the impact of the cybercrime is educating them on ways they can protect themselves over the cybercrime attempts.
This report will majorly focus on looking at the proposed solution provided and determine if the answers are feasible or need some changes. The essential aspects that the story will focus on include the social impact, the economic effect, and other elements which will be determined if it can provide a solution to the problem.
The Social Impact
When looking for a potential solution to be implemented to solve a specific major problem in society, a positive impact is always the main objective. When the proposed solution is applied, such as implementing cybersecurity in the daily lives of the individuals in the society it will bring a lot of positive impacts on them. For instance, when the cybersecurity is made the main focus in the in every place, i.e. schools and workplace, majority of the individuals will be aware of these threats and ways of preventing them from affecting their daily lives. This will also reduce the loss that most of the individuals incur due to the cybercrime and lack of security in their day-to-day business operations (Help Net Security, 2015).
When the cybersecurity is introduced in society It will bring much social impact to the life of the individuals since it will educate people about the dynamic changes that occur in uses of the technology. When this provides a solution to the cybercrime problem in the society, it will be adopted by every nation, and thus the cybercrime problem is reduced and making every .
The document summarizes discussions from Day 3 of the 2013 Internet Governance Forum that took place in Bali, Indonesia. Key topics of discussion included balancing internet freedom and security, protecting journalists and bloggers from online threats, legal frameworks around spam and cybercrime, online anonymity and freedom of expression, and how to achieve a better and safer internet through youth collaboration. Participants shared perspectives on issues like government censorship, privacy concerns, and ensuring all voices are represented in shaping the future of internet governance. The result of these discussions will help inform the 8th Internet Governance Forum to be held in Bali.
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...IJCI JOURNAL
- The document describes the development of an expert system tool aimed at preventing social engineering attacks in public organizations.
- The tool will have three main modules: a user module providing interactive training, an IT manager module to track incidents and update content, and a risk manager module using AI like machine learning to analyze user interactions and identify vulnerabilities.
- Once developed, the tool is expected to significantly contribute to awareness and protection against social engineering attacks in public organizations by providing personalized training and detecting vulnerabilities.
Social media platforms allow for widespread sharing of information but also enable the spread of criminal and unethical ideas. This document proposes a social media analysis tool to detect crime and suspicious profiles on platforms like Twitter. The tool would extract tweet data using APIs, analyze features to identify concerning behaviors, perform topic modeling to detect tweets related to crime, and suggest profiles for suspension. The goal is to prevent the spread of criminal content and activities online through monitoring social media data and flagging problematic accounts.
This document proposes guidelines for developing a national cybersecurity strategy. It discusses the importance of cybersecurity given increasing internet usage and mobile broadband adoption. Nations need strategic cybersecurity frameworks to protect digital economies, national security, and citizens from growing cyber threats. The paper reviews existing strategies and highlights challenges. It conducted expert interviews across technical, economic, legal and policy areas to inform proposed guidelines. The goal is to educate on cybersecurity and provide a collaborative framework to mitigate risks in the digital era.
The document discusses the debate between individual privacy rights and government surveillance efforts aimed at national security. It notes that while increased surveillance can help protect citizens from security threats like terrorism, it may infringe on citizens' privacy rights. The debate centers around finding a balance between these competing interests. The document also mentions how technology has led to more personal information being stored digitally, making it accessible to authorities, and how this issue deeply affects many people given modern technology usage.
This document discusses internet governance from both a global and Bangladeshi perspective. It begins by defining internet governance and outlining some of the key actors and issues involved, such as privacy, media freedom, and internet sovereignty. It then provides examples of internet governance challenges in different parts of the world, such as bans on social media platforms in Russia and data localization laws in the EU. Finally, it analyzes Bangladesh's approach to internet governance, noting accusations that the government manipulates internet access and passes laws like the Digital Security Act that are criticized for restricting free speech and press freedom.
The document discusses the dilemma governments face regarding social media intelligence (SOCMINT). On one hand, SOCMINT could provide valuable intelligence to keep the public safe, but it challenges conceptions of privacy and may not fit within existing legal frameworks. A balance must be struck between security, privacy, and maintaining public support for intelligence activities.
Two tales of privacy in online social networksHarshitha Reddy
This document discusses two different perspectives on privacy in online social networks (OSNs) - the surveillance perspective and the social privacy perspective.
The surveillance perspective frames privacy as a right to protect citizens from an overbearing surveilling state. Researchers working from this perspective develop privacy-enhancing technologies (PETs) to counter surveillance by governments and OSN providers.
The social privacy perspective views privacy issues in OSNs as problems that emerge from the renegotiation of social boundaries as interactions move online. Researchers in this area focus on designing tools and principles to help users better manage their privacy through improved transparency, feedback and privacy settings.
The document argues that while useful, these two perspectives treat the different privacy problems as independent
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Collusion-resistant multiparty data sharing in social networksIJECEIAES
The number of users on online social networks (OSNs) has grown tremendously over the past few years, with sites like Facebook amassing over a billion users. With the popularity of OSNs, the increase in privacy risk from the large volume of sensitive and private data is inevitable. While there are many features for access control for an individual user, most OSNs still need concrete mechanisms to preserve the privacy of data shared between multiple users. The proposed method uses metrics such as identity leakage (IL) and strength of interaction (SoI) to fine-tune the scenarios that use privacy risk and sharing loss to identify and resolve conflicts. In addition to conflict resolution, bot detection is also done to mitigate collusion attacks. The final decision to share the data item is then ascertained based on whether it passes the threshold condition for the above metrics.
This document discusses the growing influence and potential threats of social media. It argues that while social media has enabled greater communication and mobilization, it can also be used to infringe privacy and destabilize governments if left unregulated. The document outlines how social media was used in events like the Arab Spring and recent protests. It suggests measures like monitoring, censorship, and identifying online influencers that countries could take to regulate social media and prevent its misuse. The document also discusses how social media has enabled new forms of currency like Bitcoin and their association with illegal activities like money laundering and terrorism financing on the dark web. It argues that if social media and new currencies are not properly governed, they could come to dominate the global order
This document discusses how governments can use social media and information and communications technology to provide public information. It defines social media and common platforms used, such as Facebook, Twitter, YouTube, Issuu and LinkedIn. It also defines ICT as technologies that allow communication through devices and networks. The document concludes that following open data guidelines ensures transparency and that social media and ICT help engage citizens and provide real-time access to government information on various devices.
This document discusses how governments can use social media and information and communications technology to provide public information. It defines social media and common platforms used, such as Facebook, Twitter, YouTube, Issuu and LinkedIn. It also defines ICT as technologies that allow communication through devices and networks. The document concludes that following open data guidelines ensures transparency and that social media and ICT help engage citizens and provide real-time access to government information on various devices.
Cybersecurity Business Risk, Literature ReviewEnow Eyong
Cybersecurity poses a significant business risk to social media corporations. These companies generate revenue through targeted advertising based on analyzing user information and engagement. However, cybersecurity threats could diminish the customer experience and engagement, reducing companies' ability to generate revenue. Social media sites must implement best practices from fields like the military to strengthen cyber defense, including developing reliable information systems, collecting intelligence on cyber criminals, and understanding potential cyber attack threats. Failure to address cybersecurity risks could jeopardize the success and sustainability of social media businesses.
Addressing Policy Challenges of Disruptive TechnologiesAraz Taeihagh
This special issue examines the policy challenges and government responses to disruptive technologies. It explores the risks, benefits, and trade-offs of deploying disruptive technologies, and examines the efficacy of traditional governance approaches and the need for new regulatory and governance frameworks. Key themes include the need for government stewardship, taking adaptive and proactive approaches, developing comprehensive policies accounting for technical, social, economic, and political dimensions, conducting interdisciplinary research, and addressing data management and privacy challenges. The findings enhance understanding of how governments can navigate the complexities of disruptive technologies and develop policies to maximize benefits and mitigate risks.
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Corey Olszewski
Law enforcement agencies can benefit from using social media in three ways: 1) Enhancing emergency response by locating survivors, threats, and witnesses via social media posts; 2) Improving communication with the public during crises to issue alerts and combat rumors; and 3) Strengthening community relations through regular online engagement. To maximize these benefits, agencies should appoint social media officers, establish usage guidelines, and promote their social media presence before a disaster occurs. During incidents, posts can provide real-time situational updates. Afterward, social media facilitates investigations and reassures the public. However, policies must ensure urgent requests are directed to 911 rather than social platforms.
1Running head CYBERWARCYBER WAR9Outstanding title.docxfelicidaddinwoodie
1
Running head: CYBERWAR
CYBER WAR
9
Outstanding title page formatting
Cyber War
Name
University
Professor
04/28/2018
Introduction Cyber War
Cyber warfare refers to a computer or network-based conflict that disrupts the activities of a state or
organization by deliberate attacking critical infrastructures. Cyber attacks can also be described as an attack by hostile groups such as terrorist or hacker groups aimed, at furthering the goals of a given nation. To have a better understanding, cyber warfare can take different forms such as; viruses that can take down water supplies, military systems, transportation systems, hacking and theft of critical data from government and private institutions. This paper will focus on assessing various mechanism applied in different articles to counter cybersecurity and protect critical infrastructure. Further, by analyzing the results and experience in Xia, Becerra-Fernandez, Gudi, & Rocha-Mier (2011), the essay will also show how
the findings can be utilized in real life scenario.
1. What do the articles have in common?
According to Clemente (2011), the advancement of interconnection between different infrastructures sectors has boosted by the escalation of cyberspace. The author points out that the security
implications are inevitable especially in this era of cyberspace and infrastructure. The main idea in the article involves around the definition of ‘critical’ infrastructure to enable effective prioritization and protection of nodes and connection points. FEMA (2013
), points out that the United States well being relies upon secure critical infrastructure that forms American society. According to Saadawi, & Jordan
, (2011), there is need to establish an international cyber union that will help overcome cybersecurity challenges in securing cyberinfrastructure. This article considers the practical considerations that are associated with EINSTEIN 3 and how this can be used to ensure effective protection of critical infrastructure networks. Having evaluated the main argument of these articles, they all share the aspect of understanding cybersecurity and different ways ensuring infrastructure protection.
2. What are the differences in their assessment of cybersecurity and critical infrastructure protection?
The above articles portray some distinction in their evaluation of cyber war and protection of vital infrastructure. The first article by Clemente (2011), tries to examine how cybersecurity challenges can be overcome by understanding various components in society. The article offers more theoretical approaches to counterattack cybersecurity and protection of critical infrastructures. The second article by FEMA (2013
) is more detailed and comprehensive on the issue of cybersecurity and protection of critical infrastructures in the society. For instance, it offers a plan that will require a federal agency (SSA) to lead a coordinated process for vital infrastructure security within criti ...
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
ARTICLE IN PRESS
Contents lists available at ScienceDirect
Telecommunications Policy
Telecommunications Policy 33 (2009) 706–719
0308-59
doi:10.1
� Cor
E-m
URL: www.elsevierbusinessandmanagement.com/locate/telpol
Cybersecurity: Stakeholder incentives, externalities,
and policy options
Johannes M. Bauer a,�, Michel J.G. van Eeten b
a Department of Telecommunication, Information Studies, and Media; Quello Center for Telecommunication Management and Law,
Michigan State University, East Lansing, Michigan, USA
b Faculty of Technology, Policy and Management, Delft University of Technology, Delft, The Netherlands
a r t i c l e i n f o
Keywords:
Cybersecurity
Cybercrime
Security incentives
Externalities
Information security policy
Regulation.
61/$ - see front matter & 2009 Elsevier Ltd. A
016/j.telpol.2009.09.001
responding author. Tel.: þ1 517 432 8003; fax:
ail addresses: [email protected] (J.M. Bauer), m
a b s t r a c t
Information security breaches are increasingly motivated by fraudulent and criminal
motives. Reducing their considerable costs has become a pressing issue. Although
cybersecurity has strong public good characteristics, most information security
decisions are made by individual stakeholders. Due to the interconnectedness of
cyberspace, these decentralized decisions are afflicted with externalities that can
result in sub-optimal security levels. Devising effective solutions to this problem is
complicated by the global nature of cyberspace, the interdependence of stakeholders, as
well as the diversity and heterogeneity of players. The paper develops a framework for
studying the co-evolution of the markets for cybercrime and cybersecurity. It examines
the incentives of stakeholders to provide for security and their implications for the ICT
ecosystem. The findings show that market and non-market relations in the information
infrastructure generate many security-enhancing incentives. However, pervasive
externalities remain that can only be corrected by voluntary or government-led
collective measures.
& 2009 Elsevier Ltd. All rights reserved.
1. Introduction
Malicious software (‘‘malware’’) has become a serious security threat for users of the Internet. Estimates of the total cost
to society of information security breaches vary but data published by private security firms, non-profit organizations, and
government, all indicate that their cost is non-negligible and increasing. From a societal point of view, not only the direct
cost (e.g., repair cost, losses due to fraud) but also indirect costs (e.g., costs of preventative measures) and implicit costs
(e.g., slower productivity increases due to reduced trust in electronic transactions) have to be attributed to information
security breaches. Bauer, Van Eeten, Chattopadhyay, and Wu (2008) in a meta-study of a broad range of research conclude
that a conservative estimate of these costs may fall between 0.2% and 0.4% of global GDP. A catastrophic security fail ...
This document discusses a blockchain-based framework for event detection and trust verification using natural language processing and machine learning on social media data. Key points:
- The framework aims to improve emergency response to disasters by analyzing social media posts to extract real-time information about events, while also verifying the trustworthiness of detected events and eliminating single authorities.
- Machine learning, deep learning, and natural language processing techniques are used on social media datasets to detect emergency events and filter information to support relief efforts.
- The blockchain framework is incorporated to improve security, transparency, and avoid sharing of wrong information by verifying the trust of detected events without a single point of authority.
- The overall goal is developing
6/5/2020 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=2ab444ee-13c8-49eb-86f5-578168754de8&course_id=_47058_1&includeDeleted=true&print=true 1/12
%21
%20
%1
SafeAssign Originality Report
Cloud Computing - 202040 - CRN174 - Pollak • Final Project
%26Total Score: Medium risk
Santhosh Muthyapu
Submission UUID: 43a98d6d-211b-6de9-9bf1-1de6250058fd
Total Number of Reports
3
Highest Match
43 %
Bibliography.docx
Average Match
26 %
Submitted on
06/05/20
11:46 AM EDT
Average Word Count
816
Highest: CLOUDMISCONFIGURATION.pptx
%43Attachment 1
Global database (3)
Student paper Student paper Student paper
Institutional database (1)
Student paper
Internet (1)
fiids
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 193
Bibliography.docx
1 5 3
2
4
2 Student paper 1 Student paper 5 Student paper
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport?attemptId=2ab444ee-13c8-49eb-86f5-578168754de8&course_id=_47058_1&includeDeleted=true&print=true&force=true
6/5/2020 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=2ab444ee-13c8-49eb-86f5-578168754de8&course_id=_47058_1&includeDeleted=true&print=true 2/12
Source Matches (6)
Student paper 83%
Student paper 92%
Student paper 94%
Student paper 81%
Bibliography: Baset, S., Suneja, S., Bila, N., Tuncer, O., & Isci, C. (2017). Usable declarative configuration specification and validation for applications, systems, and cloud.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference on Industrial Track - Middleware ’17. https://doi.org/10.1145/3154448.3154453
Berger, S., Garion, S., Moatti, Y., Naor, D., Pendarakis, D., Shulman-Peleg, A., Rao, J. R., Valdez, E., & Weinsberg, Y. (2016). Security intelligence for cloud management
infrastructures. IBM Journal of Research and Development, 60(4), 11:1–11:13. https://doi.org/10.1147/JRD.2016.2572462
Duncan, R. (2020). A multi-cloud world requires a multi-cloud security approach. Computer Fraud & Security, 2020(5), 11–12. https://doi.org/10.1016/S1361-3723(20)30052-X
January 15, S. P. on, & 2020. (2020, January 15). Cloud Misconfigurations: The Security Problem Coming From Inside IT. Security Boulevard.
https://securityboulevard.com/2020/01/cloud-misconfigurations-the-security-problem-coming-from-inside-it/ Torkura, K. A., Sukmana, M. I. H., Strauss, T., Graupner, H., Cheng, F.,
& Meinel, C. (2018, November 1). CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems. IEEE Xplore. https://doi.org/10.1109/NCA.2018.8548329
1
2 2
3
4 5
1
Student paper
Proceedings of the 18th ACM/IFIP/USENIX Middleware
Conference on Industrial Track - Middleware ’17.
https://doi.org/10.1145/3154448.3154453
Original source
Proceedings of the 18th ACM/IFIP/USENIX Middleware
Conference on Industrial Track - Middleware '17
doi:10.1145/3.
The document summarizes discussions from Day 3 of the 2013 Internet Governance Forum that took place in Bali, Indonesia. Key topics of discussion included balancing internet freedom and security, protecting journalists and bloggers from online threats, legal frameworks around spam and cybercrime, online anonymity and freedom of expression, and how to achieve a better and safer internet through youth collaboration. Participants shared perspectives on issues like government censorship, privacy concerns, and ensuring all voices are represented in shaping the future of internet governance. The result of these discussions will help inform the 8th Internet Governance Forum to be held in Bali.
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...IJCI JOURNAL
- The document describes the development of an expert system tool aimed at preventing social engineering attacks in public organizations.
- The tool will have three main modules: a user module providing interactive training, an IT manager module to track incidents and update content, and a risk manager module using AI like machine learning to analyze user interactions and identify vulnerabilities.
- Once developed, the tool is expected to significantly contribute to awareness and protection against social engineering attacks in public organizations by providing personalized training and detecting vulnerabilities.
Social media platforms allow for widespread sharing of information but also enable the spread of criminal and unethical ideas. This document proposes a social media analysis tool to detect crime and suspicious profiles on platforms like Twitter. The tool would extract tweet data using APIs, analyze features to identify concerning behaviors, perform topic modeling to detect tweets related to crime, and suggest profiles for suspension. The goal is to prevent the spread of criminal content and activities online through monitoring social media data and flagging problematic accounts.
This document proposes guidelines for developing a national cybersecurity strategy. It discusses the importance of cybersecurity given increasing internet usage and mobile broadband adoption. Nations need strategic cybersecurity frameworks to protect digital economies, national security, and citizens from growing cyber threats. The paper reviews existing strategies and highlights challenges. It conducted expert interviews across technical, economic, legal and policy areas to inform proposed guidelines. The goal is to educate on cybersecurity and provide a collaborative framework to mitigate risks in the digital era.
The document discusses the debate between individual privacy rights and government surveillance efforts aimed at national security. It notes that while increased surveillance can help protect citizens from security threats like terrorism, it may infringe on citizens' privacy rights. The debate centers around finding a balance between these competing interests. The document also mentions how technology has led to more personal information being stored digitally, making it accessible to authorities, and how this issue deeply affects many people given modern technology usage.
This document discusses internet governance from both a global and Bangladeshi perspective. It begins by defining internet governance and outlining some of the key actors and issues involved, such as privacy, media freedom, and internet sovereignty. It then provides examples of internet governance challenges in different parts of the world, such as bans on social media platforms in Russia and data localization laws in the EU. Finally, it analyzes Bangladesh's approach to internet governance, noting accusations that the government manipulates internet access and passes laws like the Digital Security Act that are criticized for restricting free speech and press freedom.
The document discusses the dilemma governments face regarding social media intelligence (SOCMINT). On one hand, SOCMINT could provide valuable intelligence to keep the public safe, but it challenges conceptions of privacy and may not fit within existing legal frameworks. A balance must be struck between security, privacy, and maintaining public support for intelligence activities.
Two tales of privacy in online social networksHarshitha Reddy
This document discusses two different perspectives on privacy in online social networks (OSNs) - the surveillance perspective and the social privacy perspective.
The surveillance perspective frames privacy as a right to protect citizens from an overbearing surveilling state. Researchers working from this perspective develop privacy-enhancing technologies (PETs) to counter surveillance by governments and OSN providers.
The social privacy perspective views privacy issues in OSNs as problems that emerge from the renegotiation of social boundaries as interactions move online. Researchers in this area focus on designing tools and principles to help users better manage their privacy through improved transparency, feedback and privacy settings.
The document argues that while useful, these two perspectives treat the different privacy problems as independent
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Collusion-resistant multiparty data sharing in social networksIJECEIAES
The number of users on online social networks (OSNs) has grown tremendously over the past few years, with sites like Facebook amassing over a billion users. With the popularity of OSNs, the increase in privacy risk from the large volume of sensitive and private data is inevitable. While there are many features for access control for an individual user, most OSNs still need concrete mechanisms to preserve the privacy of data shared between multiple users. The proposed method uses metrics such as identity leakage (IL) and strength of interaction (SoI) to fine-tune the scenarios that use privacy risk and sharing loss to identify and resolve conflicts. In addition to conflict resolution, bot detection is also done to mitigate collusion attacks. The final decision to share the data item is then ascertained based on whether it passes the threshold condition for the above metrics.
This document discusses the growing influence and potential threats of social media. It argues that while social media has enabled greater communication and mobilization, it can also be used to infringe privacy and destabilize governments if left unregulated. The document outlines how social media was used in events like the Arab Spring and recent protests. It suggests measures like monitoring, censorship, and identifying online influencers that countries could take to regulate social media and prevent its misuse. The document also discusses how social media has enabled new forms of currency like Bitcoin and their association with illegal activities like money laundering and terrorism financing on the dark web. It argues that if social media and new currencies are not properly governed, they could come to dominate the global order
This document discusses how governments can use social media and information and communications technology to provide public information. It defines social media and common platforms used, such as Facebook, Twitter, YouTube, Issuu and LinkedIn. It also defines ICT as technologies that allow communication through devices and networks. The document concludes that following open data guidelines ensures transparency and that social media and ICT help engage citizens and provide real-time access to government information on various devices.
This document discusses how governments can use social media and information and communications technology to provide public information. It defines social media and common platforms used, such as Facebook, Twitter, YouTube, Issuu and LinkedIn. It also defines ICT as technologies that allow communication through devices and networks. The document concludes that following open data guidelines ensures transparency and that social media and ICT help engage citizens and provide real-time access to government information on various devices.
Cybersecurity Business Risk, Literature ReviewEnow Eyong
Cybersecurity poses a significant business risk to social media corporations. These companies generate revenue through targeted advertising based on analyzing user information and engagement. However, cybersecurity threats could diminish the customer experience and engagement, reducing companies' ability to generate revenue. Social media sites must implement best practices from fields like the military to strengthen cyber defense, including developing reliable information systems, collecting intelligence on cyber criminals, and understanding potential cyber attack threats. Failure to address cybersecurity risks could jeopardize the success and sustainability of social media businesses.
Addressing Policy Challenges of Disruptive TechnologiesAraz Taeihagh
This special issue examines the policy challenges and government responses to disruptive technologies. It explores the risks, benefits, and trade-offs of deploying disruptive technologies, and examines the efficacy of traditional governance approaches and the need for new regulatory and governance frameworks. Key themes include the need for government stewardship, taking adaptive and proactive approaches, developing comprehensive policies accounting for technical, social, economic, and political dimensions, conducting interdisciplinary research, and addressing data management and privacy challenges. The findings enhance understanding of how governments can navigate the complexities of disruptive technologies and develop policies to maximize benefits and mitigate risks.
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Corey Olszewski
Law enforcement agencies can benefit from using social media in three ways: 1) Enhancing emergency response by locating survivors, threats, and witnesses via social media posts; 2) Improving communication with the public during crises to issue alerts and combat rumors; and 3) Strengthening community relations through regular online engagement. To maximize these benefits, agencies should appoint social media officers, establish usage guidelines, and promote their social media presence before a disaster occurs. During incidents, posts can provide real-time situational updates. Afterward, social media facilitates investigations and reassures the public. However, policies must ensure urgent requests are directed to 911 rather than social platforms.
1Running head CYBERWARCYBER WAR9Outstanding title.docxfelicidaddinwoodie
1
Running head: CYBERWAR
CYBER WAR
9
Outstanding title page formatting
Cyber War
Name
University
Professor
04/28/2018
Introduction Cyber War
Cyber warfare refers to a computer or network-based conflict that disrupts the activities of a state or
organization by deliberate attacking critical infrastructures. Cyber attacks can also be described as an attack by hostile groups such as terrorist or hacker groups aimed, at furthering the goals of a given nation. To have a better understanding, cyber warfare can take different forms such as; viruses that can take down water supplies, military systems, transportation systems, hacking and theft of critical data from government and private institutions. This paper will focus on assessing various mechanism applied in different articles to counter cybersecurity and protect critical infrastructure. Further, by analyzing the results and experience in Xia, Becerra-Fernandez, Gudi, & Rocha-Mier (2011), the essay will also show how
the findings can be utilized in real life scenario.
1. What do the articles have in common?
According to Clemente (2011), the advancement of interconnection between different infrastructures sectors has boosted by the escalation of cyberspace. The author points out that the security
implications are inevitable especially in this era of cyberspace and infrastructure. The main idea in the article involves around the definition of ‘critical’ infrastructure to enable effective prioritization and protection of nodes and connection points. FEMA (2013
), points out that the United States well being relies upon secure critical infrastructure that forms American society. According to Saadawi, & Jordan
, (2011), there is need to establish an international cyber union that will help overcome cybersecurity challenges in securing cyberinfrastructure. This article considers the practical considerations that are associated with EINSTEIN 3 and how this can be used to ensure effective protection of critical infrastructure networks. Having evaluated the main argument of these articles, they all share the aspect of understanding cybersecurity and different ways ensuring infrastructure protection.
2. What are the differences in their assessment of cybersecurity and critical infrastructure protection?
The above articles portray some distinction in their evaluation of cyber war and protection of vital infrastructure. The first article by Clemente (2011), tries to examine how cybersecurity challenges can be overcome by understanding various components in society. The article offers more theoretical approaches to counterattack cybersecurity and protection of critical infrastructures. The second article by FEMA (2013
) is more detailed and comprehensive on the issue of cybersecurity and protection of critical infrastructures in the society. For instance, it offers a plan that will require a federal agency (SSA) to lead a coordinated process for vital infrastructure security within criti ...
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
ARTICLE IN PRESS
Contents lists available at ScienceDirect
Telecommunications Policy
Telecommunications Policy 33 (2009) 706–719
0308-59
doi:10.1
� Cor
E-m
URL: www.elsevierbusinessandmanagement.com/locate/telpol
Cybersecurity: Stakeholder incentives, externalities,
and policy options
Johannes M. Bauer a,�, Michel J.G. van Eeten b
a Department of Telecommunication, Information Studies, and Media; Quello Center for Telecommunication Management and Law,
Michigan State University, East Lansing, Michigan, USA
b Faculty of Technology, Policy and Management, Delft University of Technology, Delft, The Netherlands
a r t i c l e i n f o
Keywords:
Cybersecurity
Cybercrime
Security incentives
Externalities
Information security policy
Regulation.
61/$ - see front matter & 2009 Elsevier Ltd. A
016/j.telpol.2009.09.001
responding author. Tel.: þ1 517 432 8003; fax:
ail addresses: [email protected] (J.M. Bauer), m
a b s t r a c t
Information security breaches are increasingly motivated by fraudulent and criminal
motives. Reducing their considerable costs has become a pressing issue. Although
cybersecurity has strong public good characteristics, most information security
decisions are made by individual stakeholders. Due to the interconnectedness of
cyberspace, these decentralized decisions are afflicted with externalities that can
result in sub-optimal security levels. Devising effective solutions to this problem is
complicated by the global nature of cyberspace, the interdependence of stakeholders, as
well as the diversity and heterogeneity of players. The paper develops a framework for
studying the co-evolution of the markets for cybercrime and cybersecurity. It examines
the incentives of stakeholders to provide for security and their implications for the ICT
ecosystem. The findings show that market and non-market relations in the information
infrastructure generate many security-enhancing incentives. However, pervasive
externalities remain that can only be corrected by voluntary or government-led
collective measures.
& 2009 Elsevier Ltd. All rights reserved.
1. Introduction
Malicious software (‘‘malware’’) has become a serious security threat for users of the Internet. Estimates of the total cost
to society of information security breaches vary but data published by private security firms, non-profit organizations, and
government, all indicate that their cost is non-negligible and increasing. From a societal point of view, not only the direct
cost (e.g., repair cost, losses due to fraud) but also indirect costs (e.g., costs of preventative measures) and implicit costs
(e.g., slower productivity increases due to reduced trust in electronic transactions) have to be attributed to information
security breaches. Bauer, Van Eeten, Chattopadhyay, and Wu (2008) in a meta-study of a broad range of research conclude
that a conservative estimate of these costs may fall between 0.2% and 0.4% of global GDP. A catastrophic security fail ...
This document discusses a blockchain-based framework for event detection and trust verification using natural language processing and machine learning on social media data. Key points:
- The framework aims to improve emergency response to disasters by analyzing social media posts to extract real-time information about events, while also verifying the trustworthiness of detected events and eliminating single authorities.
- Machine learning, deep learning, and natural language processing techniques are used on social media datasets to detect emergency events and filter information to support relief efforts.
- The blockchain framework is incorporated to improve security, transparency, and avoid sharing of wrong information by verifying the trust of detected events without a single point of authority.
- The overall goal is developing
Similar to 2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx (20)
6/5/2020 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=2ab444ee-13c8-49eb-86f5-578168754de8&course_id=_47058_1&includeDeleted=true&print=true 1/12
%21
%20
%1
SafeAssign Originality Report
Cloud Computing - 202040 - CRN174 - Pollak • Final Project
%26Total Score: Medium risk
Santhosh Muthyapu
Submission UUID: 43a98d6d-211b-6de9-9bf1-1de6250058fd
Total Number of Reports
3
Highest Match
43 %
Bibliography.docx
Average Match
26 %
Submitted on
06/05/20
11:46 AM EDT
Average Word Count
816
Highest: CLOUDMISCONFIGURATION.pptx
%43Attachment 1
Global database (3)
Student paper Student paper Student paper
Institutional database (1)
Student paper
Internet (1)
fiids
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 193
Bibliography.docx
1 5 3
2
4
2 Student paper 1 Student paper 5 Student paper
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport?attemptId=2ab444ee-13c8-49eb-86f5-578168754de8&course_id=_47058_1&includeDeleted=true&print=true&force=true
6/5/2020 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=2ab444ee-13c8-49eb-86f5-578168754de8&course_id=_47058_1&includeDeleted=true&print=true 2/12
Source Matches (6)
Student paper 83%
Student paper 92%
Student paper 94%
Student paper 81%
Bibliography: Baset, S., Suneja, S., Bila, N., Tuncer, O., & Isci, C. (2017). Usable declarative configuration specification and validation for applications, systems, and cloud.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference on Industrial Track - Middleware ’17. https://doi.org/10.1145/3154448.3154453
Berger, S., Garion, S., Moatti, Y., Naor, D., Pendarakis, D., Shulman-Peleg, A., Rao, J. R., Valdez, E., & Weinsberg, Y. (2016). Security intelligence for cloud management
infrastructures. IBM Journal of Research and Development, 60(4), 11:1–11:13. https://doi.org/10.1147/JRD.2016.2572462
Duncan, R. (2020). A multi-cloud world requires a multi-cloud security approach. Computer Fraud & Security, 2020(5), 11–12. https://doi.org/10.1016/S1361-3723(20)30052-X
January 15, S. P. on, & 2020. (2020, January 15). Cloud Misconfigurations: The Security Problem Coming From Inside IT. Security Boulevard.
https://securityboulevard.com/2020/01/cloud-misconfigurations-the-security-problem-coming-from-inside-it/ Torkura, K. A., Sukmana, M. I. H., Strauss, T., Graupner, H., Cheng, F.,
& Meinel, C. (2018, November 1). CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems. IEEE Xplore. https://doi.org/10.1109/NCA.2018.8548329
1
2 2
3
4 5
1
Student paper
Proceedings of the 18th ACM/IFIP/USENIX Middleware
Conference on Industrial Track - Middleware ’17.
https://doi.org/10.1145/3154448.3154453
Original source
Proceedings of the 18th ACM/IFIP/USENIX Middleware
Conference on Industrial Track - Middleware '17
doi:10.1145/3.
61Identify the case study you selected. Explain whether the.docxBHANU281672
6:1
Identify the case study you selected. Explain whether the primary offender demonstrates features of a disciplined psychopath or an undisciplined psychopath. Provide examples to support your conclusion. Explain how these features differ from those displayed by individuals with antisocial personalities or narcissism. Explain the challenges a forensic psychology professional might have working with individuals with antisocial personality disorder or psychopathy.
Support your post with references to the Learning Resources and other academic sources.
Case Study #1
FPSY 6201 Psychological Aspects of Violent Crime Week 6 Case Studies
Paul is a 31-year-old man who was recently arrested for shooting a store manager during a robbery. He has a history of aggression and violating the law, including burglary, robbery, assault, and numerous drug charges. He is a high school dropout and has never been able to hold a job. When he first meets someone, he can come across as engaging, funny, and charming. He has been in numerous relationships; however, in those relationships he was emotionally detached and parasitic, as well as verbally and physically abusive. He has a volatile temperament and no sense of obligation or responsibility to anyone. His crimes often display a complete lack of empathy for his victims.
.
60CHAPTER THREEconsistent with the so-called performative app.docxBHANU281672
60 CHAPTER THREE
consistent with the so-called performative approach in social studies (K,apchan, 1995; Schechner, 2002; Warren 2001). According to this approach, to perform is to carry something into effect; hence, intercultural communication can be viewed as a process of carrying meaning, or cultural identity, as such, into effect.
When we speak of performativity or performance in intercultural communi cation, we must remember that "performance is the manifestation of performa tivity. This is to say, performativity refers to the reiterative process of becoming, while performance refers to the materialization of that process-the individual acts by human players in the world" (Warren, 2001: 106; boldface added)
The performative approach suggests that intercultural communication is per formed, like music. There are a variety of verbal and nonverbal elements (notes), with which people create various language games (music). Some games are quite simple (a routine greeting), while others are more complex (business negotia tions). In all cases, though, meanings are performed; that is, they are created and re-created in the process of interaction. People perform various activities repeat edly, and through repetition these movements become symbolic resources making up cultural identity. In intercultural interactions, to use Nietzsche's expression, "the deed is everything" (quoted in Butler, 1990: 25).
,11
I
"I
I
,,
'l
I,
Introducing the Performativity Principle
Looking at intercultural communication as performance, we will formulate our third principle of intercultural communication: the Perfo.rmativity Principle. There are three parts to this principle, and each deals with intercultural communication as creating and enacting meaning in the process of interaction. First, we will dis cuss the dramaturgy of intercultural performativity, or how people move from rules to roles. Next, we will present intercultural communication as a reiterative process. Finally, we will show the structure of intercultural communication as per formance. We will discuss each part separately and then formulate the Performa tivity Principle as a whole.
The Dramaturgy of Performativity:
From Rules to Roles
Communication as Drama. When people communicate with one another, they try to reach their goals by using various language means. Every act of com munication is a performance whereby people lace each other (either literally or in a mediated fashion, such as via the telephone or the Internet) and, as if on stage, present themselves-their very identities-dramatically to each other.
The theatrical or dramaturgical metaphor for communication does not sug
gest that people perform actions according to predetermined scripts or that per formances are insincere and deceitful. Nor does the theatrical metaphor suggest that people think of themselves as actors, always conscious of performing on stage. What the dramaturgical view of performativity states.
6 pagesThe following sections are in the final consulting .docxBHANU281672
6 pages
The following sections are in the final consulting report: Introduction to the Organization and Entry, Informal Data Collection, Microdiagnosis, and Contracting. Begin composing these sections in a document of 6–9 pages, not including the title page, table of contents, or reference list. Address the following elements:
Introduction to the Organization
Type of organization
Description of and information about the organization (e.g., review Web sites, press, and published documents)
Number of employees or key members
The opportunities that were initially identified or issues the organization faces
Entry, Informal Data Collection, Microdiagnosis, Contracting
Description of the issue or opportunity that served as a starting point for your work with the client
The process of diagnosing the problem and the agreed-upon objectives
The process you used to reach an agreement with the organization
.
600 words needed1. What do we mean by the New Public Administr.docxBHANU281672
600 words needed
1. What do we mean by the New Public Administration? Relatedly, but distictively,
2. what is meant by the New Public Management?
3. How are they related?
4. How has the advent of digital technology helped inspire new emphases on efficiency on the public sector?
.
6 peer responses due in 24 hours Each set of 2 responses wil.docxBHANU281672
6 peer responses due in 24 hours
Each set of 2 responses will have its own instructions.
Respond to at least two of your classmates
TAMMY’S POST:
The differences between mandatory, aspirational, principle and virtue ethics are paramount to ethical practice. The comprehension and implementation of the spheres of each allow for adhesion to policy and a sense of professionalism.
"General Principles, as opposed to Ethical Standards, are aspirational in nature. Their intent is to guide and inspire psychologists toward the very highest ethical ideals of the profession. General Principles, in contrast to Ethical Standards, do not represent obligations and should not form the basis for imposing sanctions. Relying upon General Principles for either of these reasons distorts both their meaning and purpose". (American Psychological Association, 2017)
The literature and the doctrine parameters cause uncertainty due to the conflictual environment and obligations. Questions of conflict about perceptual tension, as an example in
Professional ethics in interdisciplinary collaboratives: Zeal, paternalism, and mandated reporting
(2006) are between an attorney's zeal or client autonomy within the judicial system relationships in contrast to the Social Services scope of interests of humanity and social justice. Since the adaption of roles and environments tend to adjust, concern if responsibility sways in the contention of the differences. Social services render a larger and more diverse "moral community" and their sustainability stemming from virtue. The judicial system attends to the political policy and rules governing lawful adherence versus deviance. Another spectrum is mandatory reporting obligations which are said to be more profound when ethics pursue and in the collaboration still clash. An issue is an act of ethics versus the 'command' according to an agency (Anderson, Barenberg, & Tremblay, 2006. p. 663).
The differences between principle ethics and virtue ethics
The general principles of the APA are considered aspirational. Simultaneously, therapists, psychologists, and psychiatrists, and similar social services are mandated in the ethical codes of conduct to act in the betterment and safety of others, especially those deemed incompetent or incapacitated to do so.
The difference between principle ethics and virtue ethics splits by social normative and subjectivity. Social normative are more definite by culture but still universal and often mandatory. For instance, law-abiding and humane acts from avoiding reckless driving, speeding, or operating under the influence of obligatory care of the elderly, a child, or the disability are mandatory. Virtue ethics are less objective and more diverse to demographics and ethnography. Like integrity, it is a matter of right and wrong based on habits, behaviors rooted in one's upbringing. For example, seeing someone drop money instead of keeping it is returned to the person seen dropping it. Another.
6 page paper onWhat is second language acquisition and why is .docxBHANU281672
6 page paper on
What is second language acquisition and why is it important? The disadvantages of not learning a second language. The benefits of being bilingual and multilingual. When is the best time to learn a second language and why? Why is it important to learn a second language at a younger age rather than an older age?
3 reliable sources.
.
600 Words1) Specify some of the ways in which human resource m.docxBHANU281672
600 Words
1) Specify some of the ways in which human resource management differs significantly in the public sector from the private sector?
2) Specify some of the ways in which all public managers are involved in the areas human resource management?
3) In recent times, organizations have been devoting an increasing amount of the organization's resources toward human resources. This is particularly true in areas such as technical and social training, dispute resolution, and the like. Why do you think this is?
4) What are some of the ways that human resource managers operating in local government agencies (i.e. municipal, county, school districts, and so forth) are addressing the skills shortages caused by massive generational retirements in the public sector?
source
http://www.jstor.org.proxy.li.suu.edu:2048/stable/20447680
.
6/1/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=81c044c4-395e-4a6c-a5a6-511adc5035… 1/3
%53
SafeAssign Originality Report
Summer 2020 - Business Intelligence (ITS-531-40)(ITS-531-41) - COM… • Week 4: Assignment Homework 4
%53Total Score: High riskAvinash Kustagi
Submission UUID: a477046b-f773-05f5-3f16-5ee6e34a32d9
Total Number of Reports
1
Highest Match
53 %
Homework assignment 4.docx
Average Match
53 %
Submitted on
05/31/20
12:09 AM EDT
Average Word Count
596
Highest: Homework assignment 4.docx
%53Attachment 1
Institutional database (1)
Student paper
Top sources (1)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 596
Homework assignment 4.docx
1
1 Student paper
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=81c044c4-395e-4a6c-a5a6-511adc503512&course_id=_118720_1&download=true&includeDeleted=true&print=true&force=true
6/1/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=81c044c4-395e-4a6c-a5a6-511adc5035… 2/3
Source Matches (6)
Running head: Data MINING 1
Data MINING 8
Data Mining
Student: Avinash Kustagi
University of Cumberlands
Course Name: Business Intelligence
Course number: ITS-531
Professor: Dr. Abiodun Adeleke
05/29/2020
Data mining can be explained as the method to interpret information and hypothesis from large knowledge and data collections like databases or data warehouses.
Data mining popularity is increasing rapidly right now in the world. It is slowly becoming one of the most desired fields of work in the world right now. Data plays a
very big role in developing and shaping a business. It is because of Data mining that an organization comes to know more about what the market has demand for and
what their customers prefer and what they absolutely dislike. Data mining has proven to be extremely helpful in making valuable and important business decisions.
As described in the article” Business data mining — a machine learning perspective”, data mining has become an integral part of business development (Bose &
Mahapatra, 2001). Data mining has several applications in different fields of life. It is used in the field of finance, television industry, education, retail industry, and
telecommunication industry. Data mining is very valuable in the field of finance. Data mining help in data analysis to find a result in loan prediction. It gives an analysis
of the customer’s credit history and fraud detection (Valcheva, n.d.). It also assists in determining the previous money laundering trends and deduces a conclusion
about any unusual patterns in a credit history. It also assists in helping develop targeted marketing. In the field of finance, data mining and analysis helps in deducing
conclusion results from the previous trend in markets to determine what fiscal produc.
61520, 256 PMGlobal Innovation and Intellectual Property.docxBHANU281672
6/15/20, 2:56 PMGlobal Innovation and Intellectual Property
Page 1 of 7https://edugen.wileyplus.com/edugen/courses/crs12056/ebook/c12/…zOTc4MTExOTI0NDgzN2MxMl8yXzAueGZvcm0.enc?course=crs12056&id=ref
Print this page
12.1 Innovation as a Tool for Global Growth
LEARNING OBJECTIVE
Identify three types of innovation that can fuel global growth.
Over 93 percent of global executives rate innovation as a key driver of organic global growth. More importantly, research
shows that around 85 percent of a company's productivity gains are related to R&D and other innovation-related
investments.
Innovation is the commercialization of new invention. However, many innovations do not necessarily build on new
inventions. An invention is a new concept or product that derives from ideas or from scientific research. Innovation, on the
other hand, is the combination of new or existing ideas to create something desired by customers, viable in the
marketplace, and possible with technology (see Figure 12.1).
Figure 12.1Primary components of innovation
The inputs used to innovate could be new inventions or they could be old ideas. For example, Henry Ford didn't invent the
automobile. Karl Benz from Germany did. However, Ford combined scientific management concepts with the automobile
production process to build automobiles more efficiently (Figure 12.2). This innovation built on existing inventions to
usher in a new industry with the scale to meet demand.
3
4
5
6
6/15/20, 2:56 PMGlobal Innovation and Intellectual Property
Page 2 of 7https://edugen.wileyplus.com/edugen/courses/crs12056/ebook/c12/…zOTc4MTExOTI0NDgzN2MxMl8yXzAueGZvcm0.enc?course=crs12056&id=ref
Figure 12.2Innovation in the auto industryCarl Benz of Mercedes Benz invented the automobile (left). Henry Ford of Ford
Motor Company innovated by combining ideas on assembly lines with car production (right).
Most global managers struggle to get people in their companies to innovate. So far, no one has created a formula or model
that reliably leads companies to increased innovation. Some management approaches are helpful, but none is perfect. As
Dr. Brian Junling Li, vice president of Alibaba Group, puts it, “Innovation doesn't come from organized plans. It comes
from our preparedness to deal with the uncertainty of the future.” To understand how global companies can effectively
deal with the uncertainties of the future, we first need to examine the different types of innovation in which companies can
invest.
Three Kinds of Innovation
Different types of innovation have different implications for company growth. Based on those implications, we can
organize innovations into three types: those that improve performance, those that enhance efficiency, and those that create
a market.
Performance-improving innovations replace old products with upgraded models. Often, the improvements in these models
are consistent worldwide. Performance-improving innovations keep a company growing because they provide .
6 Developing Strategic and Operational PlansIngram Publish.docxBHANU281672
6 Developing Strategic and Operational Plans
Ingram Publishing/Thinkstock
To mean well is nothing without to do well.
—Plautus
Trinummus
Learning Objectives
After reading this chapter, you should be able to do the following:
• Identify strategy concepts, including the components of organizational strategy; generic strategies; diversi-
fication, integration, and implementation strategies; and blue ocean strategy.
• Describe the use of strategies for large, multiunit organizations, including the use of the Boston Consult-
ing Group matrix to discern strategic implications from the analysis of existing operations, and the use of
product/market expansion strategies and diversification strategies for organizational growth.
• Discuss tactical issues that are relevant to pursuing participation in a managed-care network.
• Delineate the factors that influence the selection of a strategy by an organization.
• Explain how operational plans support strategic plans, and describe how operational plans are developed.
Section 6.1Strategy Concepts
Introduction
After developing a set of objectives for the time period covered by the strategic plan, the strat-
egy necessary for accomplishing those objectives must be formulated. First, planners must
design an overall strategy, and then define the operating details of that strategy as it relates
to providing services, promoting operations, determining locations, and increasing revenue
sources. This chapter introduces the concept of strategy, and describes strategy elements,
approaches to strategy development, and how operational plans support strategic plans.
6.1 Strategy Concepts
The word strategy has been used in a number of ways over the years and especially so in
the context of business. As we discussed in Chapter 2, strategy means leadership and may
be defined as the course of action taken by an organization to achieve its objectives. It is a
description first in general terms and then, in increasingly greater detail, of the activities
the organization will undertake to meet its goals and fulfill its ongoing mission. Strategy
is the catalyst or dynamic element of managing that enables a company to accomplish its
objectives.
Strategy development is both a science and an art, a product of both logic and creativity. The
scientific aspect deals with assembling and allocating the resources necessary to achieve
an organization’s objectives with emphasis on matching organizational strengths with envi-
ronmental opportunities, while working within cost and time constraints. The art of strat-
egy is mainly concerned with the effective use of resources, including motivating people to
make the strategy work, while being sensitive to the environmental forces that may affect
the organization’s performance and maintaining the ability to adapt the HCO to these chang-
ing conditions.
Components of Organizational Strategy
The focus of strategy varies by the planning level: the organizat.
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 1/5
%46
%5
SafeAssign Originality Report
Summer 2020 - Emerging Threats & Countermeas (IT… • Final research paper/project/assignment
%51Total Score: High risk
Vikeshkumar Dipakkumar Desai
Submission UUID: e2f632c2-fdcf-616b-51d7-5a4eb8187331
Total Number of Reports
1
Highest Match
51 %
Document8.docx
Average Match
51 %
Submitted on
06/21/20
03:48 PM PDT
Average Word Count
1,276
Highest: Document8.docx
%51Attachment 1
Institutional database (5)
Student paper Student paper Student paper
Student paper Student paper
Internet (3)
lplanet hack-ed wikipedia
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,276
Document8.docx
1 3 4
2 5
7 6 8
1 Student paper 3 Student paper 4 Student paper
Running head: DEFENSE-IN-DEPTH AND AWARENESS TECHNIQUES
1
Running head: DEFENSE-IN-DEPTH AND AWARENESS TECHNIQUES
4
Defense-in-Depth and Awareness Techniques
Vikesh Desai
University of Cumberlands
Defense-in-Depth and Awareness Techniques
Awareness is one of the essential aspects in most of the organization, which requires a high magnitude to address comprehensively in all sections.
The depth in defense is more paramount to ensure that the organizations are comprehensively and effectively protect their system from the cyber-
attack activities. The most crucial strategy to deploy is two strategic systems that enhance the high degree of security instead of implementing one
security system. Various organizations have taken into account the defense in depth very crucial. Still, the organizations demanded to incorporate
their awareness through the provision of comprehensive educations to the employees and the workers in the organizations concerning the vital
measures that should be taken into account to curb security issues and develop holistic values taken into account. Most of the organizations are
known not to take the awareness as pressing issues that demand high consideration for the process of protecting and enhancing the security to be
tight. For any organization to protect their system from the cybercrime attack, they need to embrace situational awareness so that they can compre-
hensively develop strategic interventions that enable them to improve and assist in the detection of the up and coming threats as well as the
1
1
1
1
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=6d3212a4-b0a4-44b2-afd8-56ae47ca2c6b&course_id=_116194_1&download=true&includeDeleted=true&print=true&force=true
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 2/5
Source Matches (23)
strengthens that countermeasures the cybercrime activities. To me.
6.2 What protocols comprise TLS6.3 What is the difference.docxBHANU281672
6.2 What protocols comprise TLS?
6.3 What is the difference between a TLS connection and a TLS session?
6.4 List and briefly define the parameters that define a TLS session state.
6.5 List and briefly define the parameters that define a TLS session connection.
6.6 What services are provided by the TLS Record Protocol?
6.7 What steps are involved in the TLS Record Protocol transmission?
6.8 What is the purpose of HTTPS?
6.9 For what applications is SSH useful?
6.10 List and briefly define the SSH protocols.
.
6.2 What protocols comprise TLS6.3 What is the difference bet.docxBHANU281672
6.2 What protocols comprise TLS?
6.3 What is the difference between a TLS connection and a TLS session?
6.4 List and briefly define the parameters that define a TLS session state.
6.5 List and briefly define the parameters that define a TLS session connection.
6.6 What services are provided by the TLS Record Protocol?
6.7 What steps are involved in the TLS Record Protocol transmission?
6.8 What is the purpose of HTTPS?
6.9 For what applications is SSH useful?
6.10 List and briefly define the SSH protocols.
.
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docxBHANU281672
6-3 Discussion: Making Decisions
Discussion Topic
Starts Jun 5, 2021 11:59 PM
View
this interactive discussion scenario
and answer the question(s) posed at the end of the presentation.
A transcript for the video
Interactive Discussion Scenario
is available.
.
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docxBHANU281672
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUCTIONS..
Guided Response:
Review your classmates’ posts and choose two posts to respond to.
If you choose a peer that selected the same student as you, address the following prompts:
· Discuss how your plans are similar and how they differ.
· Do you think you and your chosen peer have similar or different teaching styles? Explain.
· Do you think you and your chosen peer could team teach? Explain.
If you choose a peer that selected a different student than you, address the following prompts:
· Share what you appreciated about their plan and suggest at least one additional way to build a relationship with that student.
· Do you think you and your chosen peer have similar or different teaching styles? Explain.
· Do you think you and your chosen peer could team teach? Explain.
BRITTNEY’S POST:
I would work to have a relationship with Olivia just like I would work to have a relationship with any one of my students. I would start every morning by asking her how she is as she comes through door, ask her at some point throughout the day how she is doing, and ask how everyone’s day went at the end of the day. I would also make a point on Mondays to ask everyone what they did over the weekend and Fridays what everyone’s plans are for the weekend. Talking about a child’s day and/or weekend is a great way to build a connection with my students, as well as making it clear that they can talk to me if they need to, and speaking to them with respect, not like they are below you. In addition, it would help to talk about your weekend plans and your day as well. I think each of my strategies will make a positive impact on building a relationship with my students because each one has everything to do with them learning to trust, talk to, and respect me as well.
A few suggestions I would give Olivia’s parents to further build this bond is to suggest one on one time after school a couple times a week or a monthly recap with all the students. One on one time with Olivia would consist of Olivia being able to talk about whatever she wants with homework help and additional tutoring if needed. A monthly recap would consist of one hour a month where the student and their parents can come in for cookies and discuss anything they want. Such as, critiques on my teaching skills/methods, suggestions on material/activities, or just anything I can improve on as an educator. I think it is important to develop a relationship with every child because children do not want to learn from someone they do not like or who does not like them. Rita Pierson, who discusses how she, her parents, and maternal grandparents were educators and the value and importance of human connection. Pierson discusses how everyone is affected by a teacher or an adult at some point in their life. She then goes on to discuss how a teacher said “They don’t pay me to like the kids. They pay me to teach a lesson. The k.
6 peer responses due in 18 hours Each set of 2 responses will ha.docxBHANU281672
6 peer responses due in 18 hours
Each set of 2 responses will have its own instructions..
Guided Response:
Respond to one peer in this Discussion Forum. Read the challenging behavior scenario they have created and use the Developmental Discipline guidance strategy to problem solve. You must include the following in your response: child’s name, how you will approach the child, possible reminder or private sign, describe how you provide time and space, an example of self-talk that can help the child problem solve, and a choice you can offer the child. Additionally, can you use humor to defuse the situation? If so, how? If not, why?
My post:
Collaborative problem solving is one of the guidance strategies to address challenging behaviors. This strategy is based on the notion that a child does not just behave undesirably. There must be a reason for such behavior. Thus, understanding why the child is having a challenging behavior is the start towards addressing this behavior (Schaubman, Stetson, & Plog, 2011). The focus is on building skills like problem-solving, flexibility, and frustration tolerance rather than motivation the child to behave better. Surprisingly, children with challenging behaviors do not lack the will to behave in a desired manner. Simply, they do not have the skills necessary to behave in a desired manner. This information is vital to addressing challenging behaviors among children in the future. This would be achieved through identifying the challenging behaviors, skills needed to address the behaviors, and partnering with the child to build these needed skills (
Kaiser & Sklar Rasminsky, 2017
). This strategy would help address Olivia’s disruptive behavior, impulsivity and addressing peers negatively. Reward and punishment may not work on Olivia. Thus, Olivia needs to develop skills to address her behaviors (Schaubman et al., 2011). One of the skills to develop is social skills to enable her to control her impulsivity, connect with others, and relate with her peers positively. Apart from this strategy, time-out or time-away would address Olivia’s challenging behaviors. A scenario portraying Olivia’s challenging behavior is her inability to wait for her turn during a group activity. She is always blurting out answers before her turn arrives. How can this be solved?
References
Kaiser, B., & Sklar Rasminsky, J. (2017). Chapter 9: Guidance. In
Challenging behavior in young children: Understanding, preventing, and responding effectively
(4th ed.). Pearson Education.
Schaubman, A., Stetson, E., & Plog, A. (2011). Reducing teacher stress by implementing collaborative problem solving in a school setting.
School Social Work Journal
,
35
(2), 72-93.
BRITTNEY'S POST:
What did you learn about your chosen strategy and what information surprised you?
After reading Time Out or Time Away I have learned a couple of things, such as, not every teacher uses the timeout method and I also learned about the tim.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
1. 2
Running head: PUBLIC SAFETY ADMINISTRATORS
2
PUBLIC SAFETY ADMINISTRATORS
Public Safety Administrators
Michael Petras
University of Maryland University College
Public safety administration entails the coordination of the
resources that would be used in the safety and security of the
community. Mainly, public safety administrators include the
police officers, the emergency teams, fire departments, and even
medical service providers. The main aim or role of the public
safety administrators is to ensure that the general public is
protected from various threats that may arise as they interact
within the environment. However, recently, there have been
some challenges that have been an issue in the provision of
public safety administrations. The effect of social media use in
the public has been a challenge to the public safety
administration because of the technicality involved in the use of
the same. Therefore, there is a need to understand social media
use as a challenge to the public safety administration.
In the use of social media, it is expected that the lawmakers,
litigators and even the community members shape the federal,
2. state and local law and departmental policy regarding what
information the public safety administrators access when trying
to protect individuals from areas such as cybercrime and
bullying (Beckett, 2018). The use of social media puts so many
individuals at a lot of risks that need protection from public
safety administrators. It is as a result of this need to protect the
public that laws have been put into place laws on the type of
data and transparency required to protect the public. Some of
these laws have been a challenge to the security providers and
therefore become an issue that needs to be addressed.
The issue of transparency and access to public data from the
public using social media came into existence when there was a
rise in modern technology. The arrival of the new technology
that could enable people to interact online is the one that
resulted to lawmakers coming up with policies that would
require the public safety administrators become more
transparent on the data they access and the extent of the data
they access from the public (Namkoong et al., 2017). The
policymakers argued that the public safety administrators in
their line of duty were accessing private data, which is illegal.
They then came up with laws prohibiting the same, and that
made it a challenge to protect the public who are on social
media platforms.
The history of the issue is dated from the digital age, whereby
the users of social media platforms such as Facebook, Twitter,
and even Instagram started sharing the geographic location and
other data in public. However, watchdog or public safety
administrators could use this data to come up with ways to
protect the public and ensure public safety. However, some of
the ways that the data was being used entailed some
discriminatory surveillance and even tended to violate privacy
rights. Additionally, public safety administrators such as the
police had adopted the dash cams and body cameras to collect
data that were sometimes infringing personal rights (Gintova,
2018). It was upon this realization that society groups went
ahead and called for laws to guide the public safety
3. administrators on the type of data they should collect and stop
invading the personal privacy. However, in the process of
implementing the laws, then it was seemed a difficult task in
providing protection to the public and ensuring their safety on
social media without having to access this data.
To briefly state, the issue of public safety administration should
not be regulated based on privacy matters. The reason being, the
general aim of the public safety administrators, is not to punish
the public but to ensure their safety. Even if someone is
invading their privacy, they are doing that on the basis that they
want to help that someone is protected from any harm that may
arise from the use of social media. Therefore, I do believe that
the issue should be analyzed on the overall benefit received
from the infringement of privacy and not from the fear that
some of the people's privacy being infringed. The same way the
fire department would break into a person's house to contain
fire without any consent from the owner. I believe it should be
the same when it comes to social media that one can access a
threatened person's social media platforms to protect them from
possible cyber crimes, bullying, and any other type of crime
that may arise without consulting the owner. The damage from
the threat is more than the cost of infringement on personal
rights.
Therefore, the issue of infringement of privacy rights in the
context of social media should be an issue of the past that
should not inhibit public safety administrators from conducting
their business of protecting the public. The administrators do
not protect the public from benefiting themselves or from
humiliating someone, but they do it for the benefit of the people
and individuals affected. Therefore, there is a need to revisit the
legislation and come up with laws that are enabling the public
safety administrators to have the ability to administer their
duties without the fear of being subjected to legal litigation of
invading someone's privacy rights.
4. References
Beckett, J. (2018). Five great issues in public law and public
administration. Handbook of Public Administration, 697-
719. https://doi.org/10.4324/9781315093215-18
Gintova, M. (2018). Use of social media in Canadian public
administration: Opportunities and barriers. Canadian Public
Administration, 62(1), 7-26. https://doi.org/10.1111/capa.12298
Namkoong, K., Cho, K., & Kim, S. (2017). undefined. Taylor &
Francis.
Running Head: SOCIAL MEDIA EFFECT
1
SOCIAL MEDIA EFFECT
14
Social Media Effect to Public Safety Administration
Michael Petras
University of Maryland University College
5. Introduction
Regulation of social media usage has led to lawmakers,
community members, and even the litigators in shaping their
policies. This is done based on federal, local, and state laws
while also realigning the information that they are sharing
online. This is concerning the public safety administration that
is usually affected by the continued use of social media
platforms. Public safety administration is also based on
restricting access to personal information while trying to protect
citizens from various issues such as bullying and cybercrime.
Social media usage has continued to put more people at risk,
and there is a need for the provision of public safety protection
by the relevant administrators. This needs to be tied to the
generation of federal laws that protect information and data
from various individuals that have been posted on social media
platforms while encouraging the much-needed transparency in
the protection of the public. Continued social media usage by
the general public has also brought about the issue of stolen
identity due to the emergence of modern technology. The new
technology arrival has been the leading cause of the interaction
of many people on social media platforms (Beckett, 2018).
Those tasked with policymaking have always argued that the
administration of public safety should be in line with the duty
to protect the privacy or access to information and data from
various individuals. In that regard, this paper aims at analyzing
the issue of social media usage as it affects the administration
of public safety at all times.
6. Resources
Public safety administration often encompasses the release and
coordination of various resources, which can be able to ensure
the safety and security of the community as a whole (Gintova,
2018). Administration of public safety is inclusive of many
departments such as the police, the emergency services, the
medical services, and even the fire department. Public safety
administration also happens to be affected by limited resources
when it comes to preventing the processes involved from
working efficiently. This can be linked to the limiting resources
by the government while ensuring the safety and the security of
the general public (Baym, 2015). The general public will always
rely upon a variety of services that come from the relevant
governments to enable the provision of safety and security to
the public in their daily lives. However, limited resources will
end up hampering the whole process as systems and policies
seize to operate with the much-needed efficiency (Wohn &
Bowe, 2016).
Public safety administration services happen to be rendered by
government agencies in most cases, and this usually occurs at
the local, state, or federal levels. The resources that are needed
when it comes to the enactment of public safety concerning the
usage of social media platforms are diverse. For instance, public
safety administration may require the officials that will help to
ensure its efficiency, and this may be a challenge at times. For
that matter, the order in which these services are offered
becomes less efficient (Beckett, 2018).
The officials, such as managers or even the policy
administrators, must be able to ensure that public safety needs
are being provided to the citizens or the community at large at
all times. This is because the different departments of public
safety are often mandated to the provision of public safety and
protection of information being shared on social media
7. platforms.
On the other hand, public safety administration has been able to
embrace the application of social media platforms as a resource
in fighting crime at all times. This is done by using it to not
only inform the public but keep the educated as well (Gintova,
2018). Notably, tools of social media platforms are helping the
administrators of public safety in communicating emergencies
to the general public while also building situational awareness.
By doing so, the use of social media has helped the agencies in
tracking criminals. However, as much as people have the feeling
that social media is private, it is prudent to note that agencies of
law enforcement have often found ways of gaining access to
information and data about many individuals (Beckett, 2018).
The police and other public safety administration departments
can be able to rely on social media as a resource to gain more
evidence in prosecuting a criminal case.
The other challenge being faced in public safety with regards to
the resources is based on the digital age, whereby the users of
social media platforms such as Facebook, Twitter, and even
Instagram often share their geographic locations unknowingly.
Such data could be used by anyone while derailing the essence
of protecting the public and ensuring public safety at all times
(Gintova, 2018). For instance, there is a need for surveillance
(that is not discriminatory by any form) for the general public
to help agencies in the provision of safety as they continue
using social media platforms. However, surveillance resources
have proved to be inadequate; hence some criminals have found
a leeway to violate the privacy rights of other people in the
general public (Wohn & Bowe, 2016).
Additionally, other resources need to be adopted by public
safety administrators, such as the police using body cameras
and dash cams. These can be applied in the collection of data
that concerns infringement on personal rights within the social
media platforms (Beckett, 2018). In the absence of such
resources, there is a challenge to public safety administration as
social media platforms usage has become diversified due to the
8. emergence of higher technology. The funds have to go hand in
hand with the laws that guide the public in using social media
platforms to ensure that public safety administration continues
to protect data and privacy. In the same manner, the resources
are to be encompassed with the implementation of these laws in
a bid to ensure public safety on the platforms of social media
while restricting the access people have on individual data
(Gintova, 2018).
In a bid to foster the public safety administration process, there
is a need for advanced research while social media and
technology continue to advance. However, there are no
resources that can be used for such advancement by the agencies
of public safety administration. This leaves a gap in the
provision of the much needed public safety to all individuals
who are in need with regards to the information provided by
individuals from a particular category (Burton, 2010). At the
moment, it is clear that gathering information can be done with
ease from diversified groups on the social media platform, and a
boost to criminal activities in the cyber world. This happens
without face-to-face interaction, and criminals or any other
users find it easier to more comfortable to carry out their
activities on social media platforms. For that matter, the various
public safety administration agencies have to seek for service of
a social scientist so that they can be able to form new theories
that postulate the interact of such people on the cyber world and
help to avert the harm caused on the general public (Beckett,
2018).
People
Technology has proven to be an essential part of our daily lives
for people in the world because it applies to bills payment,
communication, and adopting better transport systems. People
depend on the improved technology for communication, such as
sending emails, carrying out social media chats, and even trying
to manage their daily lives in general (Gintova, 2018).
9. Technology has also improved the access that people have with
regards to smartphone usage and any other gadgets for that
matter. However, improvement in technology has also been able
to cause a substantial amount of harm to society, where many
are doing bad things in the community (Beckett, 2018).
Notably, social media platforms have helped the nation in the
sense that they have enhanced activities such as the business
sector while helping the way promotions are being done or even
increasing the general expansion of the way businesses are
being run. However, the use of social media has also come
about with adverse effects at different levels since individuals
have always found ways to infringe on emotional health, the
general social interactions even personal privacy of other
people. This has proved to be a challenge to the way public
safety administration is being carried out within the society as a
whole (Baym, 2015).
While carrying out public safety administration, people are
always an important consideration, especially if the right people
are in place for the whole process. However, it is essential to
note that such people should have the right amount of
experience and training when it comes to the provision of much-
needed safety to society as they continue to utilize the social
media platforms at all times in their daily lives. Furthermore,
the protection process for the rights of individuals or even the
restriction of access to their information and data should always
be done by people working under an effective organizational
structure of the public safety administration agencies (Beckett,
2018).
While the greater society continues to experience globalization,
people are getting connected around the world on a larger scale,
and this has continued to improve their access to resources and
information that are limitless. The connectivity has maintained
to ensure that society is thriving with success as the use of
social media platforms is being embraced in all circles (Baym,
2015). Many people continue to be dependent upon social media
platforms in carrying out their activities, and they have been
10. spending a considerable amount of time to post and go through
news feeds.
This involves divulging more personal information while they
create new relationships so as to keep in touch with their
colleagues (Burton, 2010). However, public safety
administration personnel have been lacking the relevant training
and experience that is much needed in the provision of safety to
the general public. The heavy usage of social media often
entails that the agencies that deal with public safety provision
get adequate training by the government has not been able to do
so, resulting in the adverse effects that have been realized
within the society as a whole (Gintova, 2018).
Furthermore, the organizational structures of public safety
administration agencies, such as the police departments, have
not been able to accommodate the personnel that is mandated to
fostering public safety at all times. The social media platforms
have seen some of its users being subjected to harassment and
personal privacy intrusion at the same time (Baym, 2015). Fight
such crimes is the relevant public safety agencies have to try
and come up with sections within their departments under their
organizational structures that will be able to deal with social
media crime. This is in line dealing with cases such as users
being exposed to cyber-sex or even online harassment that
happens to the various users.
As this is done, it will be able to hinder the cybercriminals from
conveying the insensitive messages that adversely affect the
emotional status of these individuals. The personnel under such
sections of the public safety administration agencies have not
been trained adequately to deal with the instances that entail
dealing with cybercrime (Burton, 2010). These are such as
posting disturbing images on the internet of other people
without focusing on how it will negatively affect their
emotional stability or hurting one's feelings. The personnel
should be trained adequately in ways that can be used to handle
individuals who carry out online harassment while often causing
emotional disorders to the victims (Gintova, 2018).
11. Processes
Efficient public safety administration often requires relevant
agencies to come up with better policies and procedures.
However, the current policies and procedures that happen to
govern the various social media platforms are not that adequate,
and their mandate has been lagging in terms of enforcement for
the much-needed regulations. This calls for appropriate and
proper checks and balances to be put into place at all times to
govern the activities of the various agencies that are mandated
with public safety administration. For that matter, enforcement
of public safety has proven to be a challenge in recent times
because the existing policies and procedures are not adequate at
all (Beckett, 2018).
For starters, most social media platforms have often been used
as a mode of expression for a personal opinion while infringing
on public safety at the same time. This has made it difficult for
the various agencies to control its usage, as many often cite the
use of social media to be free (Boyd, 2015). Continued use of
social media has been putting all the public users at risk while
compromising their overall safety, given the fact that the
various agencies do not have means to regulate the activities
being carried out on the platforms. The different policies and
procedures in place have been laid ineffective because most of
the speech privileges on the social media platforms are geared
towards freedom without limiting the formation of hate groups
or even criminal organizations for that matter (Burton, 2010).
The policies are not adequate to be able to control what people
are posting on the online social media platforms, and there are
no specific standards to be used as a guide for all group
members' behavior (Baym, 2015). Such a norm has rendered the
policies and procedures that govern the activities on the social
media platforms to be less strict hence affecting the public
safety administration process as a whole (Beckett, 2018).
There is also the concept of cyberbullying that has increased in
recent times on social media platforms. This is because public
safety administration has not been adhered to fully, and the
12. reason trickles down to the imperfect policies and procedures
that have been put into place to govern such activities. Gintova
(2018) clearly articulates the fact that public safety
administration has been facing a challenge when it comes to
social media users because illegal access to information and
personal data on the internet has not been restricted at all. This
is based on the various app and programs that utilize such
measures that are not strict while leaving a negative effect on
the victims of these cases at all times. Other policies do not
tackle data posting that could leave a negative mark on the
society, such as immoral actions, suicide commitment, and
terrorism hence making it difficult for the public safety
administration agencies to carry out their tasks (Wohn & Bowe,
2016).
Stakeholders and the Constraints and Opportunities
Analysis of the public safety administration concerning the use
of social media platforms can also be based on the stakeholders,
the constraints, and even the opportunities that are involved
along the way. These are clearly outlined as being part of the
process because they form part of the outcome that is expected
while handling the issue of public safety at all times (Boyd,
2015).
Stakeholders
Social media platforms consist of various stakeholders, with a
good number of people involved in its usage getting data and
information through its use. This is data and information that is
based upon daily events such as meetings and even other
activities that do not frequently recur, such as birthdays. Most
of these events are passed on social media platforms, and this
ends up leaving personal information on the media (Gintova,
2018). If unauthorized persons access such data, it ends up
being in the wrong hands while being used to cause harm to the
victims at the same time. For that matter, the main stakeholders
that need to ensure their own public safety administration
process are the users of the social media platforms.
13. Most of the users do not want to filter or even limit the kind of
data and information they are sharing on the social media
platforms, and this is leveraged upon by the criminals who find
their data with ease. This has posed a challenge to the relevant
public safety administration agencies as raising the level of
awareness has not borne fruit (Beckett, 2018). Some of the
leading platforms of social media being used by the
unsuspecting individuals happen to be Facebook, Instagram,
Twitter, emails, and even that of WhatsApp. Such media apps
have been accessed with ease by the criminals due to the lapse
in data security by the individuals using the platforms, as most
of them have failed to secure their data with necessary measures
(Boyd, 2015).
Constraints
On the other hand, there have been various constraints that are
being faced by public safety agencies as they try to enforce
safety concerning social media usage. This is based on
safeguarding the information that is coming from various
individuals who use the platforms from thieves and other
cybercriminals at the same time. Thus, the fight is being
hindered in most cases with emerging constraints concerning the
use of social media networks. The various restrictions that are
being faced within the sector are such as ensuring data privacy
for all the individuals subscribed to the social media platforms
as their numbers turn out to be immense (Beckett, 2018). The
protection of such a massive amount of data proves to be a
challenge to the public safety administration agencies as the
technology to do so continues to be elusive.
For example, a criminal can access Facebook accounts of a
given individual and take their personal information to be used
in tracking their email accounts to steal personal information
later on without the user's knowledge. This becomes a challenge
as the agencies find it difficult to tell if, indeed, it is the owner
having access or thief of such information being granted access
to private information (Gintova, 2018). The other constraint is
the regulation of online communities and their respective
14. activities at all times on the social media platforms. Therefore,
public safety administration agencies often face the challenge of
preventing negative impacts of using social media outlets for
specific individuals because regulation of activities on the
media platforms is not more natural (Boyd, 2015).
Opportunities
The process of public safety administration is often affected by
the opportunities that social media platforms present to various
business sectors. This is because there are opportunities such as
the interconnection of multiple people on a single platform that
makes it easier for them to access relevant information at the
same time (Gintova, 2018). Through social media use, various
people can connect with many others and at different locations
to interact and communicate at lower costs.
This has been the main reason why the regulation of social
media platforms becomes a challenge by the various public
safety administration agencies. As much as the agencies would
want to regulate the ongoing activities on the media platforms,
it would end up affecting people's communication and
interaction means (Beckett, 2018). It would also mean that
people start to incur more costs while using other forms of
communication since the social media platforms they are using
have been interrupted by the agencies. In the end, the routine
activities and interaction of people will be suspended.
Conclusion
Conclusively, it is apparent that social media usage has often
affected the way public safety administration is being carried
out in many circles. This is because it has led to the community
members trying to shape and realign their information that is
being shared on such platforms. The concept of social media
users often affects the public safety administration in any given
scenario because access to the information posted on such
platforms while trying to protect citizens from various issues
such as bullying and cybercrime is a big challenge for the
relevant agencies. Social media usage has continued to put more
15. people at risk, and there is a need for the provision of public
safety protection by public safety administrators. Some of the
measures that can be applied in curbing such issues are the
enactment of laws that provides public safety at all times. From
the text above, it is also clear that new technology has been the
leading cause of many people interacting on social media
platforms while also resulting in lawmakers trying to come up
with better policies and procedures to be used in the
administration of public safety. At the same time, those that are
tasked with policymaking have always argued that the
administration should always be in line with the duty to protect
the privacy and access, information, and data from various
individuals. In that regard, this paper has managed to analyze
the issue of social media usage as it affects the administration
of public safety at all times.
References
Baym, N. (2015). Social Media and the Struggle for Society.
Social media + society, 1(1), 205630511558047.
http://dx.doi.org/10.1177/2056305115580477
Beckett, J. (2018). Five significant issues in public law and
public administration. Handbook of Public Administration, 697-
719. https://doi.org/10.4324/9781315093215-18
Boyd, d. (2015). Social Media: A Phenomenon to be Analyzed.
Social media + society, 1(1), 205630511558014.
http://dx.doi.org/10.1177/2056305115580148
Burton, G. (2010). Media and Society. Maidenhead: Open
16. University Press.
Gintova, M. (2018). Use of social media in Canadian public
administration: Opportunities and barriers. Canadian Public
Administration, 62(1), 7-26. https://doi.org/10.1111/capa.12298
Wohn, D., & Bowe, B. (2016). Micro Agenda Setters: The
Effect of Social Media on Young Adults' Exposure to and
Attitude Toward News. Social media + society, 2(1),
205630511562675.
http://dx.doi.org/10.1177/2056305115626750