Page Count
Cover Page
Body (8 pages)
References Page
Paper Sections
Introduction
Engage readers and tell them what the paper is about.
Part 1: Ethical/Legal Issues and Challanges
From your perspective what are the major ethical and legal challenges and risks for abuse that we must keep top of mind in the collection, management, and use of information and technologies overall—and in the public arena specifically?
Suggest guidelines to help you prevent unethical uses of data in general and especially in the public sector.
Part 2: Technology-related Threats and Challenges, e.g., Cybersecurity
Briefly describe the major technology-related threats, risks, and challenges to protecting data—and even our infrastructure and security. What are the major threats and risks? Several are listed above.
The “dark web” is big business.
What is the “dark web”?
What threats does it pose to your personal/family use and/or your organization’s use of technology and information?
How will you minimize the risks you discussed above? E.g., what are some best/next cybersecurity practices for protecting information and technology assets? If you recommend more training do you think ‘sit and git’ training works? How should training be developed and delivered so genuine learning and application will occur? How are you helping your family and colleagues minimize risks and threats?
Part 3: Biblical Principles
What are some biblical principles that can help inform and shape your collection, management, and use of information and technologies?
Make this knowledge personal and actionable–How will you help those around you:
Prevent the misuse or abuse of information an
Wisely use information and technology for the benefits of all?
Part 4: Summary
What are the key takeaways of importance or value to you?
LINKS:
https://www.foxnews.com/us/top-five-cybercrimes-watch-out-for-2023
https://www.zdnet.com/article/university-of-california-sf-pays-ransomware-hackers-1-14-million-to-salvage-research/
https://www.freep.com/story/news/education/2020/10/12/hackers-targeting-local-school-districts-walled-lake/5965647002/
https://www.idtheftcenter.org/post/how-identity-thieves-use-social-engineering/
https://www.csoonline.com/article/3648530/ddos-attacks-definition-examples-and-techniques.html
https://www.trendmicro.com/vinfo/us/security/definition/spear-phishing
https://www.gallup.com/workplace/352949/employee-engagement-holds-steady-first-half-2021.aspx
https://www.latimes.com/world-nation/story/2021-12-23/iran-israel-hacking-heightens-fears-cyberwar