Digital technology has impacted life in various ways. Maybe those who are the inhabitants of the Antarctica could make a case against being influenced by the technological advancements or even worry about digital technology and how lives have been impacted by the changes in the digital technology especially the changes that have been realized in the 21st century. However as depicted in Joel Brenner’s book entitled the America the Vulnerable, the ideas expressed in this book is definitely worth reading. In this well researched and addressed book, Joel addresses various issues of cyberspace as a way of getting exposed to various threats while providing various benefits to the community. The risks go beyond just the personal level to the communal transition and social cues. However, according to Brenner says that meeting these challenges by the United States and the approach taken will go a long way to help establishing the fundamental security and the progress of the United States.
The same philosophy that applies in this case applies to that used at the point of sale service. In this case the installed system transmits whatever an individual buys at whatever store, stores the data that is aggregated and behavior patterns identified hence the information used in the analysis of the demands of the customers and the entrepreneurs with the data especially the government and the public institutions. This has been found to reduce the market unnecessary expenses and use the information to provide the criminal investigation department. Through the electronic data captured, the government agencies and other interested parties are capable of using the information to track various issues that affect the society in an attempt to make life more fulfilling and complete.
Cyberspace stores all the personal and most private information thereby evading the essence of privacy. For instance, private information such as drivers’ licenses, phone numbers and other social security information are all retrievable in the cyberspace. Mr. Surveillance states in his book that few of the individuals are often willing to give up the information that is more compatible with the electronic data. This information is often demanded by the cyberspace and it’s often irresistible not to offer that information as requested. That therefore means that each and everyone understand the importance of offering the information to the required authority and to be softly monitored by these authorities. He uses ambient electronic data often to express the cyberspace. This includes providing personal needs details in terms of the geographical location especially for those who are in need of advertising their personal stuff or require customers from a diverse background. This therefore allows the consumers to interact and make transactions without having to pay for the extra employees to do the location analysis for a feasible business deals and other related information. However, when such like improvements are made to ensure the exchange of valuables, the attention of criminals are drawn and brought to the table hence calling for the protection of this individual information.
However, despite the disadvantages associated with cyber crime, there are vulnerable part of the network system to the user that according to Brenner is that as users download software that are purposefully designed to share large files over the internet opens a wide avenue to computer network that if unless configured, can result to huge cyber crime as a large cyber space is opened to allow cyber threats, a situation that most computer uses can never know of its occurrence unless let privy to the information. Mr. Brenner believes that the security required in the cyber space never works if only left in the hands of the users. It is only possible to ensure the security works if it’s only built into the system meaning the security or a secure system is useful in reducing the users that the ability to download and also install any form of standard software in a business government and network.
In certain part of the book, Mr. Benner discusses the threats the country is exposed to as a result of the cyber insecurity. He uses the case study of the activities carried out by hackers especially in China. He however, makes it open that he threat is not only specific to China but also other countries such as Russia and other parts of the world. Hackers often engage in a major economic surveillance with the aim of ensuring high technology with various applications in the private and foreign economic intelligence relevant for both the private and public sectors especially maintenance of these defense areas.
In the book, he points out to the fact that China has been the major economic power for over the last centuries at least in eighteen instances with the aim of establishing their path in the international line up. This is the situation with China right now as the regional super power especially in the Eastern Asia. Therefore as Brenner identifies, cyberspace has proven to represent more new opportunities for the Chinese government to involve in various competition without the use of military assault just by planting inappropriate device otherwise identified as a malware in various strategic infrastructure of its threat or competing countries like the United States. Thus when the mastery of the cyber warfare is enhanced, it provides the competitive advantage to China as they have mastered the cyber warfare techniques therefore can use their technology to be technologically independent from to other super giants like United States.
While concluding, Brenner uses a well through recommendation on the best ways to improve the cyber security issues in either private or public domain but he insists on the establishment of regulatory standards that hinders the connectivity of the electrical power systems to have the internet searching capability. He also focuses on the control training operations that he believes offers the best strategy to current cyber crime issues
Cornelius, N., Todres, M., Janjuha-jivraj, S., Woods, A., & Wallace, J. (2008). Corporate Social Responsibility and the Social Enterprise. Journal of Business Ethics, 355-370.
Đorđević, D. (2008). The role of corporate social responsibility in contemporary business. scientific review article, 151-165.
Ferrel, F. F. (2010). Business ethics: ethical decisions making and cases. South Western: Cengage Learning.
Ness, M. R. (1992). Corporate social responsibility. British Food journal, 123-34.
Rodrigues, M. C. (2006). Corporate Social Responsibility and Resource-Based Perspectives. Journal of Business Ethics, 111-132.
Shareholder value or social responsiblity: What should motivate today's CEO? (2007). Strategic Direction, 15-18.
Weinstein, A., & Johnson, W. (1999). Designing and Delivering Superior Customer Value: Concepts, Cases, and Applications. Miami, FL: CRC Press.