Technology

Public/Private Data Sharing to Improve Cybersecurity

Introduction

Today, in the era of digital and internet-based transactions, cybersecurity is of special concern for individuals and businesses. The goal of the United States National Cyber Security Strategy is to safeguard and fortify the digital systems of the nation from malicious cyber activities (Hofmanová, 2019). The paper analyses the social aspects of the policy discussing about its background and consequences for society, including the role of cultural traditions, youth culture, and other subcultures. This perspective is grounded in the academic journals that are dedicated to the scope topic, which covers the intersection of cybersecurity and societal issues.

Social Factors Behind the Policy Development

The National Cybersecurity Strategy for the United States has been greatly impacted by the growing dependence of society on digital technologies and the subsequent increase in cybersecurity threats. With digital platforms being essential to economic, social, and political activities, more vulnerabilities have risen which makes cyber threats a chief national security concern (Hofmanová, 2019). The Policy was a result of the increasing data breaches, the cases of identity theft, and the disruption of vital infrastructures that put the public at risk and threatened the nation’s economic stability. As Horgan (2019) indicated, the proliferation of digital technology in everyday life has raised cybersecurity from a niche concern of IT systems to a social concern.

Social Effects of the Policy

Implementation of the cybersecurity strategy may bring about several social effects. The first is the issue of individual privacy. Although the policy increases the level of security, it triggers worries about government surveillance and the possibility of abuses. The strategy’s emphasis on sharing information among federal agencies can be a source of conflict with the public’s right to privacy (Lyon, 2014). This tension highlights a critical social dilemma: finding the balance between national security needs and respect for privacy rights.

Moreover, the policy has an impact on the issue of social equality. Access to safe and reliable digital infrastructure is not spread out similarly. While the authorities are looking to secure critical infrastructure and corporate businesses, marginalized groups could be left behind and so, the cyber divide is brought upon them. Additionally, cyber-attacks in less protected areas can boost the existing social gaps as these areas are more prone to cyberattacks, which can lead to economic and social instability in the communities (Bada & Nurse, 2020).

Cultural and Subcultural Influences on the Policy

Cultural and subcultural values play a great role in the shaping of cybersecurity policy. In the U.S., as well as many other countries, individualism, and privacy are cherished to the point that the collective needs of national security are sometimes disregarded. This cultural trait distinguishes public attitudes and policy talks about cybersecurity, especially concerning personal data and government tracking (Hofmanová, 2019).

The cybersecurity community itself is subculturally founded on technical mastery, innovation, and the proactive management of threats. The way of life of the community underpins the building of cybersecurity policies, with the emphasis mostly on the need for more stringent security measures and advanced technologies to combat cyber threats (Agrafiotis et al., 2018).

Conclusion

The US National Cybersecurity Strategy is a central part of the country’s security infrastructure, and it has wide social implications. It was an answer to the integration of digital technology into daily life and the subsequent increase in the level of cybersecurity threats. The policy certainly has amazing consequences, especially in privacy and social equality. The strategy is also influenced by both big cultural values and subcultural norms within cybersecurity. Delving these social dynamics is fundamental to the evolution of the policy to better comply with the security and human rights of the nation.

References

Agrafiotis, I., Nurse, J. R., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity4(1), tyy006.

Bada, M., & Nurse, J. R. (2020). The social and psychological impact of cyberattacks. In Emerging cyber threats and cognitive vulnerabilities (pp. 73-92). Academic Press.

Hofmanová, L. (2019). Cyber Security in the United States of America: Assessing the Role of the Department of Homeland Security.

Horgan, S. L. (2019). Cybercrime and everyday life: exploring public sensibilities towards the digital dimensions of crime and disorder.

Lyon, D. (2014). Surveillance, Snowden, and big data: Capacities, consequences, critique. Big data & society1(2), 2053951714541861.

Cite This Work

To export a reference to this article please select a referencing stye below:

SEARCH

WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE

Capstone Project of Tesla

Q. Identify the company’s critical value-creating activities. Tesla manufactures automobiles along with the software that runs on unique hardware. So that Tesla can update the

Read More »
Pop-up Message