SlideShare ist ein Scribd-Unternehmen logo
1 von 14
PRESIDENT BARACK OBAMA
After the reelection of President Barack Obama, the U.S congress rejected
a cyber security bill that would allow for the monitoring and cyber
protection of our newly created critical infrastructure.
President Obama bypass the senate’s ruling and pass the policy without
their final approval.
WHAT IS CYBER SECURITY?
According to the text, cyber security is “the security of the nation’s
computer and telecommunications infrastructure as well as the data
stored within the computers from outside attack” (Dhillon, 2013)
THE CIRCUITS OF POWER-CHEGG
The circuits of power theory was created by Chegg to contextualize
power, the government, and politics in the United States
“The circuits of power…explains power relationships independent of the
particular circumstances of organizations or their structure” (Dhillon,
2013)
In this case study, the evolution of the cyber security policy will be
evaluated by Subramanian using the circuits of power theory
CIRCUITS OF POWER- CHEGG
Episodie
Social
integration
System
integration
EPISODIE POWER
The episodie level of power can be defined as the common or “day to
day interactions, work, and outcomes” within an agency or
organization or more plainly put the superior and the inferior
In reference to the cyber security policy, the creation of the Department of
Homeland Security was implemented to expand the federal
government and to protect the nation’s most critical instruction after
9/11. This creation added more agencies giving more individuals
power thus, creating more problems and issues with funding,
appointments, and the passing of new laws and policies
SOCIAL INTEGRATION
“Social integration looks at how social structures affect power
relationships” (Dhillon, 2013)
The implementation of the Homeland Security Act created a heighten
sense of attention towards the cyber protection of the U.S’s cyber
structure. This attention was a new sense of patriotism which was the
result of the 9/11 attacks
Americans and lawmakers started to take a more conscious look into
policies and laws pertaining to Homeland Security and cyber
protection
SYSTEM INTEGRATION
“The power relationships facilitate within the system and what the
consequences are from resistance” (Dhillon, 2013)
In short, system integration is the policing of the cyber community and all
those who are apart of this community.
System integration creates the rules and boundaries that are needed to
insure all Americans are following the law when using a cyber entity.
REFERENCES
Dhillon, G. (2013). Enterprise Cyber Security: Principles and Practice.
Washington, DC: Paradigm Books.
QUESTION
Do you believe that the changes that have occurred have helped or
hindered our nation and its usage of the cyber realm?

Weitere ähnliche Inhalte

Andere mochten auch

Norman critical thinking 1
Norman critical thinking 1 Norman critical thinking 1
Norman critical thinking 1 qnorman
 
KEWIRAUSAHAAN MATERI
KEWIRAUSAHAAN MATERIKEWIRAUSAHAAN MATERI
KEWIRAUSAHAAN MATERILinquini_
 
Library research pbnp-parti_fall_2013
Library research pbnp-parti_fall_2013Library research pbnp-parti_fall_2013
Library research pbnp-parti_fall_2013Jody_Nelson
 
SUMSUM TULANG (PART03)
SUMSUM TULANG (PART03)SUMSUM TULANG (PART03)
SUMSUM TULANG (PART03)Linquini_
 
Fall 2013 psychiatric_nursing_45min
Fall 2013 psychiatric_nursing_45minFall 2013 psychiatric_nursing_45min
Fall 2013 psychiatric_nursing_45minJody_Nelson
 
Critical thinking 2
Critical thinking 2Critical thinking 2
Critical thinking 2qnorman
 
Critical Thinking 4
Critical Thinking 4Critical Thinking 4
Critical Thinking 4qnorman
 
KEWIRAUSAHAAN KONLIK INTERPERSONAL
KEWIRAUSAHAAN KONLIK INTERPERSONALKEWIRAUSAHAAN KONLIK INTERPERSONAL
KEWIRAUSAHAAN KONLIK INTERPERSONALLinquini_
 
BORAX DAN SULFAT
BORAX DAN SULFATBORAX DAN SULFAT
BORAX DAN SULFATLinquini_
 
SUMSUM TULANG (PART02)
SUMSUM TULANG (PART02)SUMSUM TULANG (PART02)
SUMSUM TULANG (PART02)Linquini_
 
SUMSUM TULANG (PART01)
SUMSUM TULANG (PART01)SUMSUM TULANG (PART01)
SUMSUM TULANG (PART01)Linquini_
 
Model View Presenter
Model View Presenter Model View Presenter
Model View Presenter rendra toro
 
Resep jadi rockstar developer
Resep jadi rockstar developerResep jadi rockstar developer
Resep jadi rockstar developerrendra toro
 
PT. SINAR SOSRO
PT. SINAR SOSROPT. SINAR SOSRO
PT. SINAR SOSROLinquini_
 
Andrew - Job scheduler
Andrew - Job schedulerAndrew - Job scheduler
Andrew - Job schedulerrendra toro
 
Android - Model Architecture
Android - Model ArchitectureAndroid - Model Architecture
Android - Model Architecturerendra toro
 
HEMATOLOGI DASAR
HEMATOLOGI DASARHEMATOLOGI DASAR
HEMATOLOGI DASARLinquini_
 

Andere mochten auch (19)

Norman critical thinking 1
Norman critical thinking 1 Norman critical thinking 1
Norman critical thinking 1
 
Ci/CD Android
Ci/CD AndroidCi/CD Android
Ci/CD Android
 
KEWIRAUSAHAAN MATERI
KEWIRAUSAHAAN MATERIKEWIRAUSAHAAN MATERI
KEWIRAUSAHAAN MATERI
 
Library research pbnp-parti_fall_2013
Library research pbnp-parti_fall_2013Library research pbnp-parti_fall_2013
Library research pbnp-parti_fall_2013
 
SUMSUM TULANG (PART03)
SUMSUM TULANG (PART03)SUMSUM TULANG (PART03)
SUMSUM TULANG (PART03)
 
Fall 2013 psychiatric_nursing_45min
Fall 2013 psychiatric_nursing_45minFall 2013 psychiatric_nursing_45min
Fall 2013 psychiatric_nursing_45min
 
Critical thinking 2
Critical thinking 2Critical thinking 2
Critical thinking 2
 
JoinMe TechTalk
JoinMe TechTalkJoinMe TechTalk
JoinMe TechTalk
 
Critical Thinking 4
Critical Thinking 4Critical Thinking 4
Critical Thinking 4
 
KEWIRAUSAHAAN KONLIK INTERPERSONAL
KEWIRAUSAHAAN KONLIK INTERPERSONALKEWIRAUSAHAAN KONLIK INTERPERSONAL
KEWIRAUSAHAAN KONLIK INTERPERSONAL
 
BORAX DAN SULFAT
BORAX DAN SULFATBORAX DAN SULFAT
BORAX DAN SULFAT
 
SUMSUM TULANG (PART02)
SUMSUM TULANG (PART02)SUMSUM TULANG (PART02)
SUMSUM TULANG (PART02)
 
SUMSUM TULANG (PART01)
SUMSUM TULANG (PART01)SUMSUM TULANG (PART01)
SUMSUM TULANG (PART01)
 
Model View Presenter
Model View Presenter Model View Presenter
Model View Presenter
 
Resep jadi rockstar developer
Resep jadi rockstar developerResep jadi rockstar developer
Resep jadi rockstar developer
 
PT. SINAR SOSRO
PT. SINAR SOSROPT. SINAR SOSRO
PT. SINAR SOSRO
 
Andrew - Job scheduler
Andrew - Job schedulerAndrew - Job scheduler
Andrew - Job scheduler
 
Android - Model Architecture
Android - Model ArchitectureAndroid - Model Architecture
Android - Model Architecture
 
HEMATOLOGI DASAR
HEMATOLOGI DASARHEMATOLOGI DASAR
HEMATOLOGI DASAR
 

Ähnlich wie Critical thinking 3

Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docxArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docxrossskuddershamus
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internetjohn.niemela
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Final Paper Draft Outline – Week 7 For the second to last.docx
Final Paper Draft Outline – Week 7  For the second to last.docxFinal Paper Draft Outline – Week 7  For the second to last.docx
Final Paper Draft Outline – Week 7 For the second to last.docxcharlottej5
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docxgertrudebellgrove
 
Cybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideCybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideBenjamin Tugendstein
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALLouise Collins
 
Street Level Bureaucrats Essay
Street Level Bureaucrats EssayStreet Level Bureaucrats Essay
Street Level Bureaucrats EssayRobin Anderson
 
Required Clinton , L (2011). Industry- Government Partnership.docx
Required Clinton , L (2011). Industry- Government Partnership.docxRequired Clinton , L (2011). Industry- Government Partnership.docx
Required Clinton , L (2011). Industry- Government Partnership.docxpearlenehodge
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportLandon Harrell
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityFOTIOS ZYGOULIS
 
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...James Creamer III
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasioniosrjce
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 
250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docx250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docxvickeryr87
 

Ähnlich wie Critical thinking 3 (20)

Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docxArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Final Paper Draft Outline – Week 7 For the second to last.docx
Final Paper Draft Outline – Week 7  For the second to last.docxFinal Paper Draft Outline – Week 7  For the second to last.docx
Final Paper Draft Outline – Week 7 For the second to last.docx
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
 
Cybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideCybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection Guide
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
Street Level Bureaucrats Essay
Street Level Bureaucrats EssayStreet Level Bureaucrats Essay
Street Level Bureaucrats Essay
 
Required Clinton , L (2011). Industry- Government Partnership.docx
Required Clinton , L (2011). Industry- Government Partnership.docxRequired Clinton , L (2011). Industry- Government Partnership.docx
Required Clinton , L (2011). Industry- Government Partnership.docx
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final Report
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
 
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...
Capstone Final Draft Rev 2 - The Cyber-Security Dilemma_ The ’Cyber-Army’ Bui...
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasion
 
E017242431
E017242431E017242431
E017242431
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docx250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docx
 

Kürzlich hochgeladen

Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 

Kürzlich hochgeladen (13)

Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 

Critical thinking 3

  • 1.
  • 2.
  • 3. PRESIDENT BARACK OBAMA After the reelection of President Barack Obama, the U.S congress rejected a cyber security bill that would allow for the monitoring and cyber protection of our newly created critical infrastructure. President Obama bypass the senate’s ruling and pass the policy without their final approval.
  • 4. WHAT IS CYBER SECURITY? According to the text, cyber security is “the security of the nation’s computer and telecommunications infrastructure as well as the data stored within the computers from outside attack” (Dhillon, 2013)
  • 5. THE CIRCUITS OF POWER-CHEGG The circuits of power theory was created by Chegg to contextualize power, the government, and politics in the United States “The circuits of power…explains power relationships independent of the particular circumstances of organizations or their structure” (Dhillon, 2013) In this case study, the evolution of the cyber security policy will be evaluated by Subramanian using the circuits of power theory
  • 6. CIRCUITS OF POWER- CHEGG Episodie Social integration System integration
  • 7.
  • 8. EPISODIE POWER The episodie level of power can be defined as the common or “day to day interactions, work, and outcomes” within an agency or organization or more plainly put the superior and the inferior In reference to the cyber security policy, the creation of the Department of Homeland Security was implemented to expand the federal government and to protect the nation’s most critical instruction after 9/11. This creation added more agencies giving more individuals power thus, creating more problems and issues with funding, appointments, and the passing of new laws and policies
  • 9.
  • 10. SOCIAL INTEGRATION “Social integration looks at how social structures affect power relationships” (Dhillon, 2013) The implementation of the Homeland Security Act created a heighten sense of attention towards the cyber protection of the U.S’s cyber structure. This attention was a new sense of patriotism which was the result of the 9/11 attacks Americans and lawmakers started to take a more conscious look into policies and laws pertaining to Homeland Security and cyber protection
  • 11.
  • 12. SYSTEM INTEGRATION “The power relationships facilitate within the system and what the consequences are from resistance” (Dhillon, 2013) In short, system integration is the policing of the cyber community and all those who are apart of this community. System integration creates the rules and boundaries that are needed to insure all Americans are following the law when using a cyber entity.
  • 13. REFERENCES Dhillon, G. (2013). Enterprise Cyber Security: Principles and Practice. Washington, DC: Paradigm Books.
  • 14. QUESTION Do you believe that the changes that have occurred have helped or hindered our nation and its usage of the cyber realm?