3. PRESIDENT BARACK OBAMA
After the reelection of President Barack Obama, the U.S congress rejected
a cyber security bill that would allow for the monitoring and cyber
protection of our newly created critical infrastructure.
President Obama bypass the senate’s ruling and pass the policy without
their final approval.
4. WHAT IS CYBER SECURITY?
According to the text, cyber security is “the security of the nation’s
computer and telecommunications infrastructure as well as the data
stored within the computers from outside attack” (Dhillon, 2013)
5. THE CIRCUITS OF POWER-CHEGG
The circuits of power theory was created by Chegg to contextualize
power, the government, and politics in the United States
“The circuits of power…explains power relationships independent of the
particular circumstances of organizations or their structure” (Dhillon,
2013)
In this case study, the evolution of the cyber security policy will be
evaluated by Subramanian using the circuits of power theory
8. EPISODIE POWER
The episodie level of power can be defined as the common or “day to
day interactions, work, and outcomes” within an agency or
organization or more plainly put the superior and the inferior
In reference to the cyber security policy, the creation of the Department of
Homeland Security was implemented to expand the federal
government and to protect the nation’s most critical instruction after
9/11. This creation added more agencies giving more individuals
power thus, creating more problems and issues with funding,
appointments, and the passing of new laws and policies
9.
10. SOCIAL INTEGRATION
“Social integration looks at how social structures affect power
relationships” (Dhillon, 2013)
The implementation of the Homeland Security Act created a heighten
sense of attention towards the cyber protection of the U.S’s cyber
structure. This attention was a new sense of patriotism which was the
result of the 9/11 attacks
Americans and lawmakers started to take a more conscious look into
policies and laws pertaining to Homeland Security and cyber
protection
11.
12. SYSTEM INTEGRATION
“The power relationships facilitate within the system and what the
consequences are from resistance” (Dhillon, 2013)
In short, system integration is the policing of the cyber community and all
those who are apart of this community.
System integration creates the rules and boundaries that are needed to
insure all Americans are following the law when using a cyber entity.