Verified Document

Benefits President Obama's Cybersecurity Internet Policy Essay

¶ … President Obama's Cybersecurity and Internet Policy In the recent past, cyber attacks have become commonplace in the U.S. And also in other parts of the world. The said attacks are also increasingly becoming sophisticated. In that regard, there exists an urgent need to rein in this problem before it gets out of hand. In this text, I discuss the benefits of President Obama's Cybersecurity and Internet Policy.

President Obama's Cybersecurity and Internet Policy: Key Benefits

As reported on the White House website, "Americans deserve an internet that is safe and secure, so that they can shop, bank, communicate, and learn online without fear that their accounts will be hacked or their identity stolen" (White House, 2013). With this in mind, the President has been very supportive of initiatives and measures that support a free and secure internet. Indeed, President Obama has in the past identified cyber threat as being amongst the most serious challenges (from an economic and national security perspective) the country faces today (White House,...

Parts of this document are hidden

View Full Document
svg-one

As the White House further points out, the president is of the opinion that going forward; the economic prosperity of this great country will be largely hinged on Cybersecurity.
Some of the initiatives that have been embraced in an attempt to guarantee the safety and openness of the internet as well as the privacy of data include but they are not limited to the International Strategy for Cyberspace and the National Strategy for Trusted Identities in Cyberspace (NSTIC). To begin with, it is important to note that the number of people using the internet to bank and do shopping has in the recent past increased exponentially. In that regard, there exists a need to protect the privacy of such users. According to Schmidt (2011), the measures organizations take to safeguard the privacy of individuals vary significantly. In his own words, Schmidt (2011) points out that "to bring clarity and transparency to these practices, NSTIC seeks to establish clear privacy rules based upon the Fair Information Practice Principles (FIPPs) that address the responsibilities of…

Sources used in this document:
References

Bayuk, J., Healey, J., Rohmeyer, P., Sachs, M.H., Schmidt, J. And Weiss, J. (2012). Cyber Security Policy Guidebook. Hoboken, NJ: John Wiley & Sons, Inc.

Schmidt, H.A. (2011, April 26). The National Strategy for Trusted Identities in Cyberspace and Your Privacy. Retrieved February 6, 2013, from the White House website: http://www.whitehouse.gov/blog/2011/04/26/national-strategy-trusted-identities-cyberspace-and-your-privacy

The White House (2013). Technology. Retrieved February 6, 2013, from the White House website: http://www.whitehouse.gov/issues/technology
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Film Fred Ott Was the
Words: 1898 Length: 6 Document Type: Essay

Technology in Film Fred Ott was the very first movie star that every existed. His brief starring role in the five-second film that showed him sneezing started the use of technology to make films. Since then, technology both in and out of film has changed immeasurably and what technology is used and is said about technology in these same films has evolved quite a lot and the statements sometimes made are

Technology Proposal Social Networking and
Words: 1070 Length: 4 Document Type: Term Paper

Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Technology for Students With Disabilities
Words: 3214 Length: 11 Document Type: Research Paper

These benefits arise because of implementing both assistive technologies and Information Communication technology (ICT). The implementation of technology in classrooms usually has benefits to both the disabled students as well as the teachers (Kirk, Gallagher, Coleman, & Anastasiow, 2012, p.240). The general benefits of use of assistive technologies and ICT in teaching students with learning disabilities include greater learner autonomy and unlocking hidden potential with those with communication difficulties.

Technology in the Workplace the
Words: 2715 Length: 9 Document Type: Research Paper

Instead, organizations must strike a balance between the autonomy and independence offered by technology in the workplace and the need for employees to have some level of formal and informal commitment to the organization as a whole. Just as seemingly counterproductive activities such as doodling, daydreaming, or, in the information age, surfing the internet, can actually contribute to efficiency by offering employees productive mental stimulation, so too can the

Technology in the Classroom in Today's Society,
Words: 3260 Length: 10 Document Type: Research Paper

Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now