Human factors and cyber policy

Topics: Security, Warez, Copyright infringement Pages: 8 (4860 words) Published: October 14, 2014

TA#2 Human Factors and Cyber Policy 
CSEC 620
April 27,2013

Table of Content
IntroductionCopyright, threats and ownership of intellectual property -Important Security Issues
-Recommended Policy Controls
-How/Why Human Factors Influence Policy
Meta-Data collected and used by the Private sector and Public sector -Important Security Issues
-Recommended Policy Controls
-How/Why Human Factors Influence Policy
Zero Day Exploits employed for economic or military advantage -Important Security Issues
-Recommended Policy Controls
-How/Why Human Factors Influence Policy
Vulnerability assessments for Mobile Devices in the BYOD environment -Important Security Issues
-Recommended Policy Controls
-How/Why Human Factors Influence Policy

Human factors can influence policy choices for both domestic and international cybersecurity issues.  What will be discussed in this paper is how human factors can affect four selected cybersecurity issues.  The four-cybersecurity issues selected are zero-day exploits, meta-data collected and used by private and public sectors, vulnerability assessments for mobile devices in the BYOD environment, and threats to copy right and ownership of intellectual property.  This paper will go into details on important security issues, recommended policy controls, and how or why human factors can influence each of the recommended policy controls for each of the four selected topics mentioned.   Copyright, threats and ownership of intellectual property

Important Security Issues
With the proliferation of 3-D Printers and the availability of copyrighted materials posted online, there is an additional facet to the current debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs. There are six ways that intellectual property theft harms U.S. and global consumers and economies. Online piracy harms content as well as the trademark owners through lost sales and brand recognition through increased costs to protect intellectual property instead of investing in research and development (Growth of Internet Piracy, 2011). Secondly, the consumers are harmed when they receive lower quality, inauthentic products that may cause physical harm in the case of downloading and creating a 3-D printed model (Growth of Internet Piracy, 2011). Arguably the most prominent case against piracy, copyright infringement harms economies through lost tax revenues, higher costs of law enforcements and additional harm caused by the government’s usage of counterfeit products (Growth of Internet Piracy, 2011). This leads to the fourth issue, global economies lose their ability to partner with countries that have weaker intellectual property enforcement (Growth of Internet Piracy, 2011). Online copyright infringement reduces innovation due to the decrease of incentives to create and disseminate ideas – harming the First Amendment (Growth of Internet Piracy, 2011). Finally, supporting online piracy has been linked to supporting international crime syndicates posing a risk to U.S. national security (Growth of Internet Piracy, 2011). Recommended Policy Controls

There is no set of policy controls that would be a one-size fits all when it comes to ownership of intellectual property concerning digital media or 3-D printing. The issue with copyright infringement concerning home 3-D printing boils down to the law. If a personal user directly prints a copyrighted 3-D model from a file-sharing site, then that user has committed a crime. The copyright owner should be compensated; a simple analogy is paying iTunes to be able to play a song from an artist. However, if the user is inspired to create a very similar model than the copyright owner is not subject to compensation because a style cannot be copyrighted (Thompson, 2013). The first 3-D DMCA’s...

Cited: 4. ”A clear-eyed guide to Android 's actual security risks." InfoWorld. N.p., n.d. Web. 27 Apr. 2014. <>.
5. Graf, O. P. (2013, April 12). The Physical Security of Cyber Security. Retrieved from
7. History of the Internet Piracy Debate. (2011). Congressional Digest, 90(9), 258-288.
8. NILL, A., SCHIBROWSKY, J., & PELTIER, J. W. (2010). Factors That Influence Software Piracy: A View from Germany.Communications Of The ACM, 53(6), 131-134. doi:10.1145/1743546.1743581
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • cyber crime Essay
  • Essay on Dehydration in Human Factors
  • Essay on Human
  • Essay on cyber crime
  • Cyber Security Policy Essay
  • Redistan Cyber Attack Essay

Become a StudyMode Member

Sign Up - It's Free