Justice and Change in A Global World 

Shared Responsibility for The Common Good

The challenge that had been highlighted under assignment 2, is the risk of maintaining the cyber securities nowadays since the cyber hacks have got increased at a higher amount. Some of the cyber security principles have got highlighted, however, the concept of common good got neglected concerning the human dignity (Katharine, 2020). Common good states that every individual should be having sufficient accessibility to goods and resources based on which they can lead their life happily ever after. In this context, the human dignity highlights the individual rights on the personal possessions where the community resources need to be balanced well with the needs of disadvantaged and the dispossessed so that the common good can get enhanced (Mariarosaria, 2019).

However, in the modern era, the common good is getting neglected with the enhancement of digital technologies. It has been critically analyzed by some of the researchers, that the cyber security should be made a public good where the cost of the public good should be shared equally among all the relevant stakeholders within the society that is the problem that needs to be shared by everyone (Richard, 2020). The cost in the contest of standards as well as the verification of the procedures should be equally distributed among the public which is getting avoided daily. Hence it can be stated that the fostering of active collaboration and participation is getting highly neglected.

In the digital era, the cybersecurity is not becoming the systematic approach and this is the reason, it is avoiding the fact “common good” and the human dignity where the focus on the interdependencies between the individuals is ultimately getting neglected (Richard, 2020). The information-sharing regarding the cybersecurity vulnerabilities among the individuals is getting avoided and this is the reason, the capacity building initiatives, as well as the procedures, are getting delayed. All the individuals in the society are committed to securing the digital transformation through which the society will be getting prospered and along with this, the overall societies' securities will also be improved at the time of maintenance of the stabilities by focusing on the public interest (caritas.org, 2020).

Proposing Ways to Addressing the Challenges

According to Catholic social teaching, in this context, every human being has created himself an image of the God and it is their right to be getting served in a better way. The ways that could be proposed in order to address the problem on common good is to teach all the individuals to participate in the decision making process with the help of which they can lead their life happily (i-scoop, 2019). The common good can be reached only when the individuals will work together and at the same time should plan for some cyber security technologies based on which the wellbeing of the people can get readily achieved and at the same time there should also be an active involvement of certain resources, planning and actions across the agencies and the organizations for the mass betterment.

There should be present certain economic justices and the well-framed demographic structure based on which the human dignity within the society can get secured (Mariarosaria, 2019). Here it is the responsibility of different organizations in Australia to frame certain programs through which the development of the entire individual can be achieved through the enhancement in the community wellbeing. Based on this, after the safeguarding of the life of the individual, the peacefulness among the individuals can get equally promoted through which the people freedom and justice will get protected.

Based on the economic theory, the cyber security needs to be treated as the public good which is both non-rivalries and non-exclusive by nature (Katharine, 2020). The security information needs to be equally distributed among the common people, so that none of them can get affected and can acquire the goodness. The different techniques as being highlighted in the other assignment that is the different cyber security software’s and at the same time certain intrusion-detection systems needs to be purchased and also need to be bought and sold among the private sector actors (caritas.org, 2020).

The nature of the cyber-security needs to be consistent with certain macro-economic understanding so that the system related vulnerabilities and the threats can be avoided. The self-regulations by the individuals turns out to be important where the policy on “net neutrality” can be easily followed and also can be well discussed. It is basically of the interest of the society to foster their creation along with the distribution, otherwise, there will exist certain policy dissonance (i-scoop, 2019). Hence the information sharing needed to be transferred to the private sector through which the principal barriers between the individuals can be minimized.

This will ultimately help in enhanced information sharing. Again, in every community, there need to be effective engagements between the governmental as well as non-governmental organizations in the context of rights and ethics related to cyber security. Again the network of researchers along with the policymakers and the interested practitioners needed to be developed in the area of ethics and rights so that the further debates in the research areas can gets controlled (Katharine, 2020).

There are certain principles on cyber security like govern, protect, detect, and respond. Here the risks needs to be identified and managed by the concerned individuals where they should implement certain security controls so that the security risks can get reduced. Again responding means the individuals that are the common people for their betterment and goodness should design and deploy as well as managing the availability of the requirements s that the attack surface can be reduced and at the same time also can be configured well.

In this section, the incorporation of the maturity model turns out to be effective and important where the deliberate focus of the individuals will be on the optimization and also on the continual improvement so that the secured principles can be well maintained throughout the community for the betterment of the common people (Paul, 2019). In the context of the medical guidance’s, some of the development of the cyber-security technologies are n process where it will be the responsibility for the society as a whole to make an identification of certain medical devices through the cyber security maturity assessment based on which the areas of improvement can be well prioritized and based on this, the lifestyle security of the individuals can also get enhanced well.

This way the functional safety, as well as the safety-related risks, can easily be tackled through which the assessment schemes can be easily stipulated through which the collaborative journey can be recognized properly. The training programs also need to be developed through which the stronger culture on cyber-security can be getting developed so that certain applications and the operating systems need to be ensured well (Mariarosaria, 2019).

References for Global Issue in the context of Cyber-Security

caritas.org, 2020. Our values: Catholic Social Teaching. [Online]
Available at: https://www.caritas.org.au/about/catholic-social-teaching-values
[Accessed 2020].

cyber.gov, 2019. Cyber Security Principles. [Online]
Available at: https://www.cyber.gov.au/ism/cyber-security-principles
[Accessed 2020].

i-scoop, 2019. The ethics of data: care, respect and human dignity in the digital age. [Online]
Available at: https://www.i-scoop.eu/the-ethics-of-data-human-truths-and-dignity-in-the-digital-age/
[Accessed 2020].

Katharine, M., 2020. ‘Neglected’ democracy vulnerable to authoritarian rule in era of disinformation, Labor’s Tim Watts says. [Online]
Available at: https://www.theguardian.com/australia-news/2020/feb/28/neglected-democracy-vulnerable-to-authoritarian-rule-in-era-of-disinformation-labors-tim-watts-says
[Accessed 2020].

Mariarosaria, T., 2019. We must treat cybersecurity as a public good. Here's why. [Online]
Available at: https://www.weforum.org/agenda/2019/08/we-must-treat-cybersecurity-like-public-good/
[Accessed 2020].

Paul, R., 2019. Cybersecurity and Public goods. [Online]
Available at: https://www.hoover.org/sites/default/files/research/docs/emergingthreats_rosenzweig.pdf
[Accessed 2020].

Richard, P., 2020. Cybersecurity of medical devices.

Ukri, 2020. The Common Good: Ethics and Rights in Cyber Security [ERCS]. [Online]
Available at: https://gtr.ukri.org/projects?ref=ES%2FL013177%2F1
[Accessed 2020].

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Computer Science Assignment Help

Get It Done! Today

Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
Not Specific >5000
  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts

Highlights

  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free
  • Let's Start

Get
500 Words Free
on your assignment today

Browse across 1 Million Assignment Samples for Free

Explore MASS
Order Now

Request Callback

Tap to ChatGet instant assignment help

Get 500 Words FREE
Ask your Question
Need Assistance on your
existing assignment order?