1
3
Thesis Identification
FirstName MiddleInitial(s) LastName
Institutional Affiliation (Department Institution)
Course Number and Name
Instructor Name and Title
Assignment Due Date
Issue
One issue that has led to the prevalence of cybercrimes is disunity when handling these issues. For example, while the private sector has a more robust cybersecurity system, the public cybersecurity system is weaker. The imbalance in the public sector’s initiatives to handle cyber threats and crimes has increased, with Generation Z being the target audience. Therefore, the study addresses whether integrating public and private cyber security measures and initiatives can change narratives by limiting cyber threats targeting Generation Z by strengthening public cybersecurity systems.
Position Statement
Integrating public and private cybersecurity systems provides opportunities for both sectors to understand the cyber threat or cybercrime patterns, hire the services of private cybersecurity firms, and ensure the initiative is up to date with the present technology critical in addressing diverse objectives.
First Point
Integrating public and private cybersecurity systems creates room to understand the gap between the two and why one is more highly targeted than the other, therefore, implementing reluctant innovation to design the best possible system to protect both sectors (Maffey et al., 2015).
Second Point
Integrating public and private cybersecurity will perfectly address the different technology user objectives while securing the systems. Some goals entail social use, instrumental use, and information use (Hulur & Macdonald, 2020).
Third Point
Using private cybersecurity initiatives is critical in gathering information across different industries. It is beneficial in collecting data concerning Generation Z’s internet use and why they are vulnerable and easily attacked by hackers (Beaulieu & Bentahar, 2021).
Thesis
Integrating public and private cybersecurity initiatives should be permitted because it offers a higher chance of protecting Generation Z, also known as the Internet emotional users, from cyber threats and cybercrimes through promoting reluctant innovation, addressing user objectives, and gathering information to understand internet use patterns by the population best.
References
Beaulieu, M., & Bentahar, O. (2021). Digitalization of the healthcare supply chain: A roadmap to generate benefits and effectively support healthcare delivery. Technological forecasting and social change, 167, 120717. DOI: 10.1016/j.techfore.2021.120717
Hulur, G., & Macdonald, B. (2020). Rethinking social relationships in old age: Digitalization and the social lives of older adults. American Psychologist, 75(4), 554. http://dx.doi.org.ezproxy.snhu.edu/10.1037/amp0000604
Maffey, G., Homans, H., Banks, K., & Arts, K. (2015). Digital technology and human development: A charter for nature conservation. Ambio 44 (Suppl. 4). doi: 10.1007/s13280-015-0703-3.