{"id":106633,"date":"2022-11-24T06:45:56","date_gmt":"2022-11-24T06:45:56","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2022\/11\/24\/1-3-thesis-identification-firstname-middleinitials-lastname-institutional-affiliation-department-institution-course\/"},"modified":"2022-11-24T06:45:56","modified_gmt":"2022-11-24T06:45:56","slug":"1-3-thesis-identification-firstname-middleinitials-lastname-institutional-affiliation-department-institution-course","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2022\/11\/24\/1-3-thesis-identification-firstname-middleinitials-lastname-institutional-affiliation-department-institution-course\/","title":{"rendered":"1 3 Thesis Identification FirstName MiddleInitial(s) LastName Institutional Affiliation (Department Institution) Course"},"content":{"rendered":"<p>1<\/p>\n<p> 3<\/p>\n<p> Thesis Identification <\/p>\n<p> FirstName MiddleInitial(s) LastName<br \/> Institutional Affiliation (Department Institution)<br \/> Course Number and Name<br \/> Instructor Name and Title<br \/> Assignment Due Date<\/p>\n<p> Issue<\/p>\n<p> One issue that has led to the prevalence of cybercrimes is disunity when handling these issues. For example, while the private sector has a more robust cybersecurity system, the public cybersecurity system is weaker. The imbalance in the public sector&#8217;s initiatives to handle cyber threats and crimes has increased, with Generation Z being the target audience. Therefore, the study addresses whether integrating public and private cyber security measures and initiatives can change narratives by limiting cyber threats targeting Generation Z by strengthening public cybersecurity systems.<\/p>\n<p> Position Statement<\/p>\n<p> Integrating public and private cybersecurity systems provides opportunities for both sectors to understand the cyber threat or cybercrime patterns, hire the services of private cybersecurity firms, and ensure the initiative is up to date with the present technology critical in addressing diverse objectives. <\/p>\n<p> First Point<\/p>\n<p> Integrating public and private cybersecurity systems creates room to understand the gap between the two and why one is more highly targeted than the other, therefore, implementing reluctant innovation to design the best possible system to protect both sectors (Maffey et al., 2015). <\/p>\n<p> Second Point<\/p>\n<p> Integrating public and private cybersecurity will perfectly address the different technology user objectives while securing the systems. Some goals entail social use, instrumental use, and information use (Hulur &amp; Macdonald, 2020).<\/p>\n<p> Third Point<\/p>\n<p> Using private cybersecurity initiatives is critical in gathering information across different industries. It is beneficial in collecting data concerning Generation Z&#8217;s internet use and why they are vulnerable and easily attacked by hackers (Beaulieu &amp; Bentahar, 2021).<\/p>\n<p> Thesis<\/p>\n<p> Integrating public and private cybersecurity initiatives should be permitted because it offers a higher chance of protecting Generation Z, also known as the Internet emotional users, from cyber threats and cybercrimes through promoting reluctant innovation, addressing user objectives, and gathering information to understand internet use patterns by the population best. <\/p>\n<p> References<\/p>\n<p> Beaulieu, M., &amp; Bentahar, O. (2021). Digitalization of the healthcare supply chain: A roadmap to generate benefits and effectively support healthcare delivery.\u00a0Technological forecasting and social change,\u00a0167, 120717. DOI: 10.1016\/j.techfore.2021.120717<\/p>\n<p> Hulur, G., &amp; Macdonald, B. (2020). Rethinking social relationships in old age: Digitalization and the social lives of older adults.\u00a0American Psychologist,\u00a075(4), 554. http:\/\/dx.doi.org.ezproxy.snhu.edu\/10.1037\/amp0000604\u00a0<\/p>\n<p> Maffey, G., Homans, H., Banks, K., &amp; Arts, K. (2015). Digital technology and human development: A charter for nature conservation. Ambio 44 (Suppl. 4). doi: 10.1007\/s13280-015-0703-3.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 3 Thesis Identification FirstName MiddleInitial(s) LastName Institutional Affiliation (Department Institution) Course Number and Name Instructor Name and Title Assignment Due Date Issue One issue that has led to the prevalence of cybercrimes is disunity when handling these issues. For example, while the private sector has a more robust cybersecurity system, the public cybersecurity system [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10],"class_list":["post-106633","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-writing"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/106633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=106633"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/106633\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=106633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=106633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=106633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}