Select Page

apa 7
answer each post 
100-150 words per post 
min. 2 references
POST 1: Thomas M.
Topic 1:
Do you agree with the professor’s opinion? Is it possible to learn while multi-tasking? Why or why not?
I’m afraid I have to disagree with the professor’s opinion when it comes to multi-tasking in the ability to learn. When I first started in my career field, it was and very much still is a fast-moving position with multiple developments happening simultaneously. I have learned over the years that I can comprehend a new assignment while multi-tasking on other time-sensitive projects. This ability has helped me immensely while attending school and completing coursework while traveling for my profession.
Topic 2:
How have technological developments in radio, television, the Internet, OR newspaper (SELECT ONE) influenced mass communication? Support your response.
I feel that the internet developments have positively and negatively influenced miscommunication amongst the world. Many governmental agencies use numerous Internet platforms to cut down their time to inform citizens about ongoing matters and developing incidents. Nevertheless, the widespread use of the internet has made it easier to influence individuals negatively and spread harmful ideologies that can potentially harm communities.
Topic 3:
Which ONE of the eight “hopeful” theses do you see as the most hopeful? Explain your choice.
I decided to select number two for this question as my “hopeful theses.” Having many friends and prior colleagues stationed around the world, I feel that a more connected globe will enhance relationships and minimize discourse. At the same time, it will also aid many nations in building friendships and collaborating together to create a better world for all.

POST 2: Sarah Y.
Topic #1: Digital Media
Do you agree with the professor’s opinion? Is it possible to learn while multi-tasking? Why or why not? Yes, I agree with the professor’s statement, and I don’t believe it is possible to learn while multi-tasking. As the Distracted by Everything video stated, the people who think they are the best at multitasking are the worst. (Dretzin and Rushkoff, 2010) The brain can only focus on one thing at a time, and when you introduce multiple topics at once, I don’t see how each topic can get the attention it needs. If you are looking at a text while listening to a teacher talk, you are going to miss information the teacher might say in those few seconds. Then you have to regroup and get caught up with what the teacher said.
Topic #2: Digital Media’s Impact on Society
How have technological developments in radio, television, the Internet, OR newspaper (SELECT ONE) influenced mass communication? Support your response.
Technological developments in radio have influenced mass communication because the radio started to contact ships out at sea, and people could contact the military in real-time. It wasn’t till the 1920s that the radio was in homes for private use, and people would listen to it for world news. (Wood) Radio is one mass media that started out spreading information and is used for entertainment. The downside is that it is a one-way medium, so there is no person-to-person communication, so you are taking in the ideas of whoever is running that station. Now the radio is everywhere and has transformed into podcasts. Today, there are millions of podcasts, and people use these podcasts to get their ideas out to the masses with the same passion.
Topic #3: Digital Future
Which ONE of the eight “hopeful” theses do you see as the most hopeful? Explain your choice.
The “hopeful” theses I see as most hopeful is #4 Augmented reality, and wearable devices will be implemented to monitor and give quick feedback on daily life, especially tied to personal health. (Anderson and Rainie, 2010) I see these wearable devices being hopeful because most people do not see a doctor regularly, and wearing one of these devices to monitor health could detect any diseases or medical issues before they become deadly. These devices could also let you know if you need a specific medication to lower your blood pressure or monitor diabetes.

POST 3: Molly H.
Topic 1
I agree with Professor Turkle’s assessment as distractions in multi-tasking cause a lack of retention when presented with important information. While it is possible to learn and understand basic concepts or ideas, it does not create an ideal learning environment to master those concepts and stifles analytical reasoning needed to dive deeper. Overactive brain activity and multi-tasking can affect productivity in both the short and long term.

Topic 2
With the advent of online journalism, newspapers have shifted to maintain a dual audience of old and new readership with the release of articles in both print and online form. These technological developments have sped up the news cycle allowing for quicker digestion of information and faster output online. With this, journalistic styles themselves have evolved into more compact and personal writing styles. This runs parallel to the journalistic code. Newspaper editors and journalists across the board still maintain a level of integrity with factual, evidence-based stories and reliable sources.

Topic 3
I see “the spread of the Internet will enhance global connectivity that fosters more planetary relationships and less ignorance,” as most helpful as it will create global empathy. Being able to experience another culture through technology can aid in emotional intelligence, breaking down harmful stereotypes and allowing the sharing of cultures in an environment where all parties feel safe and connected. What was once a foreign idea can become the norm through information sharing.

· COMBINE ALL TOPICS FROM EACH POST AND RESPOND WITH 1 PARAGRAPH.
· USE AS A REFERENCE FOR RESPONSES:
Dretzin, R., & Rushcoff, D. (2020, February 2). Digital nation. Frontline: PBS. https://www.pbs.org/wgbh/frontline/film/digitalnation/

POST 1: Jennifer W.
1. Explain the incident response cycle? Compare and contrast its various phases? Do you think any one of the phases is more important than the others? Why or why not?
The NIST incident response cycle is how an IT/Cybersecurity professional responds to an incident that affects the security which is broken down into four phases (CITE). The first phase is preparation which includes training and providing the tools should a security incident occur (Atlassian, 2022). The second phase is detection and analysis, according to NIST, this is the most challenging phase because the detection and assessment may not always be accurate (Atlassian, 2022). The third phase is Containment, Eradication, and Recovery, which helps maintaining the service while also eliminating the threat and ensuring that the impact of the incident is minor (Atlassian, 2022). Lastly, the fourth phase is post-event activity, and in this phase, IT professionals learn what they can do to mitigate these risks from occurring again and figuring out ways to improve for future security incidents (Atlassian, 2022). I think the most important is phase 1: preparation. Ensuring that the organization is equipped to handle security incidents is important. Understanding that no company is invincible is important to ensure that there are safeguards in place in order to ensure that the risk is lowered. It coincides well with phase 4 because after mitigating the incident, there are learning opportunities to see what worked and what did not. This can help ensure that for future incidents, there is a better plan in place to help “lessen the blow.” It can also help staff become more alert to stop the incident before it gets worse. Being prepared is important and ensuring that the proper training and tools are in place are vital to guaranteeing that information is safeguarded. However, all the phases are important and play an important part of the incident response cycle.
2. The second key finding detailed in the 2015 US State of Cybercrime Survey was, “Many leaders underestimate their cyber-adversaries’ capabilities and the strategic financial, reputational, and regulatory risks they pose.” How can this possibly still be the case in this day and age, where the information resources available to leaders are so varied and thorough? What do you think is the cause of this unfortunate underestimation? And, more importantly, what types of things would you recommend to a leader in your organization to help correct this deficiency, and why?
According to the 2015 US State of Cybercrime Survey, chief security officers make a security presentation to the board once a year (PwC, 2015). With multiple other tasks, they believe that the security personnel have it under control. Leaders may not know the severity because they do not have the information needed. While leaders can request this information, many do not and do not have it presented to them anyway. I think regularly sharing this information to understand the risks is important for leaders to correct this deficiency. Whether it is done via a weekly report or a meeting (virtual or in-person), it is important to disseminate the information in order to see how these risks can be mitigated.

POST 2: Calvin K.
1. Explain the incident response cycle? Compare and contrast its various phases? Do you think any one of the phases is more important than the others? Why or why not?
The incident response cycle is a type of procedure or protocol which occurs or rather happens right after a security breach or attack has happened, it is what you could say the details or report after the attack where you are figuring out what just happened and what are we going to do to either neutralize the threat entirely or someone managed to minimize the data which has been compromised, being that if we can limit the damage which has been done we can further find a faster solution to the problem. Normally, every department or company has a set group of individuals who are assigned to handle these things being the subject matter expert to deal with these issues and to ensure they get resolved to prevent the loss or compromise of vital information. In the phases, we have 1. which is the planning portion, this is where the team prepares for the attack to come, taking a “defensive fighting position” where they get to try and understand the attacking which is occurring and repel back. 2. we have the resist, which means what it should be. The group defends and resists any attacks which come their way, using the latest up-to-date technology and systems, they block and defend against malware and possibly viruses. 3. is detect, as you can only do some much in a cyberattack, which does not mean you should not take the precaution of scanning your hardware and ensuring everything is safe whether that is after an attack, before, or even whenever needed. Lastly, we have 4. which is respond, if a breach is discovered or has occurred already, the main purpose is to eliminate the threat entirely and recover, finding out what happened, what could be done better, the holes in security, and what was learned. No, I don’t think any of the phases are all equally important as they overlap one another in some type of way but that does not mean they are not as vitally important to one another less or more.
2. The second key finding detailed in the 2015 US State of Cybercrime Survey was, “Many leaders underestimate their cyber adversaries’ capabilities and the strategic financial, reputational, and regulatory risks they pose.” How can this possibly still be the case in this day and age, where the information resources available to leaders are so varied and thorough? What do you think is the cause of this unfortunate underestimation? And, more importantly, what types of things would you recommend to a leader in your organization to help correct this deficiency, and why?
There is a generational gap between today’s leaders and as they continue to progress in age their understanding of whats current could drastically change in a minute as technology is always advancing both physically and digitally in the cyber network making it difficult to keep up to date with everything happening. We know and understand how vast the digital sector is being a hard place to monitor and maintain as hostile adversaries are always attempting to attack and find loopholes within the system, launching continuous attacks which can get progressively worst and worst. Despite information being readily available, varied, and thorough does not mean there will always be solutions within the knowledge that is given. I feel as if the cause for the underestimation comes from the lack of knowledge, preparation, and being complacent, we undermined the credibility of our adversaries which causes us to let our guard down for unknown attacks to happen on our systems. I would recommend quarterly training, up-to-date qualifications, and no notice evaluations which puts those who are in charge of our systems in an area of constant readiness and preparedness for anything.