The Cyber-Industrial Complex

1378 Words 6 Pages
This book can be analyzed using a number of sociological techniques. The material the authors discuss is about the social interaction of humans in cyberspace. Therefore this material can be discussed using a variety of sociological concepts. Some concepts that can be used are Conflict Theory, Functionalist Theory, power and authority, social norms, social movements, culture, ethnocentrism, social deviance and symbols. Max Weber’s idea of legitimatized power can be used to analyze this text. Weber believes that there are three types of authority, traditional authority, charismatic authority and rational-legal authority. Rational-legal authority is legal power enforced by bureaucracy and government. The concept of rational-legal authority …show more content…
These companies assess the risk of a corporation being targeted by a hacker and provide tools for cyber defense. Two fairly large cybersecurity companies have recently merged, Context Relevant and Good Harbor, to provide more services to companies at risk. This merge is discussed by Bioterrorism Week, the FBI is quoted saying “Cyber criminals have stolen hundreds of billions of dollars worth of personal, business-sensitive, and financial information, largely from the private sector" (4). This is why the Cyber-Industrial Complex is so …show more content…
Those who are pushed to commit illegal activity online may be experiencing hardship. Why would someone endanger themselves to pursue internet hacking of credit card company servers? Potentially because they lack a stable income. Why do countries attack others in cyberspace? Maybe because that is the only way to challenge a superior enemy. The growing global inequality symbolizes growing global inequality. The symbolic interaction theory explains that people’s behavior and image represent things in society. For example, people know that smoking cigars is a bad habit, but people do it anyway, because it symbolizes sophistication. Behavior online is effected by this, which is also why human users are seen as weak links online. Cavelty says …”that too much focus on the state and national security tends to crowd out consideration for the individual citizen, with often detrimental effects for security overall” (707). Humans tend to make errors, downloading viruses and endangering entire online

Related Documents

Related Topics