Cyber Rebels Unite: Hacking Inequality To Spark A Digital Revolution

Sofia Perez

“We’re all just walking each other home.” -Ram Dass

(Scroll to the bottom for a glossary on some of the jargon used in this article)

Paduret, Dan Cristian. Pexels, www.pexels.com/photo/blue-and-yellow-phone-modules-1476321/. Accessed 4 May 2023.

I’ve come to the conclusion that there are two main reactions to words like “cyber”, “quantum”, and “AI”. Either these words make you shut down, overwhelmed by the fast-paced technological advancement overtaking the world, or they make you feel spunky and fresh, one with the cool kids of Silicon Valley. Along the spectrum that lies between these two responses are those of us who will throw words like “blockchain” and “quantum” into our sentences to sound more intelligent, those of us who stubbornly pretend to know how to fix wifi connection problems in front of partners or obnoxious siblings, and -of course- those of us who deflect our tech-related embarrassment with a condescending “okay boomer.

That said, human connection is a serious business, and by association, so is anything that interferes with it. Ever since homo sapiens first had the intellectual bandwidth to think at all, we’ve been pondering this question. In recent years, however, the matter of human connection has gotten a lot more tricky. Now, rather than show romantic interest in someone through merely buying them flowers or asking them out, you also need to comment on or at least like all their social media posts, and never leave them on read. If you’re thinking “Who cares? Why not just call?”, then you might be from the generation who acknowledges texts with an “OK.” rather than “okay” or “ok” and doesn’t even realize how passive aggressive it comes across. If that still isn’t you, it might be the case that you use excessive emojis without realizing their meaning- mostly the fruit and vegetable emojis, which should just be off-limits if you don’t know what they stand for. 

Yes, it might seem trivial when you think about tech in the context of how you text your grandparents or block ex-boyfriends, but the way we interact on digital spaces is a much larger consideration than you probably ever realized. In fact, in 2021 the World Economic Forum placed digital inequality, adverse tech advances, IT infrastructure breakdown and digital power concentration among the top global risks, alongside risks like infectious diseases, climate action failure, and biodiversity loss. Among the top 10 risks by likelihood were digital power concentration, digital inequality, and cybersecurity failure. 

World Economic Forum, www.weforum.org/agenda/2021/01/these-are-the-worlds-greatest-threats-2021/. Accessed 5 May 2023.

So yes, cybersecurity matters to you, particularly if you are a business-owner, policy-maker, banker, or, for that matter, anyone who depends on privacy and security online. In fact, according to IBM, the average cost of a data breach in 2020 was $3.86 USD million globally, and $8.64 USD million in the United States alone. This includes the cost of discovering and responding to the breach, the cost of “downtime and lost revenue”, and the “long-term reputational damage to a business and its brand”. 

“…according to IBM, the average cost of a data breach in 2020 was $3.86 USD million globally, and $8.64 USD million in the United States alone.”

Technology already advances at a high speed many of us struggle to keep up with, but the real cherry on top is that the emergence of the Quantum Computing age could throw into question our current methods of encryption, which many organizations rely on. This World Economic Forum post on quantum security even goes as far as to say this risk could prevent “technology’s true value from being realized” and that this issue requires immediate attention. 

That said, save the doom and gloom, because if we get cybersecurity right, it could strengthen cyber resilience in the power grid, preventing large-scale blackouts that can have severe socio-economic consequences for households, businesses, and schools. In fact, a six hour winter blackout in mainland France could result in damages totalling over 1.5 billion euros, which is equal to $1.7 USD billion. The healthcare industry would also benefit, as cyber attacks are sadly a very common occurrence. The most frequent of these are ransomware attacks on healthcare providers, in which hackers lock IT systems and demand payment to unlock them. According to a study by the World Economic Forum, 15% of ransomware attacks led to patients being redirected to other facilities, 30% caused appointment cancellations, and some services were disrupted for almost four months. Also according to the study, ransomware attacks on the sector occurred at a rate of four incidents per week in the first half of 2021. With a dizzying lack of public reporting, the article says this is only “the tip of the iceberg”. 

World Economic Forum, www.weforum.org/agenda/2021/01/these-are-the-worlds-greatest-threats-2021/. Accessed 5 May 2023.

Yikes! Are all our dystopian sci-fi nightmares coming true? Will Siri get revenge for all the times you asked her to beatbox? Alas, I don’t have the answers to this, but I would also say that to think about the future in such binary terms- pun intended- is a mistake. Since when do such big societal shifts ever bring pure good or pure evil? With every drawback is another added benefit to whatever advancement takes place. That said, just to be safe, be nice to Siri and ChatGPT

Speaking of being nice, cybersecurity also poses big questions about the essence of human connection, truth, power, and meaning. The work of Emmanuel Levinas, a 20th century philosopher who focused on the ethical dimension of human relationships, is particularly striking to me. According to him, human connection is not only a matter of social convention, but also makes an ethical demand. “The Other is the very idea of transcendence,” he writes in From Totality and Infinity. “Without the Other, I would not be a being, I would not be.” In meditating on these words, I am drawn to the link between Levinas’ idea of the Other as the “very idea of transcendence” and the attitude in Buddhism, Hinduism, Taoism, and Confucianism that the ego is a source of suffering- “a veil between humans and God” according to Rumi. To Levinas, however, this transcendence through encountering the Other is ethically profound. “The face is what forbids us to kill,” he states, the “face” encapsulating an overall presence. Still, it is haunting imagery if you only consider how connection on digital spaces masks the literal face of the Other. 

“Without the Other, I would not be a being, I would not be.”

Emmanuel levinas, From Form and totality

That said, if you find my philosophical musings pretentious, save the eye roll. Connection over digital spaces really is practically important. It even has a name: digital inequality. This is a phrase used to encompass the difficulty of making digital technology beneficial to all, and challenges us to address the social divisions which exist in our online spaces. Some examples are the differences in wifi bandwidth, awareness of how to avoid scams or unsafe websites, different behaviors toward online consumption, and varying degrees of exposure to different news outlets, social media content, and more. Experts divide current digital inequality into three categories: the universal access divide, the social divide, and the gender divide, with each one leading to an overall decrease in educational opportunities, healthcare access, and social support. Addressing these issues and leveling the online playing field could have surprising ramifications for those who experience exclusion online or obstacles in simply accessing digital technologies in the first place. So while digital inequality is tied more to the social side of online interactions, it is still a crucial component of our interactions with technology. 

Don’t just take my word for it! The value of human connection has been depicted all throughout psychology. In fact, a landmark survey in 1988, Social relationships and health by James S. House, Karl R. Landis, and Debra Umberson, provides strong empirical evidence which supports the view that social relationships impact on physical health. The paper consistently shows an increased risk of death for people with low quality or quantity of “social relationships”, reiterating the narrative of human connection’s importance to physical health. Ultimately, we all have a need to belong, even in an increasingly digitized world. 

“This is a world we can create if we take responsibility for the world we have created thus far.

Nevertheless, binging try-not-to-laugh cat videos on YouTube won’t kill you. In fact, the future of cybersecurity has much to be excited about, including the potential for passwords and cloud storage to be obsolete by 2031, but more importantly, for our digital spaces to promote environmental, social, and economic prosperity worldwide. Imagine a time when we don’t leave older generations behind with every new technological advance, a world where getting a world-class education is only as expensive as connecting to the wifi. Imagine a world where technological innovation mitigates climate change and fights back against the decline in biodiversity. This is a world we can create if we take responsibility for the world we have created thus far. 

Glossary

Word/PhraseWhat It Means
CybersecurityIBM defines cybersecurity- AKA information technology (IT) security- as “…the practice of protecting critical systems and sensitive information from digital attacks”. This includes all threats to networked systems and applications, from both inside and outside of the given organization. 
Digital InequalityRefers to the unequal distribution of access to and use of digital technologies and the internet. It means that certain groups or individuals may have limited or no access to digital technologies or the internet, while others have much greater access and opportunities to use them. 
Digital Power ConcentrationDigital power concentration refers to the concentration of power and control over the digital realm, including the internet, technology platforms, and data, in the hands of a small number of powerful entities, such as large corporations or governments.
Quantum SecurityQuantum security is a type of cybersecurity that uses the principles of quantum mechanics to protect sensitive information from being intercepted or tampered with by unauthorized users. In traditional cryptography, data is protected by mathematical algorithms that are extremely difficult to solve, but with the advent of powerful quantum computers, these algorithms may no longer be secure enough. Quantum security relies on the principles of quantum physics, which state that observing a system changes it, to ensure that any attempt to intercept or tamper with the information will be detectable. This makes it possible to create encryption methods that are theoretically unbreakable, even with the most powerful computers available.
Ransomware AttacksRansomware attacks are a type of cyber attack where the attacker encrypts a victim’s computer files, rendering them inaccessible, and demands payment in exchange for the decryption key to unlock them. In simpler terms, it’s like someone holding your computer files hostage and demanding money for their safe return. 
The Universal Access Divide (Re Digital Inequality)The universal access divide refers to the unequal distribution of access to digital technologies and the internet. It is the gap between those who have access to these tools and those who do not. This divide can be seen within countries, where certain groups or regions have better access to digital technologies than others, and between countries, where some countries have better access to digital technologies and the internet than others.
The Social Divide(Re Digital Inequality)The social divide in digital inequality refers to the unequal distribution of access to technology and digital resources based on social factors such as income, education, age, and location. 
The Gender Divide(Re Digital Inequality)The gender divide in digital inequality refers to the unequal access to digital technologies and the internet that affects women and girls around the world. This divide is due to a combination of economic, social, and cultural factors that create barriers for women and girls to access digital resources and participate in the digital economy. 
Digital LiteracyDigital literacy refers to the ability to use digital technologies effectively and efficiently in order to solve problems and achieve goals. It involves not just technical skills like using computers or mobile devices, but also a range of other skills, such as navigating the internet, evaluating the credibility of online sources, protecting personal information online, and using digital tools for communication and collaboration. 

Thought to Action

  1. Use strong privacy settings on online profiles and accounts.
    1. Review the privacy settings for each social media platform or online account and adjust them to your preferences.
    2. Limit the amount of personal information that you share online, such as your full name, date of birth, address, and phone number.
    3. Control who can view your profile, posts, and photos by adjusting your privacy settings accordingly.
    4. Avoid sharing sensitive information, such as your Social Security number, financial information, or passwords, online.
    5. Be selective about who you add as a friend or follower on social media platforms and avoid accepting friend requests from strangers.
    6. Turn off location services or geotagging features that share your location with others.
    7. Use caution when posting photos or videos online, especially ones that reveal personal details or locations.
    8. Enable two-factor authentication or login alerts to receive notifications when someone tries to access your account.
      1. Two-factor authentication= a security feature which requires two different pieces of information to allow you access into an account. 
    9. Regularly review your privacy settings and adjust them as needed to ensure that you are comfortable with the information that you are sharing online.
  2. Use anti-virus software and a firewall on all devices.
    1. Some anti-virus software programs:
      1. Norton
      2. McAfee
      3. Avast
    2. To install anti-virus software, just download the software from the provider’s website and double-click the downloaded file to install. Follow the prompts to complete your installation. 
    3. Lots of devices come with built-in firewalls, so yours might already have one installed. That said, to install firewall software, simply go to the provider’s website, download the software, and double-click to install. Once installed, it should automatically start blocking unauthorized access to your device. 
    4. Watch this video on how to prevent cyber attacks. 
  3. Take advantage of free digital resources, such as online courses, eBooks, and podcasts. 
    1. Some great ebook resources:
      1. Project Gutenberg: A library of over 70,000 free ebooks
      2. Open Library: “…an open, editable library catalog, building towards a web page for every book ever published”
      3. Smashwords: Allows you to “browse nearly one million original ebooks, including approximately 100,000 priced every day at free”
    2. Awesome Podcasts:
      1. TED Talks
      2. Radiolab
      3. Freakonomics Radio
      4. Ologies
      5. Planet Money
    3. Free online educational resources:
      1. Khan Academy
      2. Coursera
      3. edX
  4. Seek out diverse perspectives and voices online to broaden understanding and awareness. 
    1. Use inclusive language that respects different identities and experiences. 
    2. Ask open-ended questions to encourage dialogue. 
    3. Avoid stereotypes.
    4. Be open to feedback. 
  5. Be open to adapting to and learning about new digital technologies and trends. 

Sources

You know what Edgar Allan Poe once said… “Believe nothing of what you hear and only half of what you see.”

He had nothing to say about what you read. 

Baumeister, R. F., and M. R. Leary. “The Need to Belong: Desire for Interpersonal Attachments as a Fundamental Human Motivation.” Psychological Bulletin, vol. 117, no. 3, 1 May 1995, pp. 497–529, pubmed.ncbi.nlm.nih.gov/7777651/. Accessed 4 May 2023.

Bergo, Bettina. “Emmanuel Levinas.” Stanford Encyclopedia of Philosophy, Metaphysics Research Lab, Stanford University, 2019, plato.stanford.edu/entries/levinas/#TimeTranSoci. Accessed 4 May 2023.

“Cybersecurity.” World Economic Forum, www.weforum.org/topics/cyber-security. Accessed 4 May 2023.

Daniel, Michael, and Colin Soutar. Systemic Cybersecurity Risk and Role of the Global Community: Managing the Unmanageable B R I E F I N G P a P E R N O v E M B E R 2 0 2 2. Nov. 2022.

Fleming, Sean. “These Are the World’s Greatest Threats in 2021.” World Economic Forum, 19 Jan. 2021, www.weforum.org/agenda/2021/01/these-are-the-worlds-greatest-threats-2021/. Accessed 5 May 2023.

Heeks, Richard. “Digital Inequality beyond the Digital Divide: Conceptualizing Adverse Digital Incorporation in the Global South.” Information Technology for Development, 7 July 2022, pp. 1–17, www.tandfonline.com/doi/full/10.1080/02681102.2022.2068492, https://doi.org/10.1080/02681102.2022.2068492. Accessed 5 May 2023.

House, James S. , et al. “Social Relationships and Health.” Science, vol. 241, no. 4865, 29 July 1988, www.science.org/doi/10.1126/science.3399889?url_ver=Z39.88-2003&rfr_id=ori:rid:crossref.org&rfr_dat=cr_pub%20%200pubmed. Accessed 4 May 2023.

“How to Prevent Cyber Attacks? Here Are 5 Tips.” World Economic Forum, www.weforum.org/videos/5-tips-to-avoid-cyberattacks. Accessed 4 May 2023.

Ngila, Faustine. “This New Cybersecurity Centre Will Help Protect African Countries from Cybercrime.” World Economic Forum, 24 Aug. 2022, www.weforum.org/agenda/2022/08/togos-new-cybersecurity-africa-nations/. Accessed 4 May 2023.

Office for National Statistics. “Exploring the UK’s Digital Divide – Office for National Statistics.” Ons.gov.uk, 2019, www.ons.gov.uk/peoplepopulationandcommunity/householdcharacteristics/homeinternetandsocialmediausage/articles/exploringtheuksdigitaldivide/2019-03-04#the-scale-of-digital-exclusion-in-the-uk. Accessed 4 May 2023.

Paduret, Dan Cristian. Pexels, www.pexels.com/photo/blue-and-yellow-phone-modules-1476321/. Accessed 4 May 2023.

Pixabay. Pexels, www.pexels.com/photo/abstract-beads-blur-bright-276218/. Accessed 4 May 2023.

“The Importance of Human Connection.” Worldcouncilforhealth.org, 2 Feb. 2022, worldcouncilforhealth.org/resources/human-connection/. Accessed 4 May 2023.

Wei, Shang-Jin. “How Can Digital Technology Tackle Inequality?” World Economic Forum, 12 Nov. 2019, www.weforum.org/agenda/2019/11/how-can-digital-technology-tackle-inequality/. Accessed 4 May 2023.

“What Makes Us Human? | Roy Baumeister | TEDxUQ.” Www.youtube.com, 26 Sept. 2017, www.youtube.com/watch?v=FwlDLe6O7NE. Accessed 4 May 2023.

World Economic Forum Annual Meeting. “Strengthening the Cyber Resilience of the Power Grid.” World Economic Forum, 15 Mar. 2023, www.weforum.org/impact/cybersecurity-in-electricity/. Accessed 4 May 2023.

World Economic Forum’s Centre for Cybersecurity. “Quantum Security.” World Economic Forum, www.weforum.org/projects/quantum-security. Accessed 4 May 2023.


Comments

30 responses to “Cyber Rebels Unite: Hacking Inequality To Spark A Digital Revolution”

  1. Alicia Alvarez-Gil Avatar
    Alicia Alvarez-Gil

    Thought provoking. Thank you

  2. Your website is an amazing source of information on related topics. Thank you for offering your expertise with the world.

  3. Maurice B. Avatar
    Maurice B.

    Your latest post on “Cyber Rebels” certainly hits on many of the issues we see in our personal and business environments. Great summary for discussion. Very accomplished web site!

  4. Greetings! Very helpful advice in this particular article! It is the little changes that will make the most significant changes. Thanks for sharing!

  5. I really like your writing style..Its so easily understandable. You can visit my blog at https://similar.my.id and then maybe you can share your thought about mine.

  6. Great ?V I should definitely pronounce, impressed with your site. I had no trouble navigating through all tabs and related info ended up being truly easy to do to access. I recently found what I hoped for before you know it at all. Quite unusual. Is likely to appreciate it for those who add forums or something, website theme . a tones way for your customer to communicate. Nice task..

  7. I’m a devoted follower of your blog.

  8. Outstanding post however , I was wanting to know if you could write a litte more on this subject? I’d be very grateful if you could elaborate a little bit more. Appreciate it!

  9. Real great information can be found on weblog.

  10. he blog was how do i say it… relevant, finally something that helped me. Thanks

  11. I’ve recently started a website, the info you provide on this website has helped me greatly. Thank you for all of your time & work.

  12. What Is Puravive? The Puravive weight loss aid is formulated using eight clinically proven natural ingredients.

  13. What is FlowForce Max? FlowForce Max Advanced Formula is a holistic blend designed to promote optimal prostate health

  14. Some truly interesting info , well written and generally user friendly.

  15. It’s really a nice and useful piece of information. I am glad that you shared this helpful info with us. Please keep us up to date like this. Thanks for sharing.

  16. I was recommended this blog by way of my cousin. I am no longer sure whether or not this put up is written through him as no one else know such distinctive about my difficulty. You’re wonderful! Thanks!

  17. Very interesting info !Perfect just what I was searching for!

  18. What Is Exactly ZenCortex? ZenCortex is an optimal hearing function support

  19. Hey just wanted to give you a quick heads up and let you know a few of the pictures aren’t loading properly. I’m not sure why but I think its a linking issue. I’ve tried it in two different internet browsers and both show the same results.

  20. Perfect piece of work you have done, this site is really cool with fantastic information.

  21. I am impressed with this internet site, really I am a big fan .

  22. My developer is trying to convince me to move to .net from PHP. I have always disliked the idea because of the costs. But he’s tryiong none the less. I’ve been using Movable-type on numerous websites for about a year and am nervous about switching to another platform. I have heard fantastic things about blogengine.net. Is there a way I can transfer all my wordpress posts into it? Any kind of help would be greatly appreciated!

  23. As I website possessor I believe the content material here is rattling fantastic , appreciate it for your hard work. You should keep it up forever! Best of luck.

  24. It’s actually a great and helpful piece of information. I am happy that you shared this useful information with us. Please stay us up to date like this. Thank you for sharing.

  25. What Is FitSpresso? The 100 natural formula is formulated using a potent blend of 6 ingredients

  26. Some genuinely good info , Sword lily I observed this.

  27. An interesting dialogue is worth comment. I believe that it’s best to write extra on this subject, it won’t be a taboo subject however usually people are not sufficient to speak on such topics. To the next. Cheers

  28. WONDERFUL Post.thanks for share..more wait .. …

  29. Definitely believe that which you said. Your favorite justification seemed to be on the internet the easiest thing to be aware of. I say to you, I certainly get annoyed while people think about worries that they just do not know about. You managed to hit the nail upon the top as well as defined out the whole thing without having side effect , people could take a signal. Will probably be back to get more. Thanks

Leave a Reply

Your email address will not be published. Required fields are marked *