{"id":101,"date":"2022-11-13T16:40:29","date_gmt":"2022-11-13T21:40:29","guid":{"rendered":"https:\/\/blogs.shu.edu\/policy-government-security\/?page_id=101"},"modified":"2022-11-17T10:11:00","modified_gmt":"2022-11-17T15:11:00","slug":"scenarios-signals-strategies","status":"publish","type":"page","link":"https:\/\/blogs.shu.edu\/policy-government-security\/scenarios-signals-strategies\/","title":{"rendered":"Scenarios, Signals &amp; Strategies"},"content":{"rendered":"<p><strong><em><u>Scenarios<\/u><\/em><\/strong><\/p>\n<ol>\n<li><strong>Probable:<\/strong>\n<ol>\n<li>Antitrust: New association ethics codes and legislation designed to specifically target anticompetitive behavior. Analytical analysis for the amount of data collected and what will be regarded as too much.<\/li>\n<li>Cybersecurity\/Cyber Warfare: Sanctions are put into place and the Banking System becomes a target. The market for data security will also increase.<\/li>\n<li>Political Radicalization: Election denial regarding the 2024 election will occur.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Plausible:<\/strong>\n<ol>\n<li>Antitrust: Cloud neutrality will occur, as will new anti-competitive organizations working at the state level (specifically those that monitor larger companies and their \u201cmergers and acquisitions\u201d activity), and Culture Capture will grow in usage.<\/li>\n<li>Cybersecurity\/Cyber Warfare: AI, cloud, robots, and drones will be used more, leading cybercrimes to skyrocket in the coming years. National cyber defenses will also increase.<\/li>\n<li>Political Radicalization: Civil War is plausible, more non-for-profit organizations will exist that adapt to emerging issues faster, and digital ID will gain greater usage.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Possible:<\/strong>\n<ol>\n<li>Antitrust: It\u2019s possible that the market will be data driven, and new systems that monitor anti-competitive behavior will exist. Larger-scale mergers and acquisitions will occur as data privacy becomes more vital.<\/li>\n<li>Cybersecurity\/Cyber Warfare: New security algorithms will be created and larger scale data attacks with the potential for the supply chain to suffer will occur, as will international conflicts stemming from cyber-attacks.<\/li>\n<li>Political Radicalization: The electoral process changes, and insider threat programs and income inequality grow.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><img decoding=\"async\" src=\"https:\/\/articulate-heroes-authoring.s3.amazonaws.com\/rapid-elearning-blog\/0415\/branched-scenario.jpg\" alt=\"How to Build Better Interactive Scenarios for E-Learning | The Rapid E-Learning Blog\" \/><\/p>\n<p><strong><em><u>Signals<\/u><\/em><\/strong><\/p>\n<ol>\n<li><strong>Antitrust:<\/strong>\n<ol>\n<li>Increased focus on Private Equity in Health Care. Pharmaceuticals, agriculture, health care and finance, have hurt consumers and workers and stunted economic growth.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Cybersecurity\/Cyber Warfare:<\/strong>\n<ol>\n<li>More Education on STEM and careers in cybersecurity. Financial, political and military gains. Hybrid warfare. Cybercrime facilities. Rich get richer and poor get poorer.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Political Radicalization:<\/strong>\n<ol>\n<li>Tensions with the 2020 election (January 6<sup>th<\/sup> insurrection). Spread of misinformation following various elections. Secretive actions and increased levels of anger amongst politicians and voters.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.akamai.steamstatic.com\/steam\/apps\/1661180\/header.jpg?t=1654425723\" alt=\"Signals on Steam\" \/><\/p>\n<p><strong><em><u>Strategies<\/u><\/em><\/strong><\/p>\n<ol>\n<li><strong>Antitrust:<\/strong>\n<ol>\n<li>Lobbying for antitrust legislation<\/li>\n<li>Educate the youth on the potential of data and instruct business students on how to avoid anticompetitive behavior.<\/li>\n<\/ol>\n<\/li>\n<li><strong>Cybersecurity\/Cyber Warfare:<\/strong>\n<ol>\n<li>Implement cyber security learning in K-12<\/li>\n<li>Develop cyber warfare capabilities<\/li>\n<li>Develop contingency plans for companies and government facilities<\/li>\n<\/ol>\n<\/li>\n<li><strong>Political Radicalization<\/strong>\n<ol>\n<li>Push risk-factors include emotional vulnerability such as anger, alienation, and disenfranchisement.<\/li>\n<li>Individuals could be pushed into radicalization by their perception of the failure of all nonviolent alternatives, including political participation, civil society action, peaceful protest etc.<\/li>\n<li>Have a better system for fact checking. Analyze social media data and have an AI analyze for certain keywords and dangerous media.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><img decoding=\"async\" src=\"https:\/\/culturesconnection.com\/wp-content\/uploads\/2020\/09\/4-Advanced-Marketing-Strategies-Used-by-Experts-Today.jpeg\" alt=\"4 Advanced Marketing Strategies Used by Experts Today\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scenarios Probable: Antitrust: New association ethics codes and legislation designed to specifically target anticompetitive behavior. Analytical analysis for the amount of data collected and what&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/blogs.shu.edu\/policy-government-security\/scenarios-signals-strategies\/\">Continue Reading<span class=\"screen-reader-text\">Scenarios, Signals &amp; Strategies<\/span><\/a><\/div>\n","protected":false},"author":5455,"featured_media":0,"parent":0,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[],"tags":[],"class_list":["post-101","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/users\/5455"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/comments?post=101"}],"version-history":[{"count":5,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/101\/revisions"}],"predecessor-version":[{"id":135,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/101\/revisions\/135"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/media?parent=101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/categories?post=101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/tags?post=101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}