“It happens every day. Debra, a junior at a prestigious Ivy League university, needs better grades. She downloads and submits someone else’s research.
Frank, a respected business man, plugs a pen drive into his work laptop. Within seconds he’s viewing inappropriate material and downloading copyrighted movies.
April and Sara, two twelve-year-old girls from Kansas are pretending to be twenty-something “valley girls.” They think they are chatting with the interesting nineteen-year-old hunk from Oregon in the picture. In reality, their online friend is a forty-three-year-old man who lives nearby.
Abigail, a lonely mom, desperately misses her traveling husband. After stumbling across an old boyfriend online, her catching-up has become frequent flirting.
What do all these people have in common? Each started in one part of cyberspace and ended up in another. Their online activities began with good intentions, but somehow things went astray. All of them underestimate their predicament. One by one, each will face serious consequences.
Scenes like these are repeated millions of times each day around the world. How did they get to that point? What are the long-term impacts?
Are you next?”
The above quote is taken from the opening chapter of my first book: Virtual Integrity: Faithfully Navigating the Brave New Web — published by Bravos Press (Baker Publishing House) in November 2008. This blog takes a look back over the past decade-plus, including more recent online developments regarding trust, integrity and personal online life.
Developing Ideas for ‘Virtual Integrity’ Book
Back in 2004-2005, while running Michigan government’s enterprise cybersecurity program as the first CISO in the state, I started to see unnerving trends in cyberspace that went well beyond stopping identity theft, data breaches or other cybercrimes that were the main focus of my day job. Indeed, these headline problems were actually masking other (Read more...)
*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: http://www.govtech.com/blogs/lohrmann-on-cybersecurity/another-look-at-virtual-integrity.html

