{"id":128,"date":"2012-02-24T16:52:34","date_gmt":"2012-02-24T16:52:34","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=128"},"modified":"2012-02-24T16:52:34","modified_gmt":"2012-02-24T16:52:34","slug":"cyberwar-is-it-happening-now-part-2","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2012\/02\/24\/cyberwar-is-it-happening-now-part-2\/","title":{"rendered":"Cyberwar &#8211; Is it Happening Now? &#8211; Part 2"},"content":{"rendered":"<p>Cyberwar as a term, concept, and action isn&#8217;t going away.\u00a0 We are stuck with it.\u00a0 The challenge is how do we define it?\u00a0\u00a0 Whether or not we&#8217;re even in a Cyberwar now is entirely open to opinion and personal biases.\u00a0<\/p>\n<p>It makes for a great debate, which is what happened last Wednesday, February 22nd at Bellevue University.\u00a0 That afternoon, Dr. Matt Crosston and I debated this topic in front of a full audience of students, professors, and other\u00a0interested parties.\u00a0 We addressed the problem with definitions and perceptional bias.\u00a0 Our goal was to get participant thinking about the real issues, so we can begin to develop real solutions.<\/p>\n<p>You can see the seminar\/webinar\/debate yourself at <a href=\"http:\/\/bellevuena6.adobeconnect.com\/p3tko7z33g0\/\" target=\"_blank\">http:\/\/bellevuena6.adobeconnect.com\/p3tko7z33g0\/<\/a>.<br \/>\nAfter you watch it, please feel free to comment with your ideas or opinions on cyberwar. Is it really happening now?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberwar as a term, concept, and action isn&#8217;t going away.\u00a0 We are stuck with it.\u00a0 The challenge is how do we define it?\u00a0\u00a0 Whether or not we&#8217;re even in a Cyberwar now is entirely open to opinion and personal biases.\u00a0 It makes for a great debate, which is what happened last Wednesday, February 22nd at [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-128","post","type-post","status-publish","format-standard","hentry","category-cyberwar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=128"}],"version-history":[{"count":3,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/128\/revisions"}],"predecessor-version":[{"id":132,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/128\/revisions\/132"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}