Power is often granted rather than generated. In other words, it derives from the consensual approval of others. The dilemma lies in whether to use the power conferred to the organization. If power is not utilized when it should be, it leads to neglect and a breach of trust. Conversely, if it is used when it should not be, it constitutes interference and violence. So, how do we distinguish between these situations? It should be exercised decisively when disagreements need resolution, when injustice or crime is anticipated or has occurred, or when harm is expected to be, or has been, inflicted on someone. In these instances, the use of power must be accompanied by accountability. Power should be deployed only if no one else is accountable for the choices and decisions made. Otherwise, it is better left to the organization’s discretion. Consequently, power, leadership, and benefits are healthy only when proportional to the level of responsibility. - Joseph’s “just my thoughts”
For the security of the Internet service, we have been asked by the Internet service companies to set the password combined by more than 8 or 10 "uppercase letter+lowercase letter+number+special character". But it was obviously of no use. This security guideline was recommended by Bill Burr who worked at NIST in the USA, he suggested this way in his report. Furthermore, the user was required to change the initial password set regularly. Despite this measure, the best way of security to protect users' accounts was the notification of the alarm for attempted hacking when the hacker tried. We have only tried to change the keys despite the simple method meanwhile. Today, the world has begun to comprehend that the security problem is not encryption or confidentiality, but simply cyber-dominion control and communication. - Joseph's "just my thoughts"