Downloads: 119 | Views: 236
Research Paper | Information Technology | India | Volume 6 Issue 1, January 2017 | Popularity: 6.1 / 10
Information Security
Asif Husain
Abstract: According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of crypto-graphic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and better tools for system evaluation and assurance, the problems can be solved. In this note, we put forward a contrary view information insecurity is at least as much due to perverse incentives. Many of the problems can be explained more clearly and convincingly using the language of microeconomics network externalities, asymmetric information, moral hazard, adverse selection, liability dumping and the tragedy of the commons.
Keywords: INFORMATION SECURITY
Edition: Volume 6 Issue 1, January 2017
Pages: 2358 - 2361
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 356 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019
Pages: 64 - 69The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana
Abu Sulemana, Yahuza Abdul-Kadir
Downloads: 136
Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015
Pages: 24 - 27An Approach for Canny Edge Detection Algorithm on Face Recognition
A. D. Chitra, Dr. P. Ponmuthuramalingam
Downloads: 0
Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021
Pages: 1341 - 1348Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study
Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor
Downloads: 0
Research Paper, Information Technology, India, Volume 10 Issue 10, October 2021
Pages: 1313 - 1318Automation in Daily Life & It's Impact on Individuals & Society
Hemant Gautam Bodhare
Downloads: 0
Research Paper, Information Technology, India, Volume 11 Issue 7, July 2022
Pages: 133 - 137Wearable Computers of Leading Edge Generation and their Mystifying Mechanic's
Smital Wagh, Gunjan Behl