Downloads: 119
Research Paper | Information Technology | India | Volume 6 Issue 1, January 2017
Information Security
Abstract: According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of crypto-graphic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and better tools for system evaluation and assurance, the problems can be solved. In this note, we put forward a contrary view information insecurity is at least as much due to perverse incentives. Many of the problems can be explained more clearly and convincingly using the language of microeconomics network externalities, asymmetric information, moral hazard, adverse selection, liability dumping and the tragedy of the commons.
Keywords: INFORMATION SECURITY
Edition: Volume 6 Issue 1, January 2017,
Pages: 2358 - 2361
Similar Articles with Keyword 'INFORMATION SECURITY'
Downloads: 110
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah | Nur Faizah Binti Ab Aziz [2] | Maya Novia Sari [2] | Jamaludin Bin Ibrahim [4]
Downloads: 112
Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020
Pages: 1643 - 1647Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai | Abu Sulemana [2]