Views: 149 , Downloads: 115 | CTR: 77 % | Weekly Popularity: ⮙5
Research Paper | Information Technology | India | Volume 6 Issue 1, January 2017
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of crypto-graphic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and better tools for system evaluation and assurance, the problems can be solved. In this note, we put forward a contrary view information insecurity is at least as much due to perverse incentives. Many of the problems can be explained more clearly and convincingly using the language of microeconomics network externalities, asymmetric information, moral hazard, adverse selection, liability dumping and the tragedy of the commons.
Keywords: INFORMATION SECURITY
Edition: Volume 6 Issue 1, January 2017
Pages: 2358 - 2361
How to Cite this Article?
Asif Husain, "Information Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20163938, Volume 6 Issue 1, January 2017, 2358 - 2361
149 PDF Views | 115 PDF Downloads
Similar Articles with Keyword 'INFORMATION SECURITY'
How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai, Abu Sulemana
Information Security in ICT from an Islamic Perspective
Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani
Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology
Prateek Shivhare, Savaridassan.P
Intrusion Detection in Wireless Network Using Fuzzy Rules
Ketaki P. Bhusari, Swati G. Kale