Search results
Results from the WOW.Com Content Network
Per John McCumber's website, the idea is to push back the advance of security as an art and support it with a structured methodology that functions independent of technology evolution. The basis of this methodology is the inter-relationship among confidentiality, integrity and availability with storage, transmission and processing while ...
Criteria for assessing provider viability are more clearly defined. The technology's broad market applicability and relevance are clearly paying off. If the technology has more than a niche market, then it will continue to grow. [2] The term "hype cycle" and each of the associated phases are now used more broadly in the marketing of new ...
In 2011, the Danish National It and Telecom Agency published a discussion paper in which they argued that privacy by design is a key goal for creating digital security models, by extending the concept to "Security by Design". The objective is to balance anonymity and surveillance by eliminating identification as much as possible. [48]
Meanwhile, it is argued that consumerization of IT embodies more than consumer IT diffusion, but a chance for considerable productivity gains. It "reflects how enterprises will be affected by, and can take advantage of, new technologies and models that originate and develop in the consumer space, rather than in the enterprise IT sector". [5]
Hal Varian presented three models of security using the metaphor of the height of walls around a town to show security as a normal good, public good, or good with externalities. Free riding is the end result, in any case. Lawrence A. Gordon and Martin P. Loeb wrote the "Economics of Information Security Investment". [1]
Crossing the Chasm: Marketing and Selling High-Tech Products to Mainstream Customers or simply Crossing the Chasm (1991, revised 1999 and 2014), is a marketing book by Geoffrey A. Moore that examines the market dynamics faced by innovative new products, with a particular focus on the "chasm" or adoption gap that lies between early and mainstream markets.
Get AOL Mail for FREE! Manage your email like never before with travel, photo & document views. Personalize your inbox with themes & tabs. You've Got Mail!
Model-driven security is also well-suited for automated auditing, reporting, documenting, and analysis (e.g. for compliance and accreditation), because the relationships between models and technical security implementations are traceably defined through the model-transformations.