Showing 1 - 10 of 764
Persistent link: https://www.econbiz.de/10005037313
Many software products and information technology services are mediated by platforms. Often these platforms feature the simultaneous occurrence of both positive and negative network externalities, e.g., the most popular operating systems are the most attractive platforms for both application...
Persistent link: https://www.econbiz.de/10010950519
I analyze the effects of network structure, in particular network centrality, on vulnerability disclosure policy. My analysis finds that the structure of the network of households can greatly effect the overall welfare of the economy. Specifically, I find that the distribution of the centrality...
Persistent link: https://www.econbiz.de/10011273944
Chinese telecom-equipment maker Huawei has become a global corporate giant, yet security concerns from US officials have kept it from gaining a foothold in America, intensifying US-China tensions. In a time of great economic need, US desire for foreign direct investment from China is clashing...
Persistent link: https://www.econbiz.de/10010842046
This paper analyzes the state of critical transportation infrastructure in the US, its relationship to security, and how the lack of an updated national policy to resolve the serious weaknesses of the transportation infrastructure negatively impact security. The difficulties in safeguarding...
Persistent link: https://www.econbiz.de/10010679178
Security issues in financial accounting are complex, and the risks are often difficult to stipulate, even for experts. The issues presented in this article try to be formed in a contribution to the consolidation of problems in the field of risk, and former vulnerabilities in cyber security in...
Persistent link: https://www.econbiz.de/10010780627
Every economy of an advanced nation relies on information systems and interconnected networks, thus in order to ensure the prosperity of a nation, making cyberspace a secure place becomes as crucial as securing society. Cyber security means ensuring the safety of this cyberspace from threats...
Persistent link: https://www.econbiz.de/10010819154
Many computerised systems use electronic models that get triggered when certain business conditions arise. Unauthorised triggering of such computerised models has been overlooked in the security literature. In this paper, we propose two frameworks to analyse the security of systems that have the...
Persistent link: https://www.econbiz.de/10008755374
Security issues are complex, and the risks of cyber crime are often difficult to stipulate, even for experts. The issues presented in this article try to be formed in a contribution to the consolidation of problems in the field of computer arhitecture cyber security. Fault tolerance is the best...
Persistent link: https://www.econbiz.de/10011200163
The Joint Staff Advisory Note reviews Cameroon's Third Annual Progress Report on achievements and obstacles in the implementation of the Poverty Reduction Strategy Paper (PRSP). It highlights the substantial improvement of the fiscal position and the strengthening of fiscal management. It...
Persistent link: https://www.econbiz.de/10011244158