منابع مشابه
Third-degree conflicts: information warfare
European Journal of Information Systems (2010) 19, 1–4. doi:10.1057/ejis.2010.2 The concept of the Internet as a potential military battlefield is not particularly new. The Internet itself is rooted to the military notion of a bomb-proof defense network. Similarly, the feasibility of attacking information systems across this network was proven in the 1980s by the Morris Worm. This Internet worm...
متن کاملResolving Information Flow Conflicts in RBAC Systems
Recently, Role Based Access Control (RBAC) model has taken place as a promising alternative to the conventional access control models, MAC and DAC. RBAC is more general than those traditional models as was shown by Osborn et al. [17], however, mapping a role based system to a valid MAC configuration is not always possible because certain combinations of permissions that are included in a role’s...
متن کاملInvestment in Information Acquisition *
This paper presents a simple model in which a community must decide on the amount of real investment and investment in information so as to maximise the expected utility of consumption over two periods. It is shown that under conditions involving the product of the elasticity of the marginal utility of consumption and the elasticity of the production function that optimal real investment is eit...
متن کاملInformation acquisition in committees
The goal of this paper is to illustrate the signi cance of information acquisition in mechanism design. We provide a stark example of a mechanism design problem in a collective choice environment with information acquisition. We concentrate on committees that are comprised of agents sharing a common goal and having a joint task. Members of the committee decide whether to acquire costly informat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Economic Theory
سال: 2012
ISSN: 0938-2259,1432-0479
DOI: 10.1007/s00199-012-0710-6