Jump to ContentJump to Main Navigation
A Vulnerable SystemThe History of Information Security in the Computer Age$
Users without a subscription are not able to see the full content.

Andrew J. Stewart

Print publication date: 2021

Print ISBN-13: 9781501758942

Published to Cornell Scholarship Online: January 2022

DOI: 10.7591/cornell/9781501758942.001.0001

Show Summary Details
Page of

PRINTED FROM Cornell University Press SCHOLARSHIP ONLINE (www.cornell.universitypressscholarship.com). (c) Copyright University of Cornell University Press, 2022. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in Cornell for personal use. date: 25 May 2022

The Wicked Nature of Information Security

The Wicked Nature of Information Security

Chapter:
(p.176) Chapter 9 The Wicked Nature of Information Security
Source:
A Vulnerable System
Author(s):

Andrew J. Stewart

Publisher:
Cornell University Press
DOI:10.7591/cornell/9781501758942.003.0010

This chapter studies the wicked nature of information security. It has always been unlikely that there will be a breakthrough in any one specific area of information security that will solve the problems that exist across the entirety of the field. An alternative approach has been to step outside the field of information security and examine information security problems from the perspective of other fields. The security of every computer system depends on a myriad of factors, including the technologies that are employed, the incentives of the users, and the environment in which those technologies and users reside. This means that there is a limit to how much each discipline within the field of information security can contribute to improving the security of any system, whether it be software security, network security, user education, passwords, or cryptography.

Keywords:   information security, information security problems, computer system, technologies, software security, network security, user education, cryptography, passwords

Cornell Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.