Abstract | ||
---|---|---|
Progress in furthering IT security is not linear. Effective implementation will logically lag behind the introduction of new technology and functional requirements. Often there are intermittent spasms of chaos, confusion, and inertia before technology is transformed into IT system solutions. Before attempting to assess actual progress in a nation's IT security posture, it is important to look upon IT security as being no different from any other product offered to IT users. There are three criteria which must be satisfied before any product is developed, adopted, or effectively used in the marketplace. The first requisite for customers' adoption of any product is that the underlying technology must be understandable, user-friendly, and affordable. The second requirement is that users must be committed to using the product. And, the third prerequisite for broad, effective product use, is the availability of appropriate rules and regulations that will engender and guide the proper use of such products. In the course of users' adjustment to new technology, each of these requirements must be satisfied if the technology is to be applied and technological progression continued. This paper looks more closely at the factors that are critical to an TT security product's effective use and commercial viability. |
Year | Venue | Keywords |
---|---|---|
1993 | SEC | it security convergence,it security |
Field | DocType | Volume |
Convergence (routing),Security convergence,Network security policy,Computer security,Computer science,Security analysis,Computer security model | Conference | 37 |
ISSN | ISBN | Citations |
0926-5473 | 0-444-81748-4 | 0 |
PageRank | References | Authors |
0.34 | 1 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Patrick R. Gallagher, Jr. | 1 | 9 | 1.17 |
r patrick | 2 | 0 | 0.34 |