Homeland security and information control: A model of asymmetric information flows

被引:0
|
作者
Maxwell, TA [1 ]
机构
[1] SUNY Albany, Sch Informat Sci & Policy, Albany, NY 12222 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively 'information poor.' While the short-term effects of asymmetrical information flows appear to be positive for the government, are relatively neutral for individuals and the media, they increase global distrust of US governmental actions, which may adversely affect global stability. Finally, any complete analysis of the impacts of controlling information flows must include an understanding of what constitutes security, and the appropriate balance between information disclosure and secrecy in a democratic society.
引用
收藏
页码:128 / 134
页数:7
相关论文
共 50 条
  • [31] A security model to protect sensitive information flows based on trusted computing technologies
    Wang, Shi-Hua
    Li, Xiao-Yong
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3646 - +
  • [32] Do you know where your information is in the homeland security era?
    Seifert, JW
    Relyea, HC
    GOVERNMENT INFORMATION QUARTERLY, 2004, 21 (04) : 399 - 405
  • [33] A MODEL OF EXPROPRIATION WITH ASYMMETRIC INFORMATION
    RAFF, H
    JOURNAL OF INTERNATIONAL ECONOMICS, 1992, 33 (3-4) : 245 - 265
  • [34] Information content security on the Internet: the control model and its evaluation
    BinXing Fang
    YunChuan Guo
    Yuan Zhou
    Science in China Series F: Information Sciences, 2010, 53 : 30 - 49
  • [35] Information content security on the Internet: the control model and its evaluation
    Fang BinXing
    Guo YunChuan
    Zhou Yuan
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (01) : 30 - 49
  • [36] Information content security on the Internet:the control model and its evaluation
    FANG BinXing1
    2Institute of Computing Technology
    3Graduate University of Chinese Academy of Sciences
    4National Computer Network Emergency Response Technical Team/Coordination Center of China
    ScienceChina(InformationSciences), 2010, 53 (01) : 30 - 49
  • [37] A mandatory access control policy model for information security requirements
    Leiwo, J
    Gamage, C
    Zheng, YL
    PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 527 - 538
  • [38] Information security management model
    Cribb, T
    Rao, A
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 654 - 657
  • [39] Research on information security model
    Jiang, Tao
    Li, Xinman
    Liu, Jiren
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (10): : 1078 - 1081
  • [40] A Model of Information Security and Competition
    de Corniere, Alexandre
    Taylor, Greg
    MARKETING SCIENCE, 2024,