StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Positive and Negative Arguments for Sharing the Information - Essay Example

Cite this document
Summary
The paper "Positive and Negative Arguments for Sharing the Information" states that the Organization of Internet Safety (OIS) defines security vulnerability as a flaw within a software system that can cause it to work against its original design and make it prone to outside manipulation. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Positive and Negative Arguments for Sharing the Information
Read Text Preview

Extract of sample "Positive and Negative Arguments for Sharing the Information"

We must look at what exactly is meant by the term ‘vulnerability disclosure’. In simple terms, we can define vulnerability disclosure when a public announcement regarding a software flaw is made. This brings us to the argument against the sharing of information as it mostly leads to vulnerability. Rahul Telang, and Sunil Watta, in ‘Impact of Software Vulnerability Announcements on the Market Value of Software Vendors – an Empirical Investigation’ draw that very conclusion through thorough research based on a collection of data from various sources.

With the rapid advancement in technology and the internet evolution information sharing has peaked to a new level. This despite its advantages in terms of rapid information sharing also brings to the surface the increased chances of vulnerabilities being exposed. As a result not only are software security products like firewalls at risk but software like operating systems and enterprise software can also be manipulated to create security-related attacks; Hence providing another aspect that goes against information sharing due to the presence of vulnerabilities.

Further examples in terms of a study by NIST in 2002 can be observed which estimated the cost of faulty software at $60 bn per year. Most prominent are incidents like the Cod Red virus and the Melissa virus in which hackers exploited flaws in the software and caused enormous damage.

Moving on to some arguments in favor of information sharing despite the existence of vulnerabilities we see that prior literature suggests that software defects don’t necessarily lead to a loss in the market value of the firm. This is due to two main reasons; firstly because the End User License Agreement limits the liability of the software developers encouraging them to facilitate information sharing despite the costs. Second due to the general philosophy held by software stakeholders that it is a uniquely complex product that will have understandable defects. A key example here is that of the numerous vulnerabilities present in Microsoft and yet its products are not associated in any way with low quality simply because of the huge user base that it holds in terms of information sharing.

Arora, Telang, and Xu (2004) look at a more optimistic picture of the vulnerability aspect and argue in favor of information sharing as their study leads them to the conclusion that disclosure can force vendors to release patches quickly. Arora, Caulkins, and Telang (2003) follow suit and they discover that larger software vendors find it optimal to rush products into the market and then invest in post-launch patching hence saving overall product costs and using the vulnerability to their advantage.
An externality is defined by economists as a situation in which an individual’s actions have economic repercussions for others. It is important to note that in these instances the fact that there is no compensation is of critical importance. Externalities are divided into positive and negative. In negative externality, the consequences are mostly known, for example, the effects of environmental pollution caused by a plant and the way it might have an impact on the neighboring homes. Positive externalities on the other hand are most common in network externalities. A common example would be the installation of a telephone for another customer which would positively affect others since they would be now easily able to reach that individual. In terms of network externalities coordination would be a basic example.

Several attributes of computer security suggest that it is an externality. This is basically on the basis of the security that one machine has on another. A positive example of externality in terms of computing would be looking at the case of computer security in automotive security. When the auto theft response system known as Lojack is introduced in a certain area it brings down the auto theft level. This is mainly due to the function of the Lojack which makes it impossible for thieves to detect it. As a result, individuals in possession of Lojack are providing positive externalities to other car owners in the area. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Security Essay Example | Topics and Well Written Essays - 750 words - 3”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1408674-computer-security
(Computer Security Essay Example | Topics and Well Written Essays - 750 Words - 3)
https://studentshare.org/environmental-studies/1408674-computer-security.
“Computer Security Essay Example | Topics and Well Written Essays - 750 Words - 3”, n.d. https://studentshare.org/environmental-studies/1408674-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Positive and Negative Arguments for Sharing the Information

Sapphos Poems Loneliness and To any army wife, in Sardis

Conversely, in the “Loneliness” poem the poet does not offer structural information regarding utter emotional insensitivity of the man towards his lover, but mostly the absence of physical satisfaction (Sappho, 2010).... This study seeks to ascertain how these two texts exhibit their respective women figures besides other varied aspects, which may be differing or sharing common perspectives integrated by the poet....
5 Pages (1250 words) Essay

The negative and positive effects of outsourcing to developing countries

Outsourcing can be taken to refer to the downsizing of an organization's workforce,whereby those tasks previously performed by these individuals are alternatively performed by automation or the tasks are exported to another base for completion especially overseas where the tasks can be completed cheaply ....
12 Pages (3000 words) Essay

Positive Effects of the Media

Oak argues that newspapers not only update people with new information and the latest news but also enhance their vocabulary – they are the best beginners in developing children's reading habits.... He argues that it has exposed people to the world, allowing different people to exchange their views on various subjects and social issues, resulting into a global knowledge sharing; it provides a platform through which people voice their opinions on all kinds of social....
6 Pages (1500 words) Term Paper

Identifying Ethos, Pathos, and Logos

The good thing about the article is that Sachs itemizes information that leads the readers to sense his fairness.... He cites specific examples done by Rockefeller, Bill, Gates, Soros, and others to show the readers that this concept of wealth sharing has been done before by these great people.... Along these lines, Sachs explores on the positive results that wealth sharing did worldwide.... The graphics used for the argument help a lot in creating a good and credible position for Sachs concept of wealth sharing....
2 Pages (500 words) Essay

Comprehension questions about text: Globalisation and Higher education Development: Acritical analysis

Remember you must give clear examples for full marks.... Plagiarism will be penalized, so you must use your own words.... You should consider at least 3 of the following issues: currency, reliability, use of evidence &/or.... ... ... Other. ... ...
2 Pages (500 words) Coursework

Arguments Supporting Social Networking as Risky

People from all over the universe access this information; some of whom the owner of the information has never met in person or even shared a face-to-face conversation.... After downloading the information from the social networking sites, the original owner has no authority over it, and it is liable to use without one's knowledge (Piccoli and Ives, 2013, p.... Online sharing of personal information can give impersonators a leeway to trick you or someone close to you into downloading malware or providing entry to restricted sites....
10 Pages (2500 words) Essay

Teenagers and modern social media

he author does not use unfair arguments.... The author is quite disappointed by the media, especially television, thus holds a negative attitude towards them.... When teenagers decide to watch only insightful programs, they will reduce the negative influence that the media will have on them....
4 Pages (1000 words) Essay

Influence of Language on Communication

Language transmits information through writing, reading, spoken, listening, sign language, or/ and body language.... For these purposes, the universe of communication can be reduced to four basic classifications: ceremony, emotion, information, and direction.... information communication happens most frequently in the thought of use, but may not be as dominant as most people believe.... he basic avenues of relaying information are statements or propositions....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us