Item Details
Skip Navigation Links
   ActiveUsers:1364Hits:19691869Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Article   Article
 

ID143022
Title ProperLife cycles of cyber threats
LanguageENG
AuthorBuchanan, Ben
Summary / Abstract (Note)Technology isn’t human, but it has stages of life. The period after the conception of a new piece of technology is often marked by significant investments of time and resources, often with little tangible return. If this work is successful, the technology begins to enter use, benefiting from iteration and design improvements. It may then begin to spread, gaining in popularity and begetting virtuous economies of scale. If all continues to progress, the technology will mature in the marketplace. Even if it attains market dominance, however, that position will not be permanent. In time, an upstart technology will appear on the scene, and the process will begin again. Sometimes the old technology will stick around in one form or another, carving out a niche role for itself. More frequently, it will be cast aside and supplanted.
`In' analytical NoteSurvival : the IISS Quarterly Vol. 58, No.1; Feb-Mar 2016: p.39-58
Journal SourceSurvival Vol: 58 No 1
Key WordsCyber crime ;  Life Cycle ;  Cyber Threat ;  Vulnerabilities and Exploits


 
 
Media / Other Links  Full Text