All
All

'Liars and Outliers: Enabling the Trust That Society Needs to Thrive' Excerpt

572 KB | 3 files |  PDF

The increasing scale of society affects societal pressures in a number of ways, making failures more expensive and more onerous.

Security technologist Bruce Schneier interconnects concepts from biological and social sciences to describe how society engenders trust and security. Schneier shows how society suffers in the absence of trust, whether examining the microcosm of social settings between two people or the world at large.

The increase scale of society exerts social pressures in a number of ways, including the pressure of more people, increased complexity in the interaction among those people, increased technological intensity and increased inertia resistance to change.

This excerpt, “Technological Advances,” was reprinted by permission of John Wiley & Sons, Inc., and comes from Chapter 16 of “Liars and Outliers: Enabling the Trust That Society Needs to Thrive,” authored by Bruce Schneier, 2012.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Liars and Outliers Excerpt.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Wiley is a global publisher of print and electronic products, specializing in scientific, technical, medical and scholarly journals, encyclopedias, books, and online products and services; professional/trade books, subscription products, training materials, and online applications and websites; and educational materials for undergraduate and graduate students and lifelong learners.

All IT Downloads from John Wiley & Sons, Inc.» | Visit John Wiley & Sons, Inc. »

Related IT Downloads

Security5TN A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification

This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications. ...  More >>

Security4TN Framework for Improving Critical Infrastructure Cybersecurity

The Framework enables organizations – regardless of size, degree of cybersecurity risk, or cybersecurity sophistication – to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure. ...  More >>

Security3TN Guide to Attribute Based Access Control (ABAC) Definition and Considerations

This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating a variety of attributes. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data