Kazuo Takaragi
- Published in print:
- 2013
- Published Online:
- September 2015
- ISBN:
- 9780823244560
- eISBN:
- 9780823268948
- Item type:
- chapter
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823244560.003.0012
- Subject:
- Information Science, Information Science
This chapter introduces the topic of information technology for a safe and secure society in Japan and shows an emerging trend toward a cyber-physical solution. It begins by reviewing major security ...
More
This chapter introduces the topic of information technology for a safe and secure society in Japan and shows an emerging trend toward a cyber-physical solution. It begins by reviewing major security incidents in the United States and Japan, and presenting the Japanese national strategy for information security. It then describes various emerging security technologies in Japan, starting with an overview of the two levels of security technology: the component level, such as finger vein authentication and RFID, and the system and management level, such as a multiple risk communicator. Each of these technologies is discussed in turn. The chapter also covers various issues related to mitigating information leakage.Less
This chapter introduces the topic of information technology for a safe and secure society in Japan and shows an emerging trend toward a cyber-physical solution. It begins by reviewing major security incidents in the United States and Japan, and presenting the Japanese national strategy for information security. It then describes various emerging security technologies in Japan, starting with an overview of the two levels of security technology: the component level, such as finger vein authentication and RFID, and the system and management level, such as a multiple risk communicator. Each of these technologies is discussed in turn. The chapter also covers various issues related to mitigating information leakage.
Andrea M. Matwyshyn (ed.)
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- book
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.001.0001
- Subject:
- Law, Intellectual Property, IT, and Media Law
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the ...
More
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, this book reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, where breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.Less
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, this book reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, where breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.
Ananth N. Madhavan
- Published in print:
- 2016
- Published Online:
- August 2016
- ISBN:
- 9780190279394
- eISBN:
- 9780190279424
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780190279394.003.0013
- Subject:
- Economics and Finance, Financial Economics
Departing from market capitalization weights implies some form of active investing that may make sense for many investors who are not representative of the market; they may also make sense in markets ...
More
Departing from market capitalization weights implies some form of active investing that may make sense for many investors who are not representative of the market; they may also make sense in markets that are non-transparent or illiquid. The ETF wrapper, however, is not a good fit for some strategies, especially active strategies where daily transparency into holdings may present a problem. There are several ways to mitigate possible information leakage, and undoubtedly more will be proposed in the coming years. Even so, fundamental managers in illiquid markets or those taking concentrated positions might be concerned about front-running or having their investment insights/ideas compromised through the disclosure of their positions. For this reason, there is skepticism about active ETFs as future drivers of industry growth. Rules-based strategies, ETFs provide an attractive way for active investing to be done in a transparent, manner that is passive in nature.Less
Departing from market capitalization weights implies some form of active investing that may make sense for many investors who are not representative of the market; they may also make sense in markets that are non-transparent or illiquid. The ETF wrapper, however, is not a good fit for some strategies, especially active strategies where daily transparency into holdings may present a problem. There are several ways to mitigate possible information leakage, and undoubtedly more will be proposed in the coming years. Even so, fundamental managers in illiquid markets or those taking concentrated positions might be concerned about front-running or having their investment insights/ideas compromised through the disclosure of their positions. For this reason, there is skepticism about active ETFs as future drivers of industry growth. Rules-based strategies, ETFs provide an attractive way for active investing to be done in a transparent, manner that is passive in nature.