Abstract
The five-step process is useful for evaluating personal security decisions, but many security decisions involve a variety of players—each with his own agenda. Your ability to take control of important security decisions is often severely limited, but you do have some control. As a citizen, you can effect some changes in security practices with your vote. As a consumer, you effect others with your wallet. As a technologist, you can invent something that changes security. And if you have some measure of money and freedom, you can change your environment, even if that means relocating yourself. Making changes in security arrangements is also achieved through negotiation. Using mechanisms like insurance and laws that enforce liability, individuals can secure some measure of power in determining what kind of security will be available to them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2003 Bruce Schneier
About this chapter
Cite this chapter
(2003). Negotiating for Security. In: Beyond Fear. Springer, New York, NY. https://doi.org/10.1007/0-387-21712-6_16
Download citation
DOI: https://doi.org/10.1007/0-387-21712-6_16
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-02620-6
Online ISBN: 978-0-387-21712-3
eBook Packages: Springer Book Archive