Posted by:
admin
16 years, 3 months ago
Cognitive Daily pointed me to an article about risk preferences and it's deceptive headline. The research is interesting to from two perspectives:
"With regard to willingness to take risks children are astonishingly similar to their parents," is how the Bonn economist Professor Armin Falk sums up the results. "This is not only true for the overall estimate, but also for the different categories. There are people, for example, for whom no mogul piste is too steep when skiing, but who invest their money in secure government bonds. An identical risk profile can often be found with their children."From a corporate standpoint, it would seem to indicated that while a company (as represented by it's senior management and employees) may be very conservative in its investment strategy, it may be willing to take enormous risks in information security.
Secondly:
As for "trusting others", married couples also tend to have identical attitudes, even if they got married only recently. "When choosing partners, we seem to try to ensure that the person we have chosen is as similar as possible to us," is Professor Falk's interpretation of the results.This suggests that employers might also hire people with similar risk attitudes and that companies might choose partners and vendors with similar attitudes. It also shows why my wife is so very tolerant of my incredibly risky career choices. Share on Twitter Share on Facebook
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)