|
Entitlement vs Breaches As typically, no one wishes to share valuable information with potential abusers of
that information and as no one wishes to contribute efforts to build collaboration
works that can provide more power to enemy or rival hands, for example, like building
military strategy training systems that could be operated by enemies, or even a simple
pilot training program openly accessible to terrorists, shared information requires
entitlement and access control. While some shared information should be freely available,
much should not.
|