Can Trust Be Verified? Managing 5G Risk in Southeast Asia

Nothing can fully protect a country from secret malfeasance involving the company it hires to provide and maintain its 5th generation wireless system (5G). But certain steps can lessen the risk. One is to learn how secure the firm’s technology is; another is to estimate the chance that the laws and...

Full description

Saved in:
Bibliographic Details
Main Author: Emmerson, Donald K.
Other Authors: S. Rajaratnam School of International Studies
Format: Commentary
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/85230
http://hdl.handle.net/10220/48180
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:Nothing can fully protect a country from secret malfeasance involving the company it hires to provide and maintain its 5th generation wireless system (5G). But certain steps can lessen the risk. One is to learn how secure the firm’s technology is; another is to estimate the chance that the laws and institutions in the firm’s home country will prevent the government there from accessing the firm’s data and algorithms without the user country’s permission.