Which of the following is the best description of the principle of least interest?

Abstract

This study relates dating behavior to Waller's principle of least interest and Miller and Swanson's entrepreneurial and bureaucratic family integration settings. Interview data show that females exerted significantly greater effort to maintain their dating associations. Male were less interested and emotionally committed to continuing their current dating relationships, and those least interested were males reared in entrepreneurial rather than bureaucratic homes. Further linkages of Waller's findings to structural variables are encouraged, and should prove fruitful since most explanations of dating behavior are confined to analyses of interpersonal variables.

Journal Information

The Journal of Marriage and Family (JMF), published by the National Council on Family Relations, is the leading research journal in the family field and has been so for over sixty years. JMF features original research and theory, research interpretation and reviews, and critical discussion concerning all aspects of marriage, other forms of close relationships, and families. The Journal also publishes book reviews. Contributors to JMF come from a diversity of fields including anthropology, demography, economics, history, psychology, and sociology, as well as interdisciplinary fields such as human development and family sciences. JMF publishes original theory and research using the variety of methods reflective of the full range of social sciences, including quantitative, qualitative, and multimethod designs. Integrative reviews as well as reports on methodological and statistical advances are also welcome. JMF is issued quarterly, in February, May, August, and November of each year. Each issue averages 284 pages in length. World wide, its circulation is more than 6,200 copies.

Publisher Information

For over sixty-four years National Council on Family Relations (NCFR) has linked multi-disciplinary family professionals through its journals, conferences, state affiliate councils, and special interest sections. NCFR is non-profit, nonpartisan and fully member-funded. Researchers, educators, practitioners, and policymakers from all family fields and disiplines share knowledge and information about families. NCFR was founded in 1938. NCFR's Mission: The National Council on Family Relations (NCFR) provides a forum for family researchers, educators, and practitioners to share in the development and dissemination of knowledge about families and family relationships, establishes professional standards, and works to promote family well-being.

Rights & Usage

This item is part of a JSTOR Collection.
For terms and use, please refer to our Terms and Conditions
Journal of Marriage and Family © 1972 National Council on Family Relations
Request Permissions

What it is

The principle of least privilege recommends that users, systems, and processes only have access to resources (networks, systems, and files) that are absolutely necessary to perform their assigned function. By governing the level of access for each user, system, and process, the principle of least privilege limits the potential damage posed via unsanctioned activities, whether intentional or unintentional. The most common application of this principle involves assigning users restricted accounts in lieu of full administrator accounts intended for IT staff.

Many of the approaches we take in information technology mirror those in the physical world. The principle of least privilege is no different. When you hire a new, junior-level employee, they likely get immediate access to their workspace, a conference room, and the cafeteria, but you do not let them waltz into the vault with the secret recipes. The same is true for IT resources. For example, only users that do accounting should have access to the accounting applications, and only HR staff should have access to personnel files.

Why does it matter

One of the most common ways malicious actors get access to systems is by compromising a single user account or system and methodically working their way through a network until they reach—and compromise—their target. The principle of least privilege increases the difficulty of doing this by minimizing the connections between users, systems, and processes to only those needed to perform their job. This prevents the leap-frogging approach that could allow for the theft, modification, deletion, or exposure of sensitive elections infrastructure information without restriction. Implementation of least privilege can also help prevent malware infection as administrative privileges are often required for malware to execute.

What you can do

Form and implement a least privilege policy. Identify what users, systems, and processes are on the network and determine the minimum access level that each requires for their assigned job function. This includes limiting the system privileges of senior officials and administrative assistants as they are frequently targeted by malicious actors because of their high access levels. Election offices should include all stakeholders in the policy process to ensure every user’s needs are addressed when establishing access levels. At minimum, the policy should include best practices 26, 48, and 66 of the CIS’ (Center for Internet Security) A Handbook for Elections Infrastructure Security.

Once the policy is implemented, make sure there are at least annual checks on who has what privileges to prevent “privilege creep.” Privilege creep is when an employee changes roles and keeps their previously assigned privileges, while also gaining new privileges. These checks should also occur after an incident, as part of the remediation process, to ensure that user, system, and process privileges were not modified.

For additional information on this principle, please see CIS Control 4 on the Controlled Use of Administrative Privileges.

The EI-ISAC Cybersecurity Spotlight is a practical explanation of a common cybersecurity concept, event, or practice and its application to Elections Infrastructure security. It is intended to provide EI-ISAC members with a working understanding of common technical topics in the cybersecurity industry. If you would like to request a specific term or practice that may be of interest to the elections community, please contact [email protected].

How is the principle of least interest related to gender and relationships? Women are socialized to care about relationships and are expected by others to care about relationships, both of which reduce women's relational power.

What is a major limitation of research on beauty norms?

According to the text and lecture, what is a major limitation of research on beauty norms? A.) Researchers primarily focus on the thin ideal, a norm that is central to White women's concerns.