More recently, the term is being used in the context of a result of both entropy and the deliberate activities of individuals within organizations to usurp perimeters, often for well-intentioned reasons. The
Jericho Forum paper named "Collaboration Oriented Architecture" refers to this trend of de-perimeterisation as a problem: Problem The traditional electronic boundary between a corporate (or ‘private’) network and the Internet is breaking down in the trend which we have called de-perimeterisation. Variations of the term have been used to describe aspects of de-perimeterisation such as: • "You’ve already been de-perimeterised" to describe the Internet worms, viruses and other exploits which are designed to by-pass the border typically using web and e-mail. • "re-perimeterisation" to describe the interim step of moving perimeters to protection groups of computer servers or a data centre – rather than the perimeter. • "
Macro-Perimeterisation" the act of moving the security perimeter into the cloud, see
Security as a service. Examples of such security services in the cloud are exemplified by email cleaning services or proxy filtering services provided by towers in the internet. • "micro-perimeterisation" moving the security perimeter to surround the data itself, interim steps might include moving the perimeter around individual computer systems or an individual application (consisting of a cluster of computers). ==Notes==