Concept ID: CBA862677311

Computer security; cyber security

Show 28 citations related to Computer security; cyber security
Show 28 citations related to Computer security; cyber security as a subject or category


Permalink
data.isiscb.org/isis/authority/CBA862677311
Publications timeline | Click to expand
Updated timeline is loading. Please wait. The server may be processing several jobs...
Related places (List view)

Related Citations

Article James Chike Nwankwo (February-June 2022)
Analysis of Impact of Industry 4.0 on Africa, Eastern Europe and US: A Case Study of Cyber-Security and Sociopolitical Dynamics of Nigeria, Russia and USA. Bulletin of Science, Technology & Society (pp. 3-10). (/isis/citation/CBB289866626/) unapi

Article Nina Klimburg-Witjes; Alexander Wentland (November 2021)
Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses. Science, Technology and Human Values (pp. 1316-1339). (/isis/citation/CBB420821642/) unapi

Book Andrew J. Stewart (2021)
A Vulnerable System: The History of Information Security in the Computer Age. (/isis/citation/CBB486585682/) unapi

Book Duane C. Wilson (2021)
Cybersecurity. (/isis/citation/CBB201310866/) unapi

Article Norma Möllers (January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State. Science, Technology and Human Values (pp. 112-138). (/isis/citation/CBB777052436/) unapi

Article Rebecca Slayton (January 2021)
Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties. Science, Technology and Human Values (pp. 81-111). (/isis/citation/CBB911361449/) unapi

Article Rebecca Slayton; Brian Clarke (January 2020)
Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005. Technology and Culture (pp. 173-206). (/isis/citation/CBB421929386/) unapi

Book Geoff White (2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global. (/isis/citation/CBB227937681/) unapi

Article R. Subramanian (2020)
Historical Consciousness of Cyber Security in India. IEEE Annals of the History of Computing (pp. 71-93). (/isis/citation/CBB132311682/) unapi

Article Martin, C. Dianne (Fall 2019)
EES Perspective -- When White Hats Wear Black Hats: The Ethics of Cybersecurity. The Bridge: Journal of the National Academy of Engineering. (/isis/citation/CBB621975262/) unapi

Article Siddique Latif; Adnan Qayyum; Muhammad Usama; et al. (September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development. IEEE Technology and Society Magazine (pp. 82-90). (/isis/citation/CBB326485886/) unapi

Article Till Winkler; Sarah Spiekermann (September 2019)
Human Values as the Basis for Sustainable Information System Design. IEEE Technology and Society Magazine (pp. 34-43). (/isis/citation/CBB725022354/) unapi

Article Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; et al. (March 2019)
Democratizing Platforms for Social Coordination. IEEE Technology and Society Magazine (pp. 43-50). (/isis/citation/CBB485378597/) unapi

Article O. M. Bonastre; A. Veà (2019)
Origins of the Domain Name System. IEEE Annals of the History of Computing (pp. 48-60). (/isis/citation/CBB653105189/) unapi

Book David D. Clark; Sandra Braman (2018)
Designing an Internet. (/isis/citation/CBB601148284/) unapi

Article Ons Al-Shamaileh (June 2018)
I Have Issues with Facebook: But I Will Keep Using It. IEEE Technology and Society Magazine (pp. 40-45). (/isis/citation/CBB503279988/) unapi

Article Yoshiyasu Takefuji (March 2018)
Connected Vehicle Security Vulnerabilities. IEEE Technology and Society Magazine (pp. 15-18). (/isis/citation/CBB280716653/) unapi

Book Lennon, Brian (2018)
Passwords: philology, security, authentication. (/isis/citation/CBB427866448/) unapi

Article DuPont, Quinn; Fidler, Bradley (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity. IEEE Annals of the History of Computing (pp. 55-73). (/isis/citation/CBB760734420/) unapi

Article Yost, Jeffrey R. (2016)
Computer Security, Part 2 -- Editor's Introduction. IEEE Annals of the History of Computing (pp. 10-11). (/isis/citation/CBB453922047/) unapi

Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment