Show
28 citations
related to Computer security; cyber security
Show
28 citations
related to Computer security; cyber security as a subject or category
Article
James Chike Nwankwo
(February-June 2022)
Analysis of Impact of Industry 4.0 on Africa, Eastern Europe and US: A Case Study of Cyber-Security and Sociopolitical Dynamics of Nigeria, Russia and USA.
Bulletin of Science, Technology & Society
(pp. 3-10).
(/isis/citation/CBB289866626/)
Article
Nina Klimburg-Witjes; Alexander Wentland
(November 2021)
Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses.
Science, Technology and Human Values
(pp. 1316-1339).
(/isis/citation/CBB420821642/)
Book
Andrew J. Stewart
(2021)
A Vulnerable System: The History of Information Security in the Computer Age.
(/isis/citation/CBB486585682/)
Book
Duane C. Wilson
(2021)
Cybersecurity.
(/isis/citation/CBB201310866/)
Article
Norma Möllers
(January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State.
Science, Technology and Human Values
(pp. 112-138).
(/isis/citation/CBB777052436/)
Article
Rebecca Slayton
(January 2021)
Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties.
Science, Technology and Human Values
(pp. 81-111).
(/isis/citation/CBB911361449/)
Article
Rebecca Slayton; Brian Clarke
(January 2020)
Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005.
Technology and Culture
(pp. 173-206).
(/isis/citation/CBB421929386/)
Book
Geoff White
(2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global.
(/isis/citation/CBB227937681/)
Article
R. Subramanian
(2020)
Historical Consciousness of Cyber Security in India.
IEEE Annals of the History of Computing
(pp. 71-93).
(/isis/citation/CBB132311682/)
Article
Martin, C. Dianne
(Fall 2019)
EES Perspective -- When White Hats Wear Black Hats: The Ethics of Cybersecurity.
The Bridge: Journal of the National Academy of Engineering.
(/isis/citation/CBB621975262/)
Article
Siddique Latif; Adnan Qayyum; Muhammad Usama; et al.
(September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development.
IEEE Technology and Society Magazine
(pp. 82-90).
(/isis/citation/CBB326485886/)
Article
Till Winkler; Sarah Spiekermann
(September 2019)
Human Values as the Basis for Sustainable Information System Design.
IEEE Technology and Society Magazine
(pp. 34-43).
(/isis/citation/CBB725022354/)
Article
Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; et al.
(March 2019)
Democratizing Platforms for Social Coordination.
IEEE Technology and Society Magazine
(pp. 43-50).
(/isis/citation/CBB485378597/)
Article
O. M. Bonastre; A. Veà
(2019)
Origins of the Domain Name System.
IEEE Annals of the History of Computing
(pp. 48-60).
(/isis/citation/CBB653105189/)
Book
David D. Clark; Sandra Braman
(2018)
Designing an Internet.
(/isis/citation/CBB601148284/)
Article
Ons Al-Shamaileh
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It.
IEEE Technology and Society Magazine
(pp. 40-45).
(/isis/citation/CBB503279988/)
Article
Yoshiyasu Takefuji
(March 2018)
Connected Vehicle Security Vulnerabilities.
IEEE Technology and Society Magazine
(pp. 15-18).
(/isis/citation/CBB280716653/)
Book
Lennon, Brian
(2018)
Passwords: philology, security, authentication.
(/isis/citation/CBB427866448/)
Article
DuPont, Quinn; Fidler, Bradley
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity.
IEEE Annals of the History of Computing
(pp. 55-73).
(/isis/citation/CBB760734420/)
Article
Yost, Jeffrey R.
(2016)
Computer Security, Part 2 -- Editor's Introduction.
IEEE Annals of the History of Computing
(pp. 10-11).
(/isis/citation/CBB453922047/)
Be the first to comment!