Show
39 citations
related to Computer security; cyber security
Show
39 citations
related to Computer security; cyber security as a subject or category
Article
Ashwin Jacob Mathew
(2024)
Unscripted Practices for Uncertain Events: Organizational Problems in Cybersecurity Incident Management.
Science, Technology, and Human Values
(pp. 827-850).
(/isis/citation/CBB643688714/)
Article
Brian K. Vagts
(2024)
Telenet, the 1983 Hacking Incidents, and the Construction of Network Security in the United States.
IEEE Annals of the History of Computing
(pp. 34-47).
(/isis/citation/CBB806064945/)
Article
T. Alex Reid
(2023)
Monte Sala's Cryptographic Achievements.
IEEE Annals of the History of Computing
(pp. 65-71).
(/isis/citation/CBB117246267/)
Article
Yue Zhao; Rebecca Slayton
(2023)
Tool, Doctor, and Hooligan: History of Antivirus Software in China, 1989–2010.
IEEE Annals of the History of Computing
(pp. 43-54).
(/isis/citation/CBB005910842/)
Article
Cecilia Passanti; Marie-Emmanuelle Pommerolle
(2022)
The (un)making of electoral transparency through technology: The 2017 Kenyan presidential election controversy.
Social Studies of Science
(pp. 928-953).
(/isis/citation/CBB699607308/)
Book
Ashley Sweetman
(2022)
Cyber and the City: Securing London’s Banks in the Computer Age.
(/isis/citation/CBB340774234/)
Article
James Chike Nwankwo
(February-June 2022)
Analysis of Impact of Industry 4.0 on Africa, Eastern Europe and US: A Case Study of Cyber-Security and Sociopolitical Dynamics of Nigeria, Russia and USA.
Bulletin of Science, Technology & Society
(pp. 3-10).
(/isis/citation/CBB289866626/)
Book
Ben Buchanan
(2022)
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics.
(/isis/citation/CBB525584724/)
Article
Karl Grindal
(2022)
Artist Collectives as the Origins of DDoS the Strano Network and Electronic Disturbance Theater.
IEEE Annals of the History of Computing
(pp. 30-42).
(/isis/citation/CBB585173916/)
Article
Nina Klimburg-Witjes; Alexander Wentland
(November 2021)
Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses.
Science, Technology, and Human Values
(pp. 1316-1339).
(/isis/citation/CBB420821642/)
Book
Andrew J. Stewart
(2021)
A Vulnerable System: The History of Information Security in the Computer Age.
(/isis/citation/CBB758382142/)
Book
Andrew J. Stewart
(2021)
A Vulnerable System: The History of Information Security in the Computer Age.
(/isis/citation/CBB486585682/)
Book
Duane C. Wilson
(2021)
Cybersecurity.
(/isis/citation/CBB201310866/)
Article
Norma Möllers
(January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State.
Science, Technology, and Human Values
(pp. 112-138).
(/isis/citation/CBB777052436/)
Article
Rebecca Slayton
(January 2021)
Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties.
Science, Technology, and Human Values
(pp. 81-111).
(/isis/citation/CBB911361449/)
Article
R. Subramanian
(2020)
Historical Consciousness of Cyber Security in India.
IEEE Annals of the History of Computing
(pp. 71-93).
(/isis/citation/CBB132311682/)
Article
Rubén Arnoldo González; Frida V. Rodelo
(2020)
Double-edged knife: Practices and perceptions of technology and digital security among Mexican journalists in violent contexts.
Tapuya: Latin American Science, Technology and Society
(pp. 22-42).
(/isis/citation/CBB246037766/)
Book
Geoff White
(2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global.
(/isis/citation/CBB227937681/)
Article
Rebecca Slayton; Brian Clarke
(January 2020)
Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005.
Technology and Culture
(pp. 173-206).
(/isis/citation/CBB421929386/)
Article
Till Winkler; Sarah Spiekermann
(September 2019)
Human Values as the Basis for Sustainable Information System Design.
IEEE Technology and Society Magazine
(pp. 34-43).
(/isis/citation/CBB725022354/)
Be the first to comment!