Ashley Sweetman (Author)
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood. Ever since the major London banks purchased their first computers in the early 1960s, they have had to balance their dependence on those machines with the need to secure their operations and retain the trust of their customers. Technological change in the second half of the 20th century prompted British banks to reevaluate their function as trusted protectors of wealth. In the City of London, the capital’s oldest area and historically its business and commerce hub, the colossal clearing banks employed newly commercialised electronic computers—the processing power of which could transform the highly clerical clearing and settlement process. What unfolded over the following three decades was a relentless modernisation drive. Revolutionising the way that banks and other financial institutions conducted business and interacted with each other and permanently altering the speed and scale at which the United Kingdom’s financial sector functioned, this rapid modernisation thrust computer security into the consciousness of bank executives and their clients alike. Dependence on computers quickly grew, and the banks immediately realised the need to secure their new software and hardware. Focusing on the period 1960 to 1990, this book uses newly released and previously unexplored archival material to trace the origins of cyber security in the UK financial sector. This work will be of value to students and academic researchers in the history of computing, financial history, and the history of intelligence and security, as well as the general reader interested in contemporary intelligence, cyber security, and finance.
...MoreReview Jacob Ward (2023) Review of "Cyber and the City: Securing London’s Banks in the Computer Age". Technology and Culture (pp. 613-615).
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB486585682/)
Article
Roesner, Franziska;
(Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering
(/isis/citation/CBB605988846/)
Article
Siddique Latif;
Adnan Qayyum;
Muhammad Usama;
Junaid Qadir;
Andrej Zwitter;
Muhammad Shahzad;
(September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development
(/isis/citation/CBB326485886/)
Article
Ons Al-Shamaileh;
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It
(/isis/citation/CBB503279988/)
Article
Martin, I.;
(2012)
Too Far Ahead of Its Time: Barclays, Burroughs, and Real-Time Banking
(/isis/citation/CBB001211130/)
Article
Karin Bijsterveld;
(2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989
(/isis/citation/CBB388750124/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB758382142/)
Article
R. Subramanian;
(2020)
Historical Consciousness of Cyber Security in India
(/isis/citation/CBB132311682/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/isis/citation/CBB570334134/)
Article
O. M. Bonastre;
A. Veà;
(2019)
Origins of the Domain Name System
(/isis/citation/CBB653105189/)
Book
Ben Collier;
(2024)
Tor: From the Dark Web to the Future of Privacy
(/isis/citation/CBB896546489/)
Article
Evan Selinger;
Darrin Durant;
(2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service
(/isis/citation/CBB181826170/)
Article
Darren Ellis;
(2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia
(/isis/citation/CBB734944273/)
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/isis/citation/CBB775086796/)
Article
Corinna Schlombs;
(2023)
Built on the Hands of Women: Data, Automation, and Gender in West Germany's Financial Industry
(/isis/citation/CBB342715052/)
Article
G. Vidan;
(2020)
Checks and Balances: Publics, Interests, and the Development of Electronic Fund Transfers in 1970s US
(/isis/citation/CBB208895906/)
Book
Bernardo Bátiz-Lazo;
(2018)
Cash and Dash: How ATMs and Computers Changed Banking
(/isis/citation/CBB466179527/)
Article
Jeremy Pitt;
Agnieszka Rychwalska;
Magdalena Roszczynska-Kurasinska;
Andrzej Nowak;
(March 2019)
Democratizing Platforms for Social Coordination
(/isis/citation/CBB485378597/)
Article
Pedro Sanches;
(2016)
Seeing mobility: how software engineers produce unequal representations
(/isis/citation/CBB192738548/)
Be the first to comment!