Slayton, Rebecca (Author)
Clarke, Brian (Author)
Historians have tended to analyze maintenance as an intrinsically local activity, something very unlike the development of large technological systems. This article challenges this historiographic dichotomy by examining efforts to construct a global infrastructure for maintaining computer security. In the mid-1990s, as the internet rapidly grew, commercialized, and internationalized, a small community of computer security incident responders sought to scale up their system of coordination, which had been based on interpersonal trust, by developing trusted infrastructure that could facilitate the worldwide coordination of incident response work. This entailed developing not only professional standards, but also institutions for embodying and maintaining those standards in working infrastructure. While some elements of this infrastructure became truly global, others remained regionally bounded. We argue that this boundedness resulted not from the intrinsically local nature of maintenance, but from the historical process of infrastructure development, which was shaped by regionally based trust networks, institutions, and needs.
...More
Book
Samuel Greengard;
(2021)
The Internet of Things
(/isis/citation/CBB874725102/)
Book
Thomas S. Mullaney;
Benjamin Peters;
Mar Hicks;
Kavita Philip;
(2021)
Your Computer Is on Fire
(/isis/citation/CBB159272535/)
Article
Ons Al-Shamaileh;
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It
(/isis/citation/CBB503279988/)
Article
O. M. Bonastre;
A. Veà;
(2019)
Origins of the Domain Name System
(/isis/citation/CBB653105189/)
Article
Siddique Latif;
Adnan Qayyum;
Muhammad Usama;
Junaid Qadir;
Andrej Zwitter;
Muhammad Shahzad;
(September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development
(/isis/citation/CBB326485886/)
Article
Yoshiyasu Takefuji;
(March 2018)
Connected Vehicle Security Vulnerabilities
(/isis/citation/CBB280716653/)
Book
Geoff White;
(2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
(/isis/citation/CBB227937681/)
Article
Roesner, Franziska;
(Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering
(/isis/citation/CBB605988846/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB486585682/)
Article
Jones, Anita K.;
Wulff, William A;
(Spring 2002)
Cybersecurity
(/isis/citation/CBB367643580/)
Article
Martin, C. Dianne;
(Fall 2019)
EES Perspective -- When White Hats Wear Black Hats: The Ethics of Cybersecurity
(/isis/citation/CBB621975262/)
Article
Norma Möllers;
(January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State
(/isis/citation/CBB777052436/)
Article
Eugene H. Spafford;
(Summer 2007)
Voter Assurance
(/isis/citation/CBB265646858/)
Article
Till Winkler;
Sarah Spiekermann;
(September 2019)
Human Values as the Basis for Sustainable Information System Design
(/isis/citation/CBB725022354/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Article
Yost, Jeffrey R.;
(2016)
Computer Security, Part 2 -- Editor's Introduction
(/isis/citation/CBB453922047/)
Book
Ralph Schroeder;
Erik T. Meyer;
(2015)
Knowledge Machines: Digital Transformations of the Sciences and Humanities
(/isis/citation/CBB834814133/)
Article
Aspray, William F.;
Cortada, James W.;
(2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999
(/isis/citation/CBB189385729/)
Thesis
Dongoh Park;
(2016)
Digital National-Building: Sociotechnical Development of Public-Key Infrastructure in Korea
(/isis/citation/CBB060980772/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/isis/citation/CBB570334134/)
Be the first to comment!