Article ID: CBB421929386

Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005 (January 2020)

unapi

Historians have tended to analyze maintenance as an intrinsically local activity, something very unlike the development of large technological systems. This article challenges this historiographic dichotomy by examining efforts to construct a global infrastructure for maintaining computer security. In the mid-1990s, as the internet rapidly grew, commercialized, and internationalized, a small community of computer security incident responders sought to scale up their system of coordination, which had been based on interpersonal trust, by developing trusted infrastructure that could facilitate the worldwide coordination of incident response work. This entailed developing not only professional standards, but also institutions for embodying and maintaining those standards in working infrastructure. While some elements of this infrastructure became truly global, others remained regionally bounded. We argue that this boundedness resulted not from the intrinsically local nature of maintenance, but from the historical process of infrastructure development, which was shaped by regionally based trust networks, institutions, and needs.

...More
Citation URI
https://data.isiscb.org/isis/citation/CBB421929386/

Similar Citations

Book Samuel Greengard; (2021)
The Internet of Things (/isis/citation/CBB874725102/)

Book Thomas S. Mullaney; Benjamin Peters; Mar Hicks; Kavita Philip; (2021)
Your Computer Is on Fire (/isis/citation/CBB159272535/)

Article Ons Al-Shamaileh; (June 2018)
I Have Issues with Facebook: But I Will Keep Using It (/isis/citation/CBB503279988/)

Article O. M. Bonastre; A. Veà; (2019)
Origins of the Domain Name System (/isis/citation/CBB653105189/)

Article Siddique Latif; Adnan Qayyum; Muhammad Usama; Junaid Qadir; Andrej Zwitter; Muhammad Shahzad; (September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development (/isis/citation/CBB326485886/)

Article Yoshiyasu Takefuji; (March 2018)
Connected Vehicle Security Vulnerabilities (/isis/citation/CBB280716653/)

Book Geoff White; (2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global (/isis/citation/CBB227937681/)

Article Roesner, Franziska; (Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering (/isis/citation/CBB605988846/)

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB486585682/)

Article Jones, Anita K.; Wulff, William A; (Spring 2002)
Cybersecurity (/isis/citation/CBB367643580/)

Article Martin, C. Dianne; (Fall 2019)
EES Perspective -- When White Hats Wear Black Hats: The Ethics of Cybersecurity (/isis/citation/CBB621975262/)

Article Norma Möllers; (January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State (/isis/citation/CBB777052436/)

Article Eugene H. Spafford; (Summer 2007)
Voter Assurance (/isis/citation/CBB265646858/)

Article Till Winkler; Sarah Spiekermann; (September 2019)
Human Values as the Basis for Sustainable Information System Design (/isis/citation/CBB725022354/)

Book Duane C. Wilson; (2021)
Cybersecurity (/isis/citation/CBB201310866/)

Article Yost, Jeffrey R.; (2016)
Computer Security, Part 2 -- Editor's Introduction (/isis/citation/CBB453922047/)

Book Ralph Schroeder; Erik T. Meyer; (2015)
Knowledge Machines: Digital Transformations of the Sciences and Humanities (/isis/citation/CBB834814133/)

Article Aspray, William F.; Cortada, James W.; (2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999 (/isis/citation/CBB189385729/)

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/)

Authors & Contributors
Yost, Jeffrey R.
Wulff, William A
Norma Möllers
Jones, Anita K.
Andrej Zwitter
Park, Dongoh
Journals
IEEE Technology and Society Magazine
IEEE Annals of the History of Computing
The Bridge: Journal of the National Academy of Engineering
Science, Technology and Human Values
Publishers
MIT Press
Reaktion Books Ltd
Cornell University Press
Indiana University
Concepts
Computer security; cyber security
Computers and computing
Technology and society
Cyberinfrastructure
Privacy
Security technologies
Time Periods
21st century
20th century, late
20th century
Places
United States
Middle and Near East
South Korea
Germany
Institutions
Peter Norton Computing Corporation
Symantec Corporation
Facebook (firm)
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment