Book ID: CBB486585682

A Vulnerable System: The History of Information Security in the Computer Age (2021)

unapi

Stewart, Andrew J. (Author)


Cornell University Press


Publication Date: 2021
Physical Details: 312
Language: English

As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives.

...More
Citation URI
https://data.isiscb.org/isis/citation/CBB486585682/

Similar Citations

Book Duane C. Wilson; (2021)
Cybersecurity (/isis/citation/CBB201310866/)

Book Ashley Sweetman; (2022)
Cyber and the City: Securing London’s Banks in the Computer Age (/isis/citation/CBB340774234/)

Thesis Rowe, Josh; (2011)
The Public Life of Information (/isis/citation/CBB001562733/)

Article Roesner, Franziska; (Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering (/isis/citation/CBB605988846/)

Article Ons Al-Shamaileh; (June 2018)
I Have Issues with Facebook: But I Will Keep Using It (/isis/citation/CBB503279988/)

Article O. M. Bonastre; A. Veà; (2019)
Origins of the Domain Name System (/isis/citation/CBB653105189/)

Book David D. Clark; Sandra Braman; (2018)
Designing an Internet (/isis/citation/CBB601148284/)

Book Stevens, Hallam; (2013)
Life out of Sequence: A Data-Driven History of Bioinformatics (/isis/citation/CBB001213157/)

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/)

Article Kristina Milanovic; (March 2020)
Smart Home Security: How Safe is Your Data? (/isis/citation/CBB341237675/)

Book Ryan, Johnny; (2010)
A History of the Internet and the Digital Future (/isis/citation/CBB001033356/)

Article Patrick Petit; (2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization (/isis/citation/CBB181724884/)

Article Marcin Krasnodębski; (2018)
Throwing Light on Photonics: The Genealogy of a Technological Paradigm (/isis/citation/CBB299212489/)

Book Mark Coeckelbergh; (2020)
AI Ethics (/isis/citation/CBB990965100/)

Article Blanco, Jairo Ares; Puentes, Eduard Aibar; (2011)
The Evolution of P2P Networks for File Exchange: The Interaction between Social Controversy and Technical Change (/isis/citation/CBB001212080/)

Article Siddique Latif; Adnan Qayyum; Muhammad Usama; Junaid Qadir; Andrej Zwitter; Muhammad Shahzad; (September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development (/isis/citation/CBB326485886/)

Book Samuel Greengard; (2021)
The Internet of Things (/isis/citation/CBB874725102/)

Authors & Contributors
Coeckelbergh, Mark
Ashley Sweetman
Andrej Zwitter
Roesner, Franziska
Adnan Qayyum
Petit, Patrick
Journals
IEEE Technology and Society Magazine
IEEE Annals of the History of Computing
Science as Culture
Ethics, Place and Environment
Centaurus: International Magazine of the History of Mathematics, Science, and Technology
The Bridge: Journal of the National Academy of Engineering
Publishers
MIT Press
Springer Nature
University of Chicago Press
The MIT Press
Reaktion Books
Duke University Press
Concepts
Computers and computing
Technology and society
Computer security; cyber security
Privacy
Security technologies
Computer networks
People
Sternberg, Ernest
Time Periods
21st century
20th century, late
20th century
Places
United States
Middle and Near East
London (England)
Netherlands
France
Europe
Institutions
Facebook (firm)
United States. National Security Agency
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment