1983 marked an important point in the development of how people behaved regarding security on data networks in the United States. The confluence of the movie WarGames with a series of high-profile network breaches of Telenet, one of the biggest commercial data networking providers at the time, created a great deal of popular media attention. This public attention exposed how multiple social groups approached security in the formative period of data networking. As seen through these hacking incidents, persistent problems in network security such as the use of insecure passwords were well established and understood in the 1980s, and led to shifts in social behavior and expectations rather than a change in the technology.
...More
Book
Ben Buchanan;
(2022)
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
(/isis/citation/CBB525584724/)
Book
David D. Clark;
Sandra Braman;
(2018)
Designing an Internet
(/isis/citation/CBB601148284/)
Article
Karl Grindal;
(2022)
Artist Collectives as the Origins of DDoS the Strano Network and Electronic Disturbance Theater
(/isis/citation/CBB585173916/)
Article
Camille Paloque-Berges;
(2022)
How EUNET Hacked European Digital Networks and Disappeared
(/isis/citation/CBB402035453/)
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Article
Nina Klimburg-Witjes;
Alexander Wentland;
(November 2021)
Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses
(/isis/citation/CBB420821642/)
Book
Geoff White;
(2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
(/isis/citation/CBB227937681/)
Article
Iván Chaar-López;
(2019)
Sensing Intruders: Race and the Automation of Border Control
(/isis/citation/CBB923205579/)
Article
Dunbar-Hester, Christina;
(2009)
“Free the spectrum!” Activist encounters with old and new media technology
(/isis/citation/CBB001180356/)
Book
Tsiao, Sunny;
(2008)
“Read You Loud and Clear!”: The Story of NASA's Spaceflight Tracking and Data Network
(/isis/citation/CBB001032649/)
Article
Umpleby, Stuart A.;
(2008)
A Short History of Cybernetics in the United States
(/isis/citation/CBB001032250/)
Chapter
Yost, Jeffrey R.;
(2010)
Materiel command and the materiality of commands: An historical examination of the US Air Force, Control Data Corporation, and the Advanced Logistics Systems
(/isis/citation/CBB001180683/)
Article
Lukasik, Stephen J.;
(2011)
Why the Arpanet Was Built
(/isis/citation/CBB001231710/)
Article
Abbate, Janet;
(2010)
Privatizing the Internet: Competing Visions and Chaotic Events, 1987--1995
(/isis/citation/CBB001231740/)
Book
Johnston, Jessica R.;
(2009)
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
(/isis/citation/CBB001230682/)
Thesis
Gili Vidan;
(2021)
Trading on Trust: Cryptographic Authentication and Digital Decentralization in the United States, 1968–2000
(/isis/citation/CBB882929007/)
Article
P. L. Frana;
(2018)
Telematics and the Early History of International Digital Information Flows
(/isis/citation/CBB402121196/)
Article
Thomas Erslev;
(2018)
A brain worth keeping? Waste, value and time in contemporary brain banking
(/isis/citation/CBB481072702/)
Article
Sarah E. Igo;
(2018)
Me and My Data
(/isis/citation/CBB289516124/)
Be the first to comment!