Stewart, Andrew J. (Author)
As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives.
...More
Book
Duane C. Wilson;
(2021)
Cybersecurity
Article
Ashwin Jacob Mathew;
(2024)
Unscripted Practices for Uncertain Events: Organizational Problems in Cybersecurity Incident Management
Book
Ashley Sweetman;
(2022)
Cyber and the City: Securing London’s Banks in the Computer Age
Thesis
Rowe, Josh;
(2011)
The Public Life of Information
Article
Roesner, Franziska;
(Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering
Article
Ons Al-Shamaileh;
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
Article
O. M. Bonastre;
A. Veà;
(2019)
Origins of the Domain Name System
Book
Ruha Benjamin;
(2019)
Captivating Technology: Race, Carceral Technoscience, and Liberatory Imagination in Everyday Life
Article
Kristina Milanovic;
(March 2020)
Smart Home Security: How Safe is Your Data?
Book
David D. Clark;
Sandra Braman;
(2018)
Designing an Internet
Book
Stevens, Hallam;
(2013)
Life out of Sequence: A Data-Driven History of Bioinformatics
Book
Rayward, W. Boyd;
(2008)
European modernism and the information society: Informing the present, understanding the past
Article
R. Subramanian;
(2020)
Historical Consciousness of Cyber Security in India
Article
Yoshiyasu Takefuji;
(March 2018)
Connected Vehicle Security Vulnerabilities
Article
Till Winkler;
Sarah Spiekermann;
(September 2019)
Human Values as the Basis for Sustainable Information System Design
Article
Jones, Anita K.;
Wulff, William A;
(Spring 2002)
Cybersecurity
Article
Norma Möllers;
(January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State
Book
Geoff White;
(2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
Article
Eugene H. Spafford;
(Summer 2007)
Voter Assurance
Be the first to comment!