Book ID: CBB758382142

A Vulnerable System: The History of Information Security in the Computer Age (2021)

unapi

Stewart, Andrew J. (Author)


Cornell University Press
Publication date: 2021
Language: English


Publication Date: 2021
Physical Details: 303

As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives.

...More
Reviewed By

Review Rebecca Slayton (2023) Review of "A Vulnerable System: The History of Information Security in the Computer Age". Technology and Culture (pp. 232-234). unapi

Citation URI
data.isiscb.org/p/isis/citation/CBB758382142

This citation is part of the Isis database.

Similar Citations

Book Colin Koopman; (2019)
How We Became Our Data: A Genealogy of the Informational Person (/p/isis/citation/CBB981384434/) unapi

Book Mary F. E. Ebeling; (2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance (/p/isis/citation/CBB663965321/) unapi

Article Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; Andrzej Nowak; (March 2019)
Democratizing Platforms for Social Coordination (/p/isis/citation/CBB485378597/) unapi

Book Josh Lauer; Kenneth Lipartito; (2021)
Surveillance Capitalism in America (/p/isis/citation/CBB401959068/) unapi

Article Weiner, Amir; Rahi-Tamm, Aigi; (2013)
Getting to Know You: The Soviet Surveillance System, 1939--57 (/p/isis/citation/CBB001200564/) unapi

Book Duane C. Wilson; (2021)
Cybersecurity (/p/isis/citation/CBB201310866/) unapi

Article Roesner, Franziska; (Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering (/p/isis/citation/CBB605988846/) unapi

Article Siddique Latif; Adnan Qayyum; Muhammad Usama; Junaid Qadir; Andrej Zwitter; Muhammad Shahzad; (September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development (/p/isis/citation/CBB326485886/) unapi

Article Ons Al-Shamaileh; (June 2018)
I Have Issues with Facebook: But I Will Keep Using It (/p/isis/citation/CBB503279988/) unapi

Book Ashley Sweetman; (2022)
Cyber and the City: Securing London’s Banks in the Computer Age (/p/isis/citation/CBB340774234/) unapi

Article Evan Selinger; Darrin Durant; (2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service (/p/isis/citation/CBB181826170/) unapi

Thesis Kim, Richard S.Y.; (2010)
Cyber-Surveillance: A Case Study in Policy and Development (/p/isis/citation/CBB001567169/) unapi

Article Darren Ellis; (2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia (/p/isis/citation/CBB734944273/) unapi

Article Ben Falchuk; Shoshana Loeb; Ralph Neff; (June 2018)
The Social Metaverse: Battle for Privacy (/p/isis/citation/CBB447859564/) unapi

Book Francesca Musiani; Derrick L. Cogburn; Laura DeNardis; Nannette S. Levinson; (2016)
The Turn to Infrastructure in Internet Governance (/p/isis/citation/CBB771724730/) unapi

Review Russell, Andrew; (2016)
Review of unknown publication (/p/isis/citation/CBB100069195/) unapi

Article Carsten Ochs; Barbara Büttner; Jörn Lamla; (May 2021)
Trading Social Visibility for Economic Amenability: Data-based Value Translation on a “Health and Fitness Platform” (/p/isis/citation/CBB474517087/) unapi

Book Brian Hochman; (2022)
The Listeners: A History of Wiretapping in the United States (/p/isis/citation/CBB775086796/) unapi

Article Alexander Trauth-Goik; (December 2019)
"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System (/p/isis/citation/CBB323886145/) unapi

Authors & Contributors
Denardis, Laura
Durant, Darrin
Kim, Richard S. Y.
Lauer, Josh
Lipartito, Kenneth
Musiani, Francesca
Journals
IEEE Technology and Society Magazine
Science as Culture
American Quarterly
The Bridge: Journal of the National Academy of Engineering
IEEE Annals of the History of Computing
Kritika: Explorations in Russian and Eurasian History
Publishers
New York, City University of
Harvard University Press
MIT Press
Palgrave Macmillan
University of California Press
University of Chicago Press
Concepts
Privacy
Surveillance
Technology and society
Technology and government
Computers and computing
Computer security; cyber security
Time Periods
21st century
20th century
20th century, late
Modern
18th century
19th century
Places
United States
Great Britain
Soviet Union
China
London (England)
Middle and Near East
Institutions
Facebook (firm)
Amazon (Firm)
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment