Presented to you through Paradigm Publishing Services
Cornell University Press
Chapter
Licensed
Unlicensed
Requires Authentication
1. A “New Dimension” for the Security of Information
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Contents vii
- Introduction: Three Stigmata 1
- 1. A “New Dimension” for the Security of Information 5
- 2. The Promise, Success, and Failure of the Early Researchers 13
- 3. The Creation of the Internet and the Web, and a Dark Portent 32
- 4. The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop 55
- 5. Software Security and the “Hamster Wheel of Pain” 78
- 6. Usable Security, Economics, and Psychology 100
- 7. Vulnerability Disclosure, Bounties, and Markets 127
- 8. Data Breaches, Nation-State Hacking, and Epistemic Closure 152
- 9. The Wicked Nature of Information Security 176
- Epilogue: The Past, Present, and a Possible Future 200
- Acknowledgments 205
- Notes 207
- Select Bibliography 283
- Index 289
Chapters in this book
- Frontmatter i
- Contents vii
- Introduction: Three Stigmata 1
- 1. A “New Dimension” for the Security of Information 5
- 2. The Promise, Success, and Failure of the Early Researchers 13
- 3. The Creation of the Internet and the Web, and a Dark Portent 32
- 4. The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop 55
- 5. Software Security and the “Hamster Wheel of Pain” 78
- 6. Usable Security, Economics, and Psychology 100
- 7. Vulnerability Disclosure, Bounties, and Markets 127
- 8. Data Breaches, Nation-State Hacking, and Epistemic Closure 152
- 9. The Wicked Nature of Information Security 176
- Epilogue: The Past, Present, and a Possible Future 200
- Acknowledgments 205
- Notes 207
- Select Bibliography 283
- Index 289