Abstract:
Tracing the history of computer security and privacy is a mammoth undertaking, somewhat resembling eff orts to combine archaeology and ethnology with a compendium of past...Show MoreMetadata
Abstract:
Tracing the history of computer security and privacy is a mammoth undertaking, somewhat resembling eff orts to combine archaeology and ethnology with a compendium of past and foreseen risks—and how different courses of history might have affected those risks in different ways. (For example, the University of Minnesota’s NSF-funded collection of oral histories from influential people in this area is a wonderful eff ort to capture some this information; https://wiki. umn.edu/CBI_ComputerSecurity/WebHome.)
Published in: IEEE Security & Privacy ( Volume: 12, Issue: 3, May-June 2014)
DOI: 10.1109/MSP.2014.59