<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
Hi all,<br>
It is interesting to know about the CBI's on-going research on the
history of computer security. I just wanted to mention a closely
related topic which spans security and policy: information privacy.
It would be interesting to study the history and evolution of
privacy as related to information technologies. A few year ago I
wrote a paper on the evolution of privacy in India, but I wanted to
know if there is any similar work that's been done in this area.<br>
<br>
Regards,<br>
-Ramesh<br>
<pre class="moz-signature" cols="72">------------------------------------------------------------------------------------
Ramesh Subramanian, Ph.D.
Gabriel Ferrucci Professor of Information Systems
Quinnipiac University
275 Mount Carmel Avenue
Hamden, CT 06518.
Email: <a class="moz-txt-link-abbreviated" href="mailto:rameshs@quinnipiac.edu">rameshs@quinnipiac.edu</a>
Web: <a class="moz-txt-link-freetext" href="http://www.quinnipiac.edu/x1288.xml?Person=23345&type=5">http://www.quinnipiac.edu/x1288.xml?Person=23345&type=5</a>
&
Visiting Fellow, Information Society Project
Yale Law School
127 Wall Street
New Haven, CT 06511.
Email: <a class="moz-txt-link-abbreviated" href="mailto:ramesh.subramanian@yale.edu">ramesh.subramanian@yale.edu</a>
Web: <a class="moz-txt-link-freetext" href="http://www.law.yale.edu/intellectuallife/9841.htm">http://www.law.yale.edu/intellectuallife/9841.htm</a></pre>
<br>
On 3/11/2012 2:53 PM, Jeffrey Yost wrote:
<blockquote
cite="mid:CAMKx8T2wzrFURjiT7hHdsaXYDQq+HMa_4Nuvk0TuL77gNSxSYg@mail.gmail.com"
type="cite">
<div>Jon,</div>
<div> </div>
<div>Very little research has been published to date on the
history of computer security. Given the lack of literature on
this important topic (and quality resources to study it), the
Charles Babbage Institute proposed and was funded for a three
year National Science Foundation-supported study to build
infrastructure for computer security history. We are just
getting underway with this project and will be conducting more
than 30 in-depth career-spanning oral history interviews with
first generation computer security pioneers (these will be
transcribed, edited, and freely available--our standard practice
with CBI's oral history program). We will also be actively
engaging in archival collection development efforts for computer
security documentation (we already have some strong holding such
as the Willis Ware Papers and the Donn Parker Papers), and
will publish scholarship from this research project. An
advisory committee of leading computer security pioneers is
providing guidance to us on this project.</div>
<div> </div>
<div>Historian and Sociologist of Science Donald McKenzie did a
few important articles and book chapters--see his book
Mechanizing Proof and an article (co-authored w/ G. Pottinger)
on high assurance work w/in the DoD (primarily work by the Air
Force and Air Force contractors that helped lead to TCSEC or the
Orange Book) published in IEEE Annals of the History of
Computing <span class="st">19 (3) (1997): 41-59</span>.</div>
<div> </div>
<div>Also, I did a survey book chapter on the history of computer
security standards in de Leeuw and Bergstra's book The History
of Information Security a few years ago. History of
cryptography has been far more thoroughly studied and has a
significant secondary literature (most of the chapters in the de
Leeuw and Bergstra volume are on this topic) and the NSA
Cryptologic Museum sponsors a regular conference/symposium on
the history of cryptography.</div>
<div><br>
Cheers,</div>
<div>Jeff<br>
<br>
</div>
<div class="gmail_quote">On Sun, Mar 11, 2012 at 1:14 PM, Jon
Lindsay <span dir="ltr"><<a moz-do-not-send="true"
href="mailto:jrlindsay@ucsd.edu">jrlindsay@ucsd.edu</a>></span>
wrote:<br>
<blockquote style="margin:0px 0px 0px
0.8ex;padding-left:1ex;border-left-color:rgb(204,204,204);border-left-width:1px;border-left-style:solid"
class="gmail_quote">
Hello all,
<div>I have the feeling that the history of computer security,
from hacking techniques to the evolution of the information
security industry to fearmongering over cybersecurity, is a
somewhat understudied area. I have seen some work on the
development of government policy and threat framing (i.e.,
by Myriam Dunn Cavelty) but I'm less aware of anything on
the evolution of the technical and industrial dark arts. If
there is some good work out there, I would love to see it. </div>
<div>Bonus points if you can tell me when the awful phrase
"digital pearl harbor" first appeared!</div>
<div>Cheers,</div>
<div>Jon</div>
<div><br>
</div>
<br>
_______________________________________________<br>
This email is relayed from <a moz-do-not-send="true"
href="mailto:members@sigcis.org">members@sigcis.org</a>, the
email discussion list of SHOT SIGCIS. The list archives are at
<a moz-do-not-send="true"
href="http://sigcis.org/pipermail/members/" target="_blank">http://sigcis.org/pipermail/members/</a>
and you can change your subscription options at <a
moz-do-not-send="true"
href="http://sigcis.org/mailman/listinfo/members"
target="_blank">http://sigcis.org/mailman/listinfo/members</a><br>
</blockquote>
</div>
<br>
<br clear="all">
<br>
-- <br>
<div>Jeffrey R. Yost, Ph.D.</div>
<div>Associate Director, Charles Babbage Institute</div>
<div>Faculty, Program in the History of Science, Technology, and
Medicine</div>
<div> </div>
<div>222 21st Avenue South</div>
<div>University of Minnesota</div>
<div>Minneapolis, MN 55455</div>
<div> </div>
<div>612 624 5050 Phone</div>
<div>612 625 8054 Fax</div>
<br>
</blockquote>
</body>
</html>