人类学对网络安全的看法:遗留的安全信仰体系如何影响我们今天

S. Squires
{"title":"人类学对网络安全的看法:遗留的安全信仰体系如何影响我们今天","authors":"S. Squires","doi":"10.33552/oajaa.2020.02.000535","DOIUrl":null,"url":null,"abstract":"Between 70% and 97% of all cyber breaches can be attributed directly or indirectly to human errors (Ponemon Institute 2018) [1]. In this opinion piece, we explore the archeology of cyber-security embedded in 20th century legacy belief and its artifacts. During the “formative period” of the computer in the last quarter of the 20th century, computers became generally available to a few societies that existed at the time. Archaic documents, such as early advertisements and bills of sale, confirm the spread of these early tools from places of work to domestic spaces. From histories we know that such computers were primarily standalone devices. If connected, modem-mediated access to the early Internet was conducted through telephone lines, which provided a mechanism for sending emails to immediate kin, friends or workgroup members.","PeriodicalId":134300,"journal":{"name":"Open Access Journal of Archaeology & Anthropology","volume":"212 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anthropological Take on Cyber-security: How a Legacy Security Belief System is Impacting Us Today\",\"authors\":\"S. Squires\",\"doi\":\"10.33552/oajaa.2020.02.000535\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Between 70% and 97% of all cyber breaches can be attributed directly or indirectly to human errors (Ponemon Institute 2018) [1]. In this opinion piece, we explore the archeology of cyber-security embedded in 20th century legacy belief and its artifacts. During the “formative period” of the computer in the last quarter of the 20th century, computers became generally available to a few societies that existed at the time. Archaic documents, such as early advertisements and bills of sale, confirm the spread of these early tools from places of work to domestic spaces. From histories we know that such computers were primarily standalone devices. If connected, modem-mediated access to the early Internet was conducted through telephone lines, which provided a mechanism for sending emails to immediate kin, friends or workgroup members.\",\"PeriodicalId\":134300,\"journal\":{\"name\":\"Open Access Journal of Archaeology & Anthropology\",\"volume\":\"212 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Open Access Journal of Archaeology & Anthropology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33552/oajaa.2020.02.000535\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Open Access Journal of Archaeology & Anthropology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33552/oajaa.2020.02.000535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

70%至97%的网络漏洞可直接或间接归因于人为错误(Ponemon Institute 2018)[1]。在这篇观点文章中,我们探索了嵌入在20世纪遗产信仰及其产物中的网络安全考古。在20世纪最后25年的计算机“形成时期”,当时存在的一些社会普遍使用计算机。古代文献,如早期的广告和销售票据,证实了这些早期工具从工作场所传播到家庭空间。从历史上我们知道,这种计算机主要是独立的设备。如果连接上,通过调制解调器连接到早期的互联网是通过电话线进行的,这提供了一种向直系亲属、朋友或工作小组成员发送电子邮件的机制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Anthropological Take on Cyber-security: How a Legacy Security Belief System is Impacting Us Today
Between 70% and 97% of all cyber breaches can be attributed directly or indirectly to human errors (Ponemon Institute 2018) [1]. In this opinion piece, we explore the archeology of cyber-security embedded in 20th century legacy belief and its artifacts. During the “formative period” of the computer in the last quarter of the 20th century, computers became generally available to a few societies that existed at the time. Archaic documents, such as early advertisements and bills of sale, confirm the spread of these early tools from places of work to domestic spaces. From histories we know that such computers were primarily standalone devices. If connected, modem-mediated access to the early Internet was conducted through telephone lines, which provided a mechanism for sending emails to immediate kin, friends or workgroup members.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信