{"title":"人类学对网络安全的看法:遗留的安全信仰体系如何影响我们今天","authors":"S. Squires","doi":"10.33552/oajaa.2020.02.000535","DOIUrl":null,"url":null,"abstract":"Between 70% and 97% of all cyber breaches can be attributed directly or indirectly to human errors (Ponemon Institute 2018) [1]. In this opinion piece, we explore the archeology of cyber-security embedded in 20th century legacy belief and its artifacts. During the “formative period” of the computer in the last quarter of the 20th century, computers became generally available to a few societies that existed at the time. Archaic documents, such as early advertisements and bills of sale, confirm the spread of these early tools from places of work to domestic spaces. From histories we know that such computers were primarily standalone devices. If connected, modem-mediated access to the early Internet was conducted through telephone lines, which provided a mechanism for sending emails to immediate kin, friends or workgroup members.","PeriodicalId":134300,"journal":{"name":"Open Access Journal of Archaeology & Anthropology","volume":"212 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anthropological Take on Cyber-security: How a Legacy Security Belief System is Impacting Us Today\",\"authors\":\"S. Squires\",\"doi\":\"10.33552/oajaa.2020.02.000535\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Between 70% and 97% of all cyber breaches can be attributed directly or indirectly to human errors (Ponemon Institute 2018) [1]. In this opinion piece, we explore the archeology of cyber-security embedded in 20th century legacy belief and its artifacts. During the “formative period” of the computer in the last quarter of the 20th century, computers became generally available to a few societies that existed at the time. Archaic documents, such as early advertisements and bills of sale, confirm the spread of these early tools from places of work to domestic spaces. From histories we know that such computers were primarily standalone devices. If connected, modem-mediated access to the early Internet was conducted through telephone lines, which provided a mechanism for sending emails to immediate kin, friends or workgroup members.\",\"PeriodicalId\":134300,\"journal\":{\"name\":\"Open Access Journal of Archaeology & Anthropology\",\"volume\":\"212 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Open Access Journal of Archaeology & Anthropology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33552/oajaa.2020.02.000535\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Open Access Journal of Archaeology & Anthropology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33552/oajaa.2020.02.000535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
70%至97%的网络漏洞可直接或间接归因于人为错误(Ponemon Institute 2018)[1]。在这篇观点文章中,我们探索了嵌入在20世纪遗产信仰及其产物中的网络安全考古。在20世纪最后25年的计算机“形成时期”,当时存在的一些社会普遍使用计算机。古代文献,如早期的广告和销售票据,证实了这些早期工具从工作场所传播到家庭空间。从历史上我们知道,这种计算机主要是独立的设备。如果连接上,通过调制解调器连接到早期的互联网是通过电话线进行的,这提供了一种向直系亲属、朋友或工作小组成员发送电子邮件的机制。
Anthropological Take on Cyber-security: How a Legacy Security Belief System is Impacting Us Today
Between 70% and 97% of all cyber breaches can be attributed directly or indirectly to human errors (Ponemon Institute 2018) [1]. In this opinion piece, we explore the archeology of cyber-security embedded in 20th century legacy belief and its artifacts. During the “formative period” of the computer in the last quarter of the 20th century, computers became generally available to a few societies that existed at the time. Archaic documents, such as early advertisements and bills of sale, confirm the spread of these early tools from places of work to domestic spaces. From histories we know that such computers were primarily standalone devices. If connected, modem-mediated access to the early Internet was conducted through telephone lines, which provided a mechanism for sending emails to immediate kin, friends or workgroup members.