Abstract
The Internet’s underlying architecture poorly supports many users’ current security and privacy needs. This architecture reflects decades-old design decisions by technologists involved in creating the Internet. It can be viewed as an example of the separation between the interests and understanding of technologists and those of the subsequent technology end users. Alternatively, it can be considered the outcome of the needs of a particular set of users, technologists. This view, of the technologist as part of a technology culture among many cultural groupings using the Internet, goes further in explaining the security and privacy characteristics of the Internet today than an alternative critique of technology and usage, that there is an inevitable divide between technologists and non-technologist users.
Chapter PDF
Similar content being viewed by others
References
Baran, P.: On Distributed Communications. In: United States Air Force Project RAND, RAND Corporation, viewed 25 January 2007 (1964), http://www.rand.org/about/history/-baran.list.html
Cerf, V.: Vint Cerf Talks About Internet, Slashdot, viewed 17 October 2002 (2002), http://interviews.slashdot.org/
Abbate, J.: Inventing the Internet. MIT Press, Cambridge, MA (1999)
Hafner, K., Lyon, M.: Where Wizards Stay Up Late: The Origins of the Internet, Touchstone, New York (1998)
Naughton, J A: Brief History of the Future: The Origins of the Internet, Phoenix, London (2000)
Metcalfe, R.M.: The Stockings Were Hung By the Chimney with Care, RFC 602, viewed 1 February 2007 (1973), ftp://ftp.rfc-editor.org/in-notes/rfc602.txt
Pethia, R., Crocker, S., Fraser, B.: Guidelines for the Secure Operation of the Internet, RFC 1281, viewed 1 February 2007 (1991), ftp://ftp.rfc-editor.org/in-notes/rfc1281.txt
Berners-Lee, T.: Information Management: A Proposal, internal CERN document, viewed 21 August 2006 (1989), http://www.w3.org/History/1989/proposal.html
Galbraith, J.K.: The New Industrial State. New American Library, New York (1968)
Winner, L.: Autonomous Technology: Technics-Out-of-Control as a Theme in Political Thought. MIT Press, Cambridge, MA (1978)
Adamson, G.: The Mixed Experience of Achieving Business Benefit from the Internet: A Multi-disciplinary Study, RMIT University, Melbourne, Viewed 31 July 2006 (2004), http://adt.lib.rmit.edu.au/adt/public/adt-VIT20041105.112155
Handley, M.: Why the Internet Only Just Works. BT Technology Journal 24(3), 119–129 (2006)
Stefik, M.: Internet Dreams: Archetypes, Myths, and Metaphors. MIT Press, Cambridge, MA (1996)
Bunnell, D., Brate, A.: Making the Cisco Connection: The Story Behind the Real Internet Superpower. John Wiley & Sons, New York (2000)
McAfee, A.: Mastering the Three Worlds of Information Technology, Harvard Business Review, pp. 141–149 (November 2006)
Marvin, C.: When Old Technologies Were New: Thinking About Electric Communication in the Late Nineteenth Century. Oxford University Press, New York (1988)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons, New York (1996)
Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley Computer Publishing, New York (2000)
Carr, N.G.: IT Doesn’t Matter. Harvard Business Review 81(5), 41–49 (2003)
Porter, M.E.: Competitive Advantage: Creating and Sustaining Superior Performance. Free Press, New York (1985)
Carr, N.I.: Doesn’t Matter: Responses, viewed 16 February 2007 ( 2003), http://www.nicholasgcarr.com/articles/matter.html
Gong, L., Sandhu, R.: What Makes Security Technologies Relevant? IEEE Internet Computing 4(6), 38–41 (2000)
Brown, J.S.: Seeing Differently: Insights on Innovation, Harvard Business School Press, Boston (1997)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Adamson, G. (2007). The Technologist and Internet Security and Privacy Practices. In: Aykin, N. (eds) Usability and Internationalization. Global and Local User Interfaces. UI-HCII 2007. Lecture Notes in Computer Science, vol 4560. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73289-1_35
Download citation
DOI: https://doi.org/10.1007/978-3-540-73289-1_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73288-4
Online ISBN: 978-3-540-73289-1
eBook Packages: Computer ScienceComputer Science (R0)