Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Inventing the Internet
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Internet Dreams: Archetypes, Myths, and Metophors for Inventing the Net
Internet Dreams: Archetypes, Myths, and Metophors for Inventing the Net
Where Wizards Stay up Late: The Origins of the Internet
Where Wizards Stay up Late: The Origins of the Internet
Making the Cisco Connection: The Story Behind the Real Internet Superpower
Making the Cisco Connection: The Story Behind the Real Internet Superpower
Guest Editors' Introduction: What Makes Security Technologies Relevant?
IEEE Internet Computing
Why the Internet only just works
BT Technology Journal
Hi-index | 0.00 |
The Internet's underlying architecture poorly supports many users' current security and privacy needs. This architecture reflects decades-old design decisions by technologists involved in creating the Internet. It can be viewed as an example of the separation between the interests and understanding of technologists and those of the subsequent technology end users. Alternatively, it can be considered the outcome of the needs of a particular set of users, technologists. This view, of the technologist as part of a technology culture among many cultural groupings using the Internet, goes further in explaining the security and privacy characteristics of the Internet today than an alternative critique of technology and usage, that there is an inevitable divide between technologists and non-technologist users.