Search For:

Displaying 1-27 out of 27 total
War Stories
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:May 2009
pp. 60-63
For humans, war remains an inexhaustible subject of storytelling and analysis—such a compelling topic that experts trace the origins of written history, historiography, to the Athenian general Thucydides, who wrote The Peloponnesian War nearly 2,500 years ...
 
Use the Force, Luke!
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:November 2004
pp. 53-55
In this final installment of Biblio Tech, we'll examine some of the various views of life and intelligence that have thrived in SF over the years. We'll see how these views, coupled with a belief in or desire for human exceptionalism, contribute to our ten...
 
Deus Est Machina
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:July 2004
pp. 51-53
In this installment of Biblio Tech, we'll look at some sci-fi works that challenge classification but have become cult items. Each has become a perennial favorite with the sci-fi community, and several have become fixtures in the computer science community...
 
Hacking the Best-Seller List
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:March 2004
pp. 51-53
In the same way that Windows introduced the masses to graphical user interfaces without having invented them, Dan Brown's books are exploring some important sci-fi themes for the general public. This installment of Biblio Tech departs from the normal patte...
 
The Girl with No Eyes
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:July 2003
pp. 60-64
<p>In this installment of Biblio Tech, we return to cyberpunk, which was very hot in the 1980s and retained considerable power throughout the 1990s. In the first decade of the 21st century, cyberpunk conjures much less, so this is an excellent time t...
 
Hey, Robot!
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:May 2003
pp. 51-55
<p></p>
 
Toward a Security Ontology
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:May 2003
pp. 6-7
<p></p>
 
Post-Apocalypse Now
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:March 2003
pp. 53-55
<p>It's curious that apocalyptic fantasies are such a popular fictional form. What is the allure of the end of civilization as we know it, and how did our interest in it emerge?</p>
 
AI Bites Man?
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:January 2003
pp. 63-66
<p>We know that science fiction has introduced several terms that are now commonplace in computer security, but is it a harbinger of privacy-threatening new technology or just harmless fantasy?</p>
 
The Invisible Computers
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:November 2011
pp. 3
Marc Donner's valedictory EIC message addresses the ubiquity of computers as system components, whose embedded, interconnected systems have prompted a new generation of security and privacy issues.
 
Privacy and the System Life Cycle
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:March 2011
pp. 3
As the community of software developers matures in its dealings with privacy, it will be faced with challenges in the evolution of software. To date, there is little in the way of practical guidance for developers and less in the way of tools and technique...
 
Phagocytes in Cyberspace
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:September 2010
pp. 3-4
In recent years two things have become clear: first, the fight against malware is essentially unwinnable, and second, there is a way forward. Production and distribution of malware has become a business energized by powerful economic forces. The defenders ...
 
International Blues
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:March 2010
pp. 3
IEEE Security & Privacy could be a lot more international in its focus and content. Reflecting on the content and tone over the past seven years (yes, S&P is seven years old!), it's hard to tell that we do think of either privacy or security in a b...
 
New Models for Old
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:July 2009
pp. 3-4
When faced with a new thing, human beings do something very sensible. They try to harness previous experience and intuition in service of the new thing. How is this new thing like something that I already know and understand? Trying to model the new thing ...
 
Reading (with) the Enemy
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:January 2009
pp. 3
Associate editor in chief Marc Donner explains why it's still worth reading
 
Lessons from Electrification for Identification
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:March 2008
pp. 3
As we've seen with the electrical system's evolution and the reengineering of the US voting system, change makes us rediscover essential assumptions and expectations about systems as well as their complexity and inherent risks. In the case of e-voting, the...
 
Charge of the Light Brigade
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:January 2008
pp. 5-5
Security & Privacy's associate editor in chief, Marc Donner, discusses the upcoming vote on the Protect America Act, as well as an article about that act in the issue.
 
Cyberassault on Estonia
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:July 2007
pp. 4-5
Security & Privacy's associate editor in chief considers the recent cyberattack on Estonia.
 
Insecurity through Obscurity
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:September 2006
pp. 4
Figuring out how to gather and share data might not be as glamorous as cracking a tough cipher or thwarting an exploit, but it does have great leverage.
 
The Impending Debate
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:March 2006
pp. 4-5
President Bush says that he has the authority to order, without a warrant, eavesdropping on telephone calls and emails from and to people who have been identified as terrorists. Our community's challenge in the coming debate is to participate effectively, ...
 
There Ain't No Inside, There Ain't No Outside.
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:September 2005
pp. 4-5
Although Jim Krueger might be right that there are no good guys or bad guys in a romantic disagreement, in computer security, there are definitely good guys and bad guys. What there isn't, however, is an inside and an outside.
 
A Young Geek's Fancy Turns to.Science Fiction?
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:May 2005
pp. 58-60
With all due respect to Alfred, Lord Tennyson, the spring is the best time to plan your summer reading (besides, this magazine isn't the place to explore the racier topics in his poem
 
What's in a Name?
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:March 2005
pp. 4-5
The author examines the debate about Microsoft's Passport technology--it will be difficult to design a workable Internet identity framework. We?re currently trapped between Scylla and Charybdis. On one side, civil libertarians warn that a centralized authe...
 
From the Editors: A Witty Lesson
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:July 2004
pp. 5
Associate Editor in Chief Marc Donner examines the Witty Worm and what its existence might mean for the future of the software development infrastructure.
 
Cult Classics
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:May 2004
pp. 66-68
In this installment of Biblio Tech, we?ll look at some sci-fi works that challenge classification but have become cult items. Each has become a perennial favorite with the sci-fi community, and several have become fixtures in the computer science community...
 
From the Editors: Whose Data Are These, Anyway?
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:May 2004
pp. 5-6
Certainly the medical community, struggling with new HIPAA rules governing medical privacy, doesn?t seem to have managed to provoke an engagement from the computer-science and software-engineering research community. This is unfortunate for several reasons...
 
Die Gedanken Sind Frei
Found in: IEEE Security and Privacy
By Marc Donner
Issue Date:January 2004
pp. 53-55
<p>Security and privacy are twin social goods that exist in perpetual tension: our society has debated the trade-offs between them ever since the first days of social organization. Over the ages, the border between security and privacy has moved back...
 
 1