This article analyzes computer security rhetoric, particularly in the United States, arguing that dominant cultural understandings of immunology, sexuality, legality, citizenship, and capitalism powerfully shape the way computer viruses are construed and combated. Drawing on popular and technical handbooks, articles, and Web sites, as well as on e-mail interviews with security professionals, the author explores how discussions of computer viruses lean on analogies from immunology and in the process often encode popular anxieties about AIDS. Computer security rhetoric about compromised networks also uses language reminiscent of that used to describe the “bodies ” of nation-states under military threat from without and within. Such language p...
The use of “anti-virus ” techniques in many modern worms recalls two stories: the “war” between viru...
S ecuring medical devices against cyberattacks or malware outbreaks and safeguarding protected healt...
This paper argues that scholars of computing, networks, and infrastructures must reckon with the ins...
This article analyzes computer security rhetoric, particularly in the United States, argu-ing that d...
This article deals with articulations of digital accidents, focusing especially on how the computer ...
Computation, in popular imaginations, is at perennial risk of infection from the tools of nefarious ...
This is an article about how cybersecurity gets “made,” with a focus on the role of commercial compu...
In 2010, the discovery of the malicious computer worm Stuxnet shocked the world by its sophisticati...
This article analyzes the transformation in our conception of hacking over the past few decades to t...
In this article, we seek to intervene on the global health security debate and attendant literatures...
Essential systems providing water, electricity, healthcare, finance, food, and transportation are no...
I offer an interpretation of hackers’ technological choices through a theoretical framework of criti...
AbstractThe aim of our article is to provide arguments for a poly-contextual and dynamic approach to...
The purpose of this article is to present three theses – (1) a cultural one: cyberspace is an advanc...
Everyone is well aware that the technological revolution of the 21st century is considered to be the...
The use of “anti-virus ” techniques in many modern worms recalls two stories: the “war” between viru...
S ecuring medical devices against cyberattacks or malware outbreaks and safeguarding protected healt...
This paper argues that scholars of computing, networks, and infrastructures must reckon with the ins...
This article analyzes computer security rhetoric, particularly in the United States, argu-ing that d...
This article deals with articulations of digital accidents, focusing especially on how the computer ...
Computation, in popular imaginations, is at perennial risk of infection from the tools of nefarious ...
This is an article about how cybersecurity gets “made,” with a focus on the role of commercial compu...
In 2010, the discovery of the malicious computer worm Stuxnet shocked the world by its sophisticati...
This article analyzes the transformation in our conception of hacking over the past few decades to t...
In this article, we seek to intervene on the global health security debate and attendant literatures...
Essential systems providing water, electricity, healthcare, finance, food, and transportation are no...
I offer an interpretation of hackers’ technological choices through a theoretical framework of criti...
AbstractThe aim of our article is to provide arguments for a poly-contextual and dynamic approach to...
The purpose of this article is to present three theses – (1) a cultural one: cyberspace is an advanc...
Everyone is well aware that the technological revolution of the 21st century is considered to be the...
The use of “anti-virus ” techniques in many modern worms recalls two stories: the “war” between viru...
S ecuring medical devices against cyberattacks or malware outbreaks and safeguarding protected healt...
This paper argues that scholars of computing, networks, and infrastructures must reckon with the ins...