Inside Risks

Articles from the CACM Inside Risks column edited by by Peter G. Neumann.

This collections includes 120 articles published between 1990 and 2024.

(stats / articles)




2024 (1)

2024
The Future of Misuse Detection
Communications of the ACM 2024 (11); by Peter G. Neumann, Ulf Lindqvist

2023 (1)

2023
Computer-Related Risks and Remediation Challenges
Communications of the ACM 2023 (6); by Peter G. Neumann

2022 (1)

2022
Toward total-system trustworthiness
Communications of the ACM 2022 (6); by Peter G. Neumann

2021 (1)

2021
The risks of election believability (or lack thereof)
Communications of the ACM 2021 (6); by Rebecca T. Mercuri, Peter G. Neumann

2020 (1)

2020
A holistic view of future risks
Communications of the ACM 2020 (10); by Peter G. Neumann

2019 (2)

2019
How might we increase system trustworthiness?
Communications of the ACM 2019 (10); by Peter G. Neumann
2019
Through computer architecture, darkly
Communications of the ACM 2019 (6); by A. Theodore Markettos, Robert N. M. Watson, Simon W. Moore, Peter Sewell, Peter G. Neumann

2018 (1)

2018
The big picture
Communications of the ACM 2018 (11); by Steven M. Bellovin, Peter G. Neumann

2017 (2)

2017
Trustworthiness and truthfulness are essential
Communications of the ACM 2017 (6); by Peter G. Neumann
2017
The future of the internet of things
Communications of the ACM 2017 (2); by Peter G. Neumann

2016 (2)

2016
Risks of automation: a cautionary total-system perspective of our cyberfuture
Communications of the ACM 2016 (10); by Peter G. Neumann
2016
The risks of self-auditing systems
Communications of the ACM 2016 (6); by Rebecca T. Mercuri, Peter G. Neumann

2015 (2)

2015
Keys under doormats
Communications of the ACM 2015 (10); by Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner
2015
Far-sighted thinking about deleterious computer-related events
Communications of the ACM 2015 (2); by Peter G. Neumann

2014 (1)

2014
Risks and myths of cloud computing and cloud storage
Communications of the ACM 2014 (10); by Peter G. Neumann

2013 (1)

2013
More sight on foresight
Communications of the ACM 2013 (2); by Peter G. Neumann

2012 (1)

2012
The foresight saga, redux
Communications of the ACM 2012 (10); by Peter G. Neumann

2009 (1)

2009
Inside risks - U.S. election after-math
Communications of the ACM 2009 (2); by Peter G. Neumann

2008 (2)

2008
Risks of neglecting infrastructure
Communications of the ACM 2008 (6); by Jim Horning, Peter G. Neumann
2008
Reflections on computer-related risks
Communications of the ACM 2008 (1); by Peter G. Neumann

2007 (4)

2007
Internal surveillance, external risks
Communications of the ACM 2007 (12); by Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neumann
2007
Toward a safer and more secure cyberspace
Communications of the ACM 2007 (10); by Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman
2007
E-migrating risks?
Communications of the ACM 2007 (9); by Peter G. Neumann
2007
Widespread network failures
Communications of the ACM 2007 (2); by Peter G. Neumann

2006 (4)

2006
The foresight saga
Communications of the ACM 2006 (9); by Peter G. Neumann
2006
Risks relating to system compositions
Communications of the ACM 2006 (7); by Peter G. Neumann
2006
Risks of RFID
Communications of the ACM 2006 (5); by Peter G. Neumann, Lauren Weinstein
2006
Trustworthy systems revisited
Communications of the ACM 2006 (2); by Peter G. Neumann

2005 (3)

2005
Disability-related risks
Communications of the ACM 2005 (8); by Peter G. Neumann, Michael D. Byrne
2005
Anticipating disasters
Communications of the ACM 2005 (3); by Peter G. Neumann
2005
Responsibilities of technologists
Communications of the ACM 2005 (2); by Peter G. Neumann

2004 (3)

2004
Introduction
Communications of the ACM 2004 (10); by Peter G. Neumann
2004
The big picture
Communications of the ACM 2004 (9); by Peter G. Neumann
2004
Optimistic optimization
Communications of the ACM 2004 (6); by Peter G. Neumann

2003 (5)

2003
Security by obscurity
Communications of the ACM 2003 (11); by Rebecca Mercuri, Peter G. Neumann
2003
Information system security redux
Communications of the ACM 2003 (10); by Peter G. Neumann
2003
Risks in trusting untrustworthiness
Communications of the ACM 2003 (9); by Peter G. Neumann
2003
E-epistemology and misinformation
Communications of the ACM 2003 (5); by Peter G. Neumann
2003
Gambling on system accountability
Communications of the ACM 2003 (2); by Peter G. Neumann

2001 (5)

2001
Risks of National Identity Cards
Communications of the ACM 2001 (12); by Peter G. Neumann, Lauren Weinstein
2001
Inside Risks: Risks of Panic
Communications of the ACM 2001 (11); by Lauren Weinstein, Peter G. Neumann
2001
Computers: boon or bane?
Communications of the ACM 2001 (3); by Peter G. Neumann, David Lorge Parnas
2001
What to know about risks
Communications of the ACM 2001 (2); by Peter G. Neumann
2001
System integrity revisited
Communications of the ACM 2001 (1); by Rebecca Mercuri, Peter G. Neumann

2000 (5)

2000
Missile defense
Communications of the ACM 2000 (9); by Peter G. Neumann
2000
Risks in retrospect
Communications of the ACM 2000 (7); by Peter G. Neumann
2000
Internet Risks
Communications of the ACM 2000 (5); by Lauren Weinstein, Peter G. Neumann
2000
Denial-of-Service Attacks
Communications of the ACM 2000 (4); by Peter G. Neumann
2000
A Tale of Two Thousands
Communications of the ACM 2000 (3); by Peter G. Neumann

1999 (5)

1999
Risks of Insiders
Communications of the ACM 1999 (12); by Peter G. Neumann
1999
Risks of Content Filtering
Communications of the ACM 1999 (11); by Peter G. Neumann, Lauren Weinstein
1999
Information is a Double-Edged Sword
Communications of the ACM 1999 (7); by Peter G. Neumann
1999
Risks of Y2K
Communications of the ACM 1999 (6); by Peter G. Neumann, Declan McCullagh
1999
Robust Open-Source Software
Communications of the ACM 1999 (2); by Peter G. Neumann

1998 (6)

1998
Risks of E-Education
Communications of the ACM 1998 (10); by Peter G. Neumann
1998
Y2K Update
Communications of the ACM 1998 (9); by Peter G. Neumann
1998
Laptops in Congress?
Communications of the ACM 1998 (7); by Peter G. Neumann
1998
Are Computers Addictive?
Communications of the ACM 1998 (3); by Peter G. Neumann
1998
Internet Gambling
Communications of the ACM 1998 (2); by Peter G. Neumann
1998
Protecting the Infrastructures
Communications of the ACM 1998 (1); by Peter G. Neumann

1997 (7)

1997
System Development Woes
Communications of the ACM 1997 (12); by Peter G. Neumann
1997
Integrity in Software Development
Communications of the ACM 1997 (10); by Peter G. Neumann
1997
Crypto Key Management
Communications of the ACM 1997 (8); by Peter G. Neumann
1997
Identity-Ralated Misuse
Communications of the ACM 1997 (7); by Peter G. Neumann
1997
Spam, Spam, Spam!
Communications of the ACM 1997 (6); by Peter G. Neumann, Lauren Weinstein
1997
The Big Picture
Communications of the ACM 1997 (5); by Peter G. Neumann
1997
Hopes for Fewer Risks?
Communications of the ACM 1997 (2); by Peter G. Neumann

1996 (8)

1996
Risks of Anonymity
Communications of the ACM 1996 (12); by Peter G. Neumann
1996
Distributed Systems have Distributed Risks
Communications of the ACM 1996 (11); by Peter G. Neumann
1996
Disinformation Theory
Communications of the ACM 1996 (10); by Peter G. Neumann
1996
Using Formal Methods to Reduce Risks
Communications of the ACM 1996 (7); by Peter G. Neumann
1996
Linguistic Risks
Communications of the ACM 1996 (5); by Peter G. Neumann
1996
A Risks-related Bookshelf
Communications of the ACM 1996 (4); by Peter G. Neumann
1996
W(h)ither Research and Education?
Communications of the ACM 1996 (2); by Peter G. Neumann, Peter J. Denning
1996
Risks in Digital Commerce
Communications of the ACM 1996 (1); by Peter G. Neumann

1995 (4)

1995
Reviewing the Risks Archives
Communications of the ACM 1995 (12); by Peter G. Neumann
1995
Risks of Easy Answers
Communications of the ACM 1995 (9); by Peter G. Neumann
1995
Computer Vulnerabilities: Exploitation or Avoidance
Communications of the ACM 1995 (6); by Peter G. Neumann
1995
Reassessing the Crypto Debate
Communications of the ACM 1995 (3); by Peter G. Neumann

1994 (8)

1994
Inside "Inside Risks"
Communications of the ACM 1994 (12); by Peter G. Neumann
1994
Expectations of Security and Privacy
Communications of the ACM 1994 (9); by Peter G. Neumann
1994
Friendly Fire
Communications of the ACM 1994 (8); by Peter G. Neumann
1994
Crypto Policy Perspectives
Communications of the ACM 1994 (8); by Susan Landau, Stephen T. Kent, Clinton Brooks, Scott Charney, Dorothy E. Denning, Whitfield Diffie, Anthony Lauck, Douglas Miller, Peter G. Neumann, David Sobel
1994
Risks on the Information Superhighway
Communications of the ACM 1994 (6); by Peter G. Neumann
1994
Alternative Passwords
Communications of the ACM 1994 (5); by Peter G. Neumann
1994
Risks of Passwords
Communications of the ACM 1994 (4); by Peter G. Neumann
1994
Technology, Laws, and Society
Communications of the ACM 1994 (3); by Peter G. Neumann

1993 (10)

1993
System Development Woes
Communications of the ACM 1993 (10); by Peter G. Neumann
1993
Animal Crackers
Communications of the ACM 1993 (9); by Peter G. Neumann
1993
Risks of Surveillance
Communications of the ACM 1993 (8); by Peter G. Neumann
1993
Risks on the Rails
Communications of the ACM 1993 (7); by Peter G. Neumann
1993
Modeling and Simulation
Communications of the ACM 1993 (6); by Peter G. Neumann
1993
The Role of Software Engineering
Communications of the ACM 1993 (5); by Peter G. Neumann
1993
Using Names as Identifiers
Communications of the ACM 1993 (4); by Peter G. Neumann
1993
Risks of Technology
Communications of the ACM 1993 (3); by Peter G. Neumann
1993
Are Dependable Systems Feasible?
Communications of the ACM 1993 (2); by Peter G. Neumann
1993
Risks Considered Global(ly)
Communications of the ACM 1993 (1); by Peter G. Neumann

1992 (9)

1992
Avoiding Weak Links
Communications of the ACM 1992 (12); by Peter G. Neumann
1992
Where to Place Trust
Communications of the ACM 1992 (10); by Peter G. Neumann
1992
Accidental Financial Losses
Communications of the ACM 1992 (9); by Peter G. Neumann
1992
Fraud by Computer
Communications of the ACM 1992 (8); by Peter G. Neumann
1992
Aggravation by Computer: Life, Death, and Taxes
Communications of the ACM 1992 (7); by Peter G. Neumann
1992
Leap-Year Problems
Communications of the ACM 1992 (6); by Peter G. Neumann
1992
Survivable Systems
Communications of the ACM 1992 (5); by Peter G. Neumann
1992
Inside "Risks of Risks"
Communications of the ACM 1992 (3); by Peter G. Neumann
1992
What's in a Name?
Communications of the ACM 1992 (1); by Peter G. Neumann

1991 (9)

1991
Collaborative Effords
Communications of the ACM 1991 (12); by Peter G. Neumann
1991
The Human Element
Communications of the ACM 1991 (11); by Peter G. Neumann
1991
The Not-So-Accidental Holist
Communications of the ACM 1991 (9); by Peter G. Neumann
1991
Computers, Ethics, and Values
Communications of the ACM 1991 (7); by Peter G. Neumann
1991
Expecting the Unexpected Mayday
Communications of the ACM 1991 (5); by Peter G. Neumann
1991
Interpreting (Mis)information
Communications of the ACM 1991 (4); by Peter G. Neumann
1991
Putting on Your Best Interface
Communications of the ACM 1991 (3); by Peter G. Neumann
1991
Certifying Professionals
Communications of the ACM 1991 (2); by Peter G. Neumann
1991
The Clock Grows at Midnight
Communications of the ACM 1991 (1); by Peter G. Neumann

1990 (5)

1990
Risks in Computerized Elections
Communications of the ACM 1990 (11); by Peter G. Neumann
1990
Ghosts, Mysteries and Uncertainty
Communications of the ACM 1990 (10); by Peter G. Neumann
1990
A Few Old Coincidences
Communications of the ACM 1990 (9); by Peter G. Neumann
1990
Insecurity about Security?
Communications of the ACM 1990 (8); by Peter G. Neumann
1990
Some Reflections on a Telephone Switching Problem
Communications of the ACM 1990 (7); by Peter G. Neumann