The Risks Digest Index to Volume 3

The Risks Digest Index to Volume 3

The Risks Digest Index to Volume 3 Search RISKS using swish-e Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Index to Volume 3 Sunday, 2 November 1986 Volume 3 Issue 1 (4 Jun 86) Unshakeable Faith in Technology (Richard A. Cowan) Unshakeable Faith in Technology: Shuttles & Nuclear Power (Peter G. Neumann) Basis for SDI Assumptions? (Doug Schuler) Technical vs. Political in SDI (Herb Lin) Computer Crime Laws (Peter G. Neumann) Backups for micros (Evan Dresel) The Clock Lies Again (PGN, Jagan Jagannathan) Volume 3 Issue 2 (5 Jun 86 ) Are SDI Software predictions biased by old tactical software? (Herb Lin) Volume 3 Issue 3 (6 Jun 86 ) Watch this Space (Eugene Miya) Unshakeable Faith in Technology (Herb Lin) SDI as a defense against terrorists? (Bruce Wampler, Martin Moore, Bernie Gunther) Basis for SDI Assumptions? (Herb Lin) Volume 3 Issue 4 (9 Jun 86 ) Re: Watch this Space (Mark Jackson, Eugene Miya) Software developer's liability (Paul Schauble) What an Algorithm!! (Brian Bishop) Sgt. York's Latrine, and other stories (Mike McLaughlin, Ken Laws) Volume 3 Issue 5 (10 Jun 86) A powerful metal detector and magnetic personalities with bank cards (Matthew P. Wiener) Shuttle Launch Decisions (Don Wegeng) Re: Estell's defense of SDI (Martin Purvis) Sgt. York's Latrine, and other stories (Mike McLaughlin) Volume 3 Issue 6 (12 Jun 86) Risks from inappropriate scale of energy technologies (Michael J. Natkin) Shuttle Software (David C. Smith) http://catless.ncl.ac.uk/Risks/index.3.html[2011-06-10 15:37:46] The Risks Digest Index to Volume 3 An additional SDI problem: sensor technology (Eugene Miya) Privacy in the electronic age (Dave Platt) Sgt York software (Larry Campbell, Mark Vilain) Volume 3 Issue 7 (13 Jun 86) Eastport Study Group report ("Science" article) (Pete Kaiser) An additional SDI problem: sensor technology (Jon Jacky) Shuttle software and CACM (James Tomayko [and Herb Lin]) Privacy laws (Bruce O'Neel) A mini-editorial on running the RISKS Forum (PGN) Volume 3 Issue 8 (15 Jun 86) Challenger, SDI, and management risks (Dick Dunn) Re: Risks from inappropriate scale of energy technologies (Chuck Ferguson) Distributed versus centralized computer systems (Peter G. Neumann) Privacy legislation (Michael Wagner) Volume 3 Issue 9 (20 Jun 86) Informing the Senate on SDI (Jim Horning) A medical risk of computers (Karen R. Sollins) Risks of VDTs (Alan Wexelblat) Minor addition on Risks of Distributed Energy (Ted Lee) Volume 3 Issue 10 (20 Jun 86) Re: Privacy Legislation & Cellular Swiss Cheese (RISKS-3.8)(Geoff Goodfellow) Re: Privacy Legislation (RISKS-3.6) [divulging] (Dan Franklin) Re: Privacy Legislation (RISKS-3.6) [radar detectors] (Herb Lin) Volume 3 Issue 11 (23 Jun 86 [mislabelled RISKS-3.12 in masthead]) A medical risk of computers (overdose during radiation therapy) (Jon Jacky) Secure computer systems (Herb Lin) Radar Detectors (Re: Privacy legislation in RISKS-3.10) (Jeff Makey) Telco Central office woes in Southfield, MI. (via Geoff Goodfellow) Reducing the managerial risks in SDI (Bob Estell) Economic Impact of SDI: Transcript Info (Richard A. Cowan) Volume 3 Issue 12 (24 Jun 86) License Plate Risks (Chuck Price) SDI is for ICBMs, Not Terrorists (Mark Day) Still another kind of clock problem (Rodney Hoffman) Estimating Unreported Incidents (Ken Laws) Estimating Unreported Incidents -- and the risks of using statistics (PGN) Re: Privacy legislation (RISKS-3.8) and radio eavesdropping (Jerry Mungle, Jeff Mogul, Jim Aspnes) Volume 3 Issue 13 (26 Jun 86) The Risky Gap Between Two Design Cultures (Jack Goldberg) Risks of nuclear power (Dan Franklin) Research programs that pay for themselves (Rich Cowan) Having an influence from "within the system" (Rich Cowan) RISKS in running RISKS -- continued (PGN and an unhappy Mailer) http://catless.ncl.ac.uk/Risks/index.3.html[2011-06-10 15:37:46] The Risks Digest Index to Volume 3 Volume 3 Issue 14 (27 Jun 86 ) A Personal View on SDI (Harlan Mills) Privacy legislation (RISKS-3.10) (Jerome H. Saltzer) Risks in burning wood (Mike McLaughlin) Mailer explosion (Sean Malloy) Volume 3 Issue 15 (29 Jun 86) A Personal View on SDI from Harlan Mills (Herb Lin) Having an influence from "within the system" (Herb Lin) Re: Research programs that pay for themselves (Rich Cowan) Text Scanners (Fred Hapgood) Volume 3 Issue 16 (30 Jun 86) Chernobyl (a suprise to the Soviets) (Martin Minow) Airwaves & Security (2 Subjects) (Richard S. D'Ippolito via dhm) Interesting Technical Questions (originally SDI) (Martin Moore) Volume 3 Issue 17 (3 Jul 86) How Much Computer Literacy Is Enough? (JAN Lee) Working within the system (Rich Cowan) Re: [Airwaves &] Security -- SDI (Herb Lin) Complex issues, complex answers (Bob Estell) Politics and Engineering Practice (Seifert) Multiple copies of RISKS-3.16 (Kenneth Sloan) GTE Sprint billing problems (Chuck Weinstock/Lee Breisacher) Volume 3 Issue 18 (8 Jul 86 ) Computer Crime in Scandinavia (Martin Minow) Re: Risks from inappropriate scale of energy technologies (Henry Spencer) Sensor technology and disinformation (Eugene Miya) Educating to prevent RISKS (Steven Gutfreund) Rash of 'Undeliverable mail' (Chuck Price) Volume 3 Issue 19 (10 Jul 86 ) Computer Literacy (Rick Smith, Bob Estell, Col. G. L. Sicherman, PGN) Volume 3 Issue 20 (15 Jul 86) Risks of computer incompetence (Dave Benson) RE: educating about RISKS (Don Lindsay) Computer Literacy (RISKS-3.19) (Ron Morgan) ... and Basic (Martin Minow, Andrew Klossner, PGN) Dial-up computing (Sterling Bjorndahl) Research programs that pay for themselves (Clayton Cramer) Volume 3 Issue 21 (16 Jul 86) Responsibility (Willis Ware) Programming languages and computer literacy (Bob Estell) Teaching about risks, BASIC, NASA, etc. (Eugene Miya) Programming Languages (Matthew Kruk) BBoard Lingo (Trojan viruses,...) (Hank Burchard, via Peter G. Neumann) http://catless.ncl.ac.uk/Risks/index.3.html[2011-06-10 15:37:46] The Risks Digest Index to Volume 3 Volume 3 Issue 22 (19 Jul 86) Nostalgia (Mike Williams) Flames about BASIC (Jim Anderson) More on risks of teaching "just" programming (Herb Lin) Responsibility for Computer Actions (George S. Cole) CDP and Certification (Andy Glew) The undetected hang-up risk (more) (Ted Lee) Volume 3 Issue 23 (22 Jul 86) Re: Comet and Electra (Jim Horning) 100,000 Late Phone Bills (Mike McLaughlin) Types of "Programming" (Henry Schaffer) Volume 3 Issue 24 (24 Jul 86) Comet and Electra (Jerry Saltzer, Marv Zelkowitz, Don Chiasson, Bard Bloom) No gasoline because the computer is down? (Jim Barnes) HBO Hacker Captain Midnight Caught (via Geoff Goodfellow) Volume 3 Issue 25 (24 Jul 86) Petroski on the Comet failures (Alan Wexelblat) Re: Comet and Electra (Douglas Adams) On the dangers of human error (Brian Randell via Lindsay Marshall) Software Paranoia (Ken Laws) Royal Wedding Risks (Lindsay Marshall) How to Think Creatively (John Mackin) Dangers of improperly protected equipment (Kevin Belles) Volume 3 Issue 26 (26 Jul 86) DIVAD (Herb Lin) Royal wedding risks -- common change modes (Don Chiasson) Security and dialbacks (David I. Emery via Herb Lin) [Long message] Volume 3 Issue 27 (29 Jul 86) Whoops! Lost an Area Code! (Clayton Cramer) Comet-Electra (RISKS-3.25) (Stephen Little) Comparing computer security with human security (Bob Estell) Volume 3 Issue 28 (31 Jul 86) Laserprinter dangers (Mansfiel) Errors in error-handlers (Mansfiel) Military testing errors (Alan Wexelblat) Re: Comet-Electra (RISKS-3.25) (Bill Fisher) Computer and Human Security (Lindsay Marshall) Volume 3 Issue 29 (1 Aug 86) Ozone hole undetected for years due to programming error (Bill McGarry) Aircraft simulators and risks (Art Evans) Military testing errors (Scott E. Preece) Risks: computers in the electoral process (Kurt Hyde via Pete Kaiser) Risks of CAD (Alan Wexelblat) http://catless.ncl.ac.uk/Risks/index.3.html[2011-06-10 15:37:46] The Risks Digest Index to Volume 3 Volume 3 Issue 30 (4 Aug 86) Ozone hole undetected (Jeffrey Mogul) Re: Risks of CAD (Henry Spencer) Comment on Hartford Civic Roof Design (Richard S D'Ippolito) Expert system to catch spies (Larry Van Sickle) Volume 3 Issue 31 (5 Aug 86) Another cruise missile lands outside Eglin test range (Martin J. Moore) Aircraft simulators and risks (Gary Wemmerus) Re: Comment on Hartford Civic Roof Design (Brad Davis) Expert system to catch spies (RISKS-3.30) (Chris McDonald) Computer and Human Security (Henry Spencer) Ozone Reference (Eugene Miya) Financial risks (Robert Stroud) Mail Load Light(e)ning? (SRI-CSL Mail Daemon) Volume 3 Issue 32 (6 Aug 86) DC-10 Crash (Chuck Weinstock) Earthquake Reporting (AP) The Recent Near-Disaster for the Shuttle Columbia (Peter G. Neumann) Traffic lights in Austin (Alan Wexelblat) Re: Laserprinter dangers (Graeme Hirst) Volume 3 Issue 33 (7 Aug 86) Air traffic computer failure (Hal Perkins) Re: Laserprinter dangers (Sean Malloy) Re: Expert system to catch spies (Rich Kulawiec) Survey of Computer Professionals (Kurt Hyde) Volume 3 Issue 34 (9 Aug 86) Non-Flying Airplanes and Flying Glass (Jim Horning) Failure Recovery, Simulations, and Reality (Danny Cohen) Ottawa Power Failure (Dan Craigen) Liability for Software Problems (Peter G. Neumann) Ozone hole (Hal Perkins) Re: Survey of Trust in Election Computers (Chris Hibbert) Nondelivery of RISKS-2.38 (8 April 1986) and other mail (Communications Satellite [and PGN]) Volume 3 Issue 35 (11 Aug 86) Flying windows on the Hancock Building (Remy Malan) Pilots and counter-intuitive maneuvers (Martin Minow)

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    577 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us