Jump to ContentJump to Main Navigation
After DigitalComputation as Done by Brains and Machines$
Users without a subscription are not able to see the full content.

James A. Anderson

Print publication date: 2017

Print ISBN-13: 9780199357789

Published to Oxford Scholarship Online: February 2018

DOI: 10.1093/acprof:oso/9780199357789.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 10 December 2019

The Near Future

The Near Future

Chapter:
(p.313) Chapter 18 The Near Future
Source:
After Digital
Author(s):

James A. Anderson

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780199357789.003.0018

Digital computing has transformed our civilization. Eventually, both computer professionals and regular users will interact with a computer as they would with another human of equivalent or greater intelligence but with a better grasp of fine detail. However, computer pathologies will increase with increasing power and ubiquity. Unintended consequences will occur from the intrinsic unreliability of hugely complex systems. The most sinister danger in the near future of computing is from humans: malware, hacking, theft, attacks. Modern lessons can be learned from the past history of computer attacks, such as the decoding of the Enigma codes during World War II. Individual greed leads to crime, but much worse results follow when major states become involved in computer-based crimes, as they are now starting to do. Optimistic futures of computing assume benign co-operators doing good works, but the power to do evil may win in the long run.

Keywords:   hacking, malware, evil, security, Enigma, Ultra, Bletchley Park, code-breaking

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .