Jump to ContentJump to Main Navigation
A Vulnerable SystemThe History of Information Security in the Computer Age$
Users without a subscription are not able to see the full content.

Andrew J. Stewart

Print publication date: 2021

Print ISBN-13: 9781501758942

Published to Cornell Scholarship Online: January 2022

DOI: 10.7591/cornell/9781501758942.001.0001

Show Summary Details
Page of

PRINTED FROM Cornell University Press SCHOLARSHIP ONLINE (www.cornell.universitypressscholarship.com). (c) Copyright University of Cornell University Press, 2022. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in Cornell for personal use. date: 26 June 2022

The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop

The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop

(p.55) Chapter 4 The Dot-Com Boom and the Genesis of a Lucrative Feedback Loop
A Vulnerable System

Andrew J. Stewart

Cornell University Press

This chapter evaluates the dot-com boom, which was a speculative bubble wherein the value of internet stocks rose for an extended period beyond anything that could be justified on economic grounds. Like other speculative bubbles, the dot-com boom was caused by an invention that created inflated hopes of financial profits. The World Wide Web provided people with the ability to consume entertaining content, to communicate in new ways, and to purchase products and services online. Since the web was a recently created set of technologies and protocols, the study of web security was therefore new by definition. Both Microsoft and Netscape struggled with how to secure mobile code. The two popular types of mobile code were Java and ActiveX, and each approached security differently. The chapter then considers the feedback loop that was created between hackers and the commercial security industry, which was a powerful engine that caused the size of the market for information security products to skyrocket.

Keywords:   dot-com boom, internet stocks, World Wide Web, web security, Microsoft, Netscape, mobile code, computer hackers, commercial security industry, information security

Cornell Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.