Author: Peter G. Neumann

Publications

Publication period start: 2000
Number of co-authors: 19

Co-authors

Number of publications with favourite co-authors
Whitfield Diffie
2
Rebecca Mercuri
2
Lauren Weinstein
6

Productive Colleagues

Most productive colleagues in number of publications
Michael D. Byrne
22
David Lorge Parnas
29
Peter J. Denning
64

Publications

Neumann, Peter G. (2009): Inside risks - U.S. election after-math. In Communications of the ACM, 52 (2) pp. 29. https://dl.acm.org/doi/10.1145/1461928.1461939

Neumann, Peter G. (2008): Reflections on computer-related risks. In Communications of the ACM, 51 (1) pp. 78-80. https://dl.acm.org/doi/10.1145/1327452.1327487

Horning, Jim, Neumann, Peter G. (2008): Risks of neglecting infrastructure. In Communications of the ACM, 51 (6) pp. 112. https://dl.acm.org/doi/10.1145/1349026.1349047

Neumann, Peter G. (2007): Widespread network failures. In Communications of the ACM, 50 (2) pp. 112. https://dl.acm.org/doi/10.1145/1216046

Bellovin, Steven M., Blaze, Matt, Diffie, Whitfield, Landau, Susan, Rexford, Jennifer, Neumann, Peter G. (2007): Internal surveillance, external risks. In Communications of the ACM, 50 (12) pp. 128. https://dl.acm.org/doi/10.1145/1323688.1323717

Neumann, Peter G. (2006): Trustworthy systems revisited. In Communications of the ACM, 49 (2) pp. 152. https://dl.acm.org/doi/10.1145/1113034.1113065

Neumann, Peter G. (2006): Risks relating to system compositions. In Communications of the ACM, 49 (7) pp. 120. https://dl.acm.org/doi/10.1145/1139960

Neumann, Peter G., Weinstein, Lauren (2006): Risks of RFID. In Communications of the ACM, 49 (5) pp. 136. https://dl.acm.org/doi/10.1145/1125971

Neumann, Peter G. (2006): The foresight saga. In Communications of the ACM, 49 (9) pp. 112. https://dl.acm.org/doi/10.1145/1151060

Neumann, Peter G. (2005): Responsibilities of technologists. In Communications of the ACM, 48 (2) pp. 128. https://dl.acm.org/doi/10.1145/1042091.1042129

Neumann, Peter G. (2005): Anticipating disasters. In Communications of the ACM, 48 (3) pp. 128. https://dl.acm.org/doi/10.1145/1047671.1047717

Neumann, Peter G., Byrne, Michael D. (2005): Disability-related risks. In Communications of the ACM, 48 (8) pp. 144. https://dl.acm.org/doi/10.1145/1076211.1076251

Neumann, Peter G. (2004): Optimistic optimization. In Communications of the ACM, 47 (6) pp. 112. https://dl.acm.org/doi/10.1145/990680.990711

Neumann, Peter G. (2004): The big picture. In Communications of the ACM, 47 (9) pp. 112. https://dl.acm.org/doi/10.1145/1015864.1015896

Neumann, Peter G. (2004): Introduction. In Communications of the ACM, 47 (10) pp. 28-30. https://dl.acm.org/doi/10.1145/1022594.1022617

Mercuri, Rebecca, Neumann, Peter G. (2003): Security by obscurity. In Communications of the ACM, 46 (11) pp. 160. https://dl.acm.org/doi/10.1145/948383.948413

Neumann, Peter G. (2003): Gambling on system accountability. In Communications of the ACM, 46 (2) pp. 120. https://dl.acm.org/doi/10.1145/606272.606304

Neumann, Peter G. (2003): E-epistemology and misinformation. In Communications of the ACM, 46 (5) pp. 104. https://dl.acm.org/doi/10.1145/769800.769829

Neumann, Peter G. (2003): Risks in trusting untrustworthiness. In Communications of the ACM, 46 (9) pp. 120. https://dl.acm.org/doi/10.1145/903893.903924

Neumann, Peter G. (2003): Information system security redux. In Communications of the ACM, 46 (10) pp. 136. https://dl.acm.org/doi/10.1145/944217.944248

Mercuri, Rebecca, Neumann, Peter G. (2001): System integrity revisited. In Communications of the ACM, 44 (1) pp. 160. https://dl.acm.org/doi/10.1145/357489.357517

Neumann, Peter G. (2001): What to know about risks. In Communications of the ACM, 44 (2) pp. 136. https://dl.acm.org/doi/10.1145/359205.359242

Neumann, Peter G., Parnas, David Lorge (2001): Computers: boon or bane?. In Communications of the ACM, 44 (3) pp. 168. https://dl.acm.org/doi/10.1145/365181.367913

Neumann, Peter G., Weinstein, Lauren (2001): Risks of National Identity Cards. In Communications of the ACM, 44 (12) pp. 176. https://dl.acm.org/doi/10.1145/501317.501357

Weinstein, Lauren, Neumann, Peter G. (2001): Inside Risks: Risks of Panic. In Communications of the ACM, 44 (11) pp. 152.

Neumann, Peter G. (2000): A Tale of Two Thousands. In Communications of the ACM, 43 (3) pp. 144. https://dl.acm.org/doi/10.1145/330534.330556

Neumann, Peter G. (2000): Denial-of-Service Attacks. In Communications of the ACM, 43 (4) pp. 136. https://dl.acm.org/doi/10.1145/332051.332797

Neumann, Peter G. (2000): Risks in retrospect. In Communications of the ACM, 43 (7) pp. 144. https://dl.acm.org/doi/10.1145/341852.341878

Neumann, Peter G. (2000): Missile defense. In Communications of the ACM, 43 (9) pp. 128. https://dl.acm.org/doi/10.1145/348941.349030

Weinstein, Lauren, Neumann, Peter G. (2000): Internet Risks. In Communications of the ACM, 43 (5) pp. 144. https://dl.acm.org/doi/10.1145/332833.332854

Neumann, Peter G. (1999): IC Online Exclusive Interview: Internet Security - Beyond Cryptography. In IEEE Internet Computing, 3 (2) pp. 100.

Neumann, Peter G. (1999): Robust Open-Source Software. In Communications of the ACM, 42 (2) pp. 128. https://dl.acm.org/doi/10.1145/293411.293491

Neumann, Peter G. (1999): Information is a Double-Edged Sword. In Communications of the ACM, 42 (7) pp. 120. https://dl.acm.org/doi/10.1145/306549.306599

Neumann, Peter G. (1999): Risks of Insiders. In Communications of the ACM, 42 (12) pp. 160. https://dl.acm.org/doi/10.1145/322796.322817

Neumann, Peter G., McCullagh, Declan (1999): Risks of Y2K. In Communications of the ACM, 42 (6) pp. 144. https://dl.acm.org/doi/10.1145/303849.303872

Neumann, Peter G., Weinstein, Lauren (1999): Risks of Content Filtering. In Communications of the ACM, 42 (11) pp. 152. https://dl.acm.org/doi/10.1145/319382.319403

Neumann, Peter G. (1998): Protecting the Infrastructures. In Communications of the ACM, 41 (1) pp. 128. https://dl.acm.org/doi/10.1145/268092.268126

Neumann, Peter G. (1998): Are Computers Addictive?. In Communications of the ACM, 41 (3) pp. 128.

Neumann, Peter G. (1998): Internet Gambling. In Communications of the ACM, 41 (2) pp. 112.

Neumann, Peter G. (1998): Laptops in Congress?. In Communications of the ACM, 41 (7) pp. 128. https://dl.acm.org/doi/10.1145/278476.278501

Neumann, Peter G. (1998): Y2K Update. In Communications of the ACM, 41 (9) pp. 128.

Neumann, Peter G. (1998): Risks of E-Education. In Communications of the ACM, 41 (10) pp. 136.

Neumann, Peter G. (1997): Hopes for Fewer Risks?. In Communications of the ACM, 40 (2) pp. 170.

Neumann, Peter G. (1997): The Big Picture. In Communications of the ACM, 40 (5) pp. 136.

Neumann, Peter G. (1997): Identity-Ralated Misuse. In Communications of the ACM, 40 (7) pp. 112.

Neumann, Peter G. (1997): Crypto Key Management. In Communications of the ACM, 40 (8) pp. 136.

Neumann, Peter G. (1997): Integrity in Software Development. In Communications of the ACM, 40 (10) pp. 144.

Neumann, Peter G. (1997): System Development Woes. In Communications of the ACM, 40 (12) pp. 160.

Neumann, Peter G., Weinstein, Lauren (1997): Spam, Spam, Spam!. In Communications of the ACM, 40 (6) pp. 112.

Neumann, Peter G. (1996): Risks in Digital Commerce. In Communications of the ACM, 39 (1) pp. 154.

Neumann, Peter G. (1996): Disinformation Theory. In Communications of the ACM, 39 (10) pp. 138.

Neumann, Peter G. (1996): Distributed Systems have Distributed Risks. In Communications of the ACM, 39 (11) pp. 130.

Neumann, Peter G. (1996): Risks of Anonymity. In Communications of the ACM, 39 (12) pp. 162.

Neumann, Peter G. (1996): A Risks-related Bookshelf. In Communications of the ACM, 39 (4) pp. 122.

Neumann, Peter G. (1996): Linguistic Risks. In Communications of the ACM, 39 (5) pp. 154.

Neumann, Peter G. (1996): Using Formal Methods to Reduce Risks. In Communications of the ACM, 39 (7) pp. 114.

Neumann, Peter G., Denning, Peter J. (1996): W(h)ither Research and Education?. In Communications of the ACM, 39 (2) pp. 154.

Neumann, Peter G. (1995): Reassessing the Crypto Debate. In Communications of the ACM, 38 (3) pp. 138.

Neumann, Peter G. (1995): Risks of Easy Answers. In Communications of the ACM, 38 (9) pp. 130.

Neumann, Peter G. (1995): Reviewing the Risks Archives. In Communications of the ACM, 38 (12) pp. 138.

Neumann, Peter G. (1995): Computer Vulnerabilities: Exploitation or Avoidance. In Communications of the ACM, 38 (6) pp. 138.

Landau, Susan, Kent, Stephen T., Brooks, Clint, Charney, Scott, Denning, Dorothy E., Diffie, Whitfield, Lauck, Anthony, Miller, Douglas, Neumann, Peter G., Sobel, David (1994): Crypto Policy Perspectives. In Communications of the ACM, 37 (8) pp. 115-121.

Neumann, Peter G. (1994): Technology, Laws, and Society. In Communications of the ACM, 37 (3) pp. 138.

Neumann, Peter G. (1994): Risks of Passwords. In Communications of the ACM, 37 (4) pp. 126.

Neumann, Peter G. (1994): Alternative Passwords. In Communications of the ACM, 37 (5) pp. 146.

Neumann, Peter G. (1994): Risks on the Information Superhighway. In Communications of the ACM, 37 (6) pp. 114.

Neumann, Peter G. (1994): Friendly Fire. In Communications of the ACM, 37 (8) pp. 138.

Neumann, Peter G. (1994): Expectations of Security and Privacy. In Communications of the ACM, 37 (9) pp. 138.

Neumann, Peter G. (1994): Inside \"Inside Risks. In Communications of the ACM, 37 (12) pp. 154.

Neumann, Peter G. (1993): Risks Considered Global(ly). In Communications of the ACM, 36 (1) pp. 154.

Neumann, Peter G. (1993): Are Dependable Systems Feasible?. In Communications of the ACM, 36 (2) pp. 146.

Neumann, Peter G. (1993): Risks of Technology. In Communications of the ACM, 36 (3) pp. 130.

Neumann, Peter G. (1993): Using Names as Identifiers. In Communications of the ACM, 36 (4) pp. 154.

Neumann, Peter G. (1993): The Role of Software Engineering. In Communications of the ACM, 36 (5) pp. 114.

Neumann, Peter G. (1993): Modeling and Simulation. In Communications of the ACM, 36 (6) pp. 124.

Neumann, Peter G. (1993): Risks on the Rails. In Communications of the ACM, 36 (7) pp. 130.

Neumann, Peter G. (1993): Risks of Surveillance. In Communications of the ACM, 36 (8) pp. 122.

Neumann, Peter G. (1993): Animal Crackers. In Communications of the ACM, 36 (9) pp. 162.

Neumann, Peter G. (1993): System Development Woes. In Communications of the ACM, 36 (10) pp. 146.

Neumann, Peter G. (1992): Survivable Systems. In Communications of the ACM, 35 (5) pp. 130.

Neumann, Peter G. (1992): Aggravation by Computer: Life, Death, and Taxes. In Communications of the ACM, 35 (7) pp. 122.

Neumann, Peter G. (1992): What\'s in a Name?. In Communications of the ACM, 35 (1) pp. 186.

Neumann, Peter G. (1992): Inside \"Risks of Risks. In Communications of the ACM, 35 (3) pp. 160.

Neumann, Peter G. (1992): Leap-Year Problems. In Communications of the ACM, 35 (6) pp. 162.

Neumann, Peter G. (1992): Fraud by Computer. In Communications of the ACM, 35 (8) pp. 154.

Neumann, Peter G. (1992): Accidental Financial Losses. In Communications of the ACM, 35 (9) pp. 194.

Neumann, Peter G. (1992): Where to Place Trust. In Communications of the ACM, 35 (10) pp. 138.

Neumann, Peter G. (1992): Avoiding Weak Links. In Communications of the ACM, 35 (12) pp. 146.

Neumann, Peter G. (1991): The Not-So-Accidental Holist. In Communications of the ACM, 34 (9) pp. 122.

Neumann, Peter G. (1991): Computers, Ethics, and Values. In Communications of the ACM, 34 (7) pp. 106.

Neumann, Peter G. (1991): Expecting the Unexpected Mayday. In Communications of the ACM, 34 (5) pp. 128.

Neumann, Peter G. (1991): Interpreting (Mis)information. In Communications of the ACM, 34 (4) pp. 144.

Neumann, Peter G. (1991): Putting on Your Best Interface. In Communications of the ACM, 34 (3) pp. 138.

Neumann, Peter G. (1991): Certifying Professionals. In Communications of the ACM, 34 (2) pp. 130.

Neumann, Peter G. (1991): The Clock Grows at Midnight. In Communications of the ACM, 34 (1) pp. 170.

Neumann, Peter G. (1991): The Human Element. In Communications of the ACM, 34 (11) pp. 150.

Neumann, Peter G. (1991): Collaborative Effords. In Communications of the ACM, 34 (12) pp. 162.

Neumann, Peter G. (1990): Risks in Computerized Elections. In Communications of the ACM, 33 (11) pp. 170.

Neumann, Peter G. (1990): Ghosts, Mysteries and Uncertainty. In Communications of the ACM, 33 (10) pp. 170.

Neumann, Peter G. (1990): A Few Old Coincidences. In Communications of the ACM, 33 (9) pp. 202.

Neumann, Peter G. (1990): Insecurity about Security?. In Communications of the ACM, 33 (8) pp. 170.

Neumann, Peter G. (1990): Some Reflections on a Telephone Switching Problem. In Communications of the ACM, 33 (7) pp. 154.

Neumann, Peter G. (1984): A Further View of the First Quarter Century, Introduction to the April 1984 Special Sectio. In Communications of the ACM, 27 (4) pp. 343.

Neumann, Peter G. (2000): Requirements-Related Risks in Critical Systems. In: ICRE 2000 , 2000, . pp. 3-. https://csdl.computer.org/comp/proceedings/icre/2000/0565/00/05650003abs.htm

Neumann, Peter G. (2000): Certitude and Rectitude. In: ICRE 2000 , 2000, . pp. 153. https://csdl.computer.org/comp/proceedings/icre/2000/0565/00/05650153abs.htm

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,784 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,784 designers enjoy our newsletter—sure you don’t want to receive it?