Forum on Risks to the Public in Computers and Related Systems
ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator
Index to Volume 1
Saturday, 31 May 1986

Volume 1 Issue 1 (1 Aug 85)- ACM Council Resolution of 8 October 1984
- An Agenda for the Future
- Computer-Related Incidents Illustrating Risks to the Public
- Strategic Computing Initiative
- Strategic Defense Initiative; David Parnas and SDI
- Herb Lin: Software for Ballistic Missile Defense, June 1985
- Weapons and Hope by Freeman Dyson (minireview by Peter Denning)
- Christiane Floyd et al.: The Responsible Use of Computers
- Human safety (software safety)
- Computers in critical environments, Rome, 23-25 October 1985
Volume 1 Issue 2 (28 Aug 85)- Introduction; three more risk items (Peter Neumann)
- Mariner 1 Irony (Nicholas Spies)
- RISKS Forum ... [Reaction] (Bob Carter)
- RISKS Forum ... [An Air Traffic Control Problem] (Scott Rose)
- Risks in AI Diagnostic Aids (Art Smith)
- Warning! ... [A Trojan Horse Bites Man] (Don Malpass)
- SDI (Martin Moore, Jim Horning, John McCarthy, Peter Karp, Dave Parnas, Gary Martins, Tom Parmenter; panel at 8th ICSE in London)
- The Madison Paper on Computer Unreliability and Nuclear War (Jeff Myers)
- Can a Computer Declare War? (Cliff Johnson)
Volume 1 Issue 3 (30 Aug 85)
Volume 1 Issue 4 (2 Sep 85)
Volume 1 Issue 5 (4 Sep 85)
Volume 1 Issue 6 (6 Sep 85)
Volume 1 Issue 7 (8 Seo 85)- The risks of not using some technology (John McCarthy)
- More on SDI (Joseph Weizenbaum)
- SDI reliability (Martin Moore)
- Re: Hazards of VDTs and CRTs (Bernie Elspas)
- Viruses, Trojan horses, and worms (Fred Hapgood, PGN)
- Re: The Case of the Broken Buoy (Herb Lin, Matt Bishop)
- Re: Hot rodding you AT (Keith F. Lynch)
Volume 1 Issue 8 (8 Sep 85)
Volume 1 Issue 9 (9 Sep 85)
Volume 1 Issue 10 (12 Sep 85)
Volume 1 Issue 11 (13 Sep 85)
Volume 1 Issue 12 (13 Sep 85)
Volume 1 Issue 13 (15 Sep 85)
Volume 1 Issue 14 (16 Sep 85)
Volume 1 Issue 15 (20 Sep 85)- SDI Panel at 8th ICSE in London (David Weiss)
- Risks to the Moderator (PGN)
- Mailer Protocol Woes (Marty Moore)
- Another Horror Story -- Sidereal Time Rollover (Marty Moore)
- Article: Health Hazards of Computers (Ted Shapin)
- Two More SDI Related Queries (douglas schuler)
- CAL ID -- computerized fingerprint system (douglas schuler)
Volume 1 Issue 16 (26 Sep 85)
Volume 1 Issue 17 (27 Sep 85)
Volume 1 Issue 18 (4 Oct 85)- Lack of a backup computer closes stock exchange (Marty Moore)
- DPMA survey on computer crime offenses (J.A.N. Lee)
- Ethics vs. morality (Marty Cohen)
- The Mythical Man-Month of Risk (Stavros Macrakis)
- Risk Assessment by real people (Mike McLaughlin)
- CRTs again, solution to one eye-problem (Mike McLaughlin)
- Failure of Mexican Networks (Dave Flory)
- Technical Reports Lists (Laurence Leff)
Volume 1 Issue 19 (8 Oct 85)
Volume 1 Issue 20 (8 Oct 85)
Volume 1 Issue 21 (10 Oct 85)
Volume 1 Issue 22 (9 Nov 85)- Administratrivia (Friedrich von Henke)
- Medical software incidents (Nancy Leveson)
- European activities (Udo Voges)
- Robots are different (Jerry Saltzer)
- Automobile computer control systems (Bennett Smith)
- Police computers (Dave Dyer)
- Electronic Surveillance (Geoffrey S. Goodfellow / Bill Keefe)
- Network Mailer Woes (Lynne Moore)
- Databases, grades, etc. (Karl Kluge, Andy Mondore, Mark Sienkiew)
Volume 1 Issue 23 (19 Nov 85)
Volume 1 Issue 24 (20 Nov 85)
Volume 1 Issue 25 (1 Dec 85)
Volume 1 Issue 26 (4 Dec 85)
Volume 1 Issue 27 (7 Dec 85)
Volume 1 Issue 28 (9 Dec 85)
Volume 1 Issue 29 (12 Dec 85)
Volume 1 Issue 30 (16 Dec 85)- Request for Cases, Settled or Decided (George S. Cole)
- Risks of job displacement from computerization (Fred Hapgood)
- Risks re computer-compared prescriptions (Richard Lamson)
- Legal bootlegs (a case against worms) (K. Richard Magill)
- Passwords ()
- Verifying source code vs. executable code (Martin J. Moore)
- Seminar - SDI Debate (SU) (Joan Feigenbaum)
Volume 1 Issue 31 (19 Dec 85)
Volume 1 Issue 32 (23 Dec 85)
Volume 1 Issue 33 (1 Jan 86)
Volume 1 Issue 34 (4 Jan 86)
Volume 1 Issue 35 (6 Jan 86)- SDI -- Meteors as substitutes for nuclear war (Jim Horning, Dave Parnas) Putting a Man in the Loop (Jim McGrath, Herb Lin, JM again) Testing SDI (Herb Lin, Jim McGrath, HL again) Independent Battlestations (Herb Lin, Jim McGrath, HL again) The Goal of SDI; Politicians (Jim McGrath)
- Pharmacy prescription systems (Rodney Hoffman)
- How to steal people's passwords (Roy Smith)
Volume 1 Issue 36 (7 Jan 86)- PLEASE READ Weapons and Hope by Freeman Dyson. (Peter Denning)
- Wolves in the woods (Jim Horning, Dave Parnas)
- "Certifiable reliability" and the purpose of SDI (Michael L. Scott)
- SDI Testing (Jim McGrath, Jim Horning)
- Dec. 85 IEEE TSE: Special Issue on Software Reliability--Part I
- Masquerading (R. Michael Tague)
Volume 1 Issue 37 (9 Jan 86)
Volume 1 Issue 38 (9 Jan 86)
Volume 1 Issue 39 (13 Jan 86)
Volume 1 Issue 40 (17 Jan 86)
Volume 1 Issue 41 (19 Jan 86)
Volume 1 Issue 42 (28 Jan 86)
Volume 1 Issue 43 (29 Jan 86)
Volume 1 Issue 44 (29 Jan 86)
Volume 1 Issue 45 (31 Jan 86)- Risks from discussing Reliability of Shuttle Destruct System (John Carpenter, Peter G. Neumann)
- Possible triggering of the self-destruct mechanism (Peter G. Neumann)
- Challenger and Living with High-Risk Technologies (Dave Benson)
- The Challenger [non]accident (Jeff Siegal)
- Shuttle Explosion -- Plutonium on Galileo (Larry Shilkoff)
- Reliability in redundant systems (Brad Davis)

Report problems with the web pages to the maintainer