Seymour E. Goodman
Regents Professor and Professor of International Affairs and Computing
- Center for International Strategy, Technology, and Policy
- School of History and Sociology
- School of International Affairs
Overview
Seymour (Sy) E. Goodman is Regents Professor at the Georgia Institute of Technology. He holds appointments in the Sam Nunn School of International Affairs within the Ivan Allen College, and the School of Cybersecurity and Privacy within the College of Computing, and as an Adjunct Professor in the School of History and Sociology. He served as Co-Director of the Center for International Strategy, Technology, and Policy (2001-) and Co-Director of the Georgia Tech Information Security Center (2000-2013). Prof. Goodman was founding director and is now Director Emeritus of the Sam Nunn Security Program (Nunn-MacArthur Program). Dr. Goodman was selected as a National Associate of the National Academies of Science, Engineering, and Medicine (since 2016).
At Georgia Tech Prof. Goodman studies developments in the information technologies and related public policy and societal issues, and technological developments and their influence on the conduct and outcomes of large-scale conflicts. Current interests are in the resilience and security of critical infrastructures and curriculum development for the School of Cybersecurity and Privacy. Earlier research pursuits include mathematical physics, theoretical computer science, Soviet and East European studies, and the global diffusion of the Internet. He has over 150 publications, hundreds of invited presentations, served on many academic, government, and industry advisory, study, and editorial committees, including almost 20 years as International Perspectives editor for the Communications of the ACM. Dr. Goodman has pursued his interests on all seven continents and in over 100 countries. Since 1975 over a dozen funders have supported his work, including the NSF, the MacArthur, Rich, and Callahan Foundations, the Georgia Humanities Council, the International Telecommunication Union, and the Department of Defense since his arrival at Georgia Tech in 2000.
Immediately before coming to Georgia Tech, Prof. Goodman was the director of the Consortium for Research in Information Security and Policy (CRISP), with the Center for International Security and Cooperation (CISAC) at Stanford University. He held a variety of appointments at the University of Virginia (Applied Mathematics, Computer Science, Soviet and East European Studies), the University of Chicago (Economics), Princeton University (The Woodrow Wilson School of Public and International Affairs, Mathematics), and the University of Arizona (MIS in the College of Business and Public Administration, Soviet and Russian Studies, Middle Eastern Studies). Prof. Goodman was an undergraduate at Columbia University (city planning, civil engineering, applied mathematics), and earned his Ph.D. from the California Institute of Technology in 1970 where he worked on problems of applied mathematics and mathematical physics.
2019(22)
- Ph.D. California Institute of Technology, 1970
- M.S. Columbia University, 1966
- B. S. Columbia University, 1965
Distinctions:
- Regents Professor
- National Associate of the National Research Council of the National Academies of Science, Engineering and Medicine
- Adjunct Professor of History
Interests
- Cybersecurity
- Emerging Technology and Security
- History of Technology/Engineering and Society
- Information Security and Critical Infrastructure Protection
- International Diffusion and Innovation in IT
- International Security Policy
- Modern Global History/Science, Technology, and Nationalism
- Science, Technology, and International Policy
Focuses:
- Europe
- Middle East
- United States
- United States - Georgia
- United States - Southeast
- International Development
- Weapons and Security
- Armed Conflict
- Conflicts
- Diffusion of Technology
- Emerging Technologies - Innovation
- Higher Education: Teaching and Learning
- Infrastructure
- International Communication
- National Intelligence
- National Security
- Non-Traditional Security Challenges
- Science and Engineering Workforces
- Science and Technology
- Surveillance
- Terrorism
Courses
- HTS-3803: Special Topics
- HTS-3823: Special Topics
- INTA-2040: Sci,Tech & Int'l Affairs
- INTA-3012: War in the 20th Century
- INTA-3103: Challenge of Terrorism
- INTA-3803: Special Topics
- INTA-3823: Special Topics
- INTA-4011: Technology& Military Org
- INTA-4050: Int'l Affair&Tech Policy
- INTA-4803: Special Topics: Critical Infrastructures
- INTA-6015: Technology& Military Org
- INTA-8000: Sci,Tech&Int'l Affairs I
- INTA-8001: Sci,Tech&Intl Affairs II
- INTA-8803: Special Topics: Critical Infrastructures
Publications
Recent Publications
Journal Articles
- Privacy and security would cybersecurity professionalization help address the cybersecurity crisis? Evaluating the trade-offs involved in cybersecurity professionalization
In: Communications of the ACM
Date: February 2014
Evaluating the trade-offs involved in cybersecurity professionalization.
Chapters
- Information Flows and Field Armies
In: Astride Two Worlds: Technology and the American Civil War, pp. 87-114
Date: 2016
Conferences
- International Impact and Consequences of the American Civil War: Ironclad Warships
In: Conference on the Global Aspects of Civil War: Impact and Consequences, ISA-South (International Studies Association)
Date: October 2016
- Ironclad Strategies and Their Implementations in the United States and Confederate States Navies: Contrasts in Policies, Politics, Infrastructure, Results and Legacies
In: 43rd Annual Meeting of the International Committee on the History of Technology (ICOHTEC) including the 11th Symposium on the So
Date: July 2016
- The Races to Hampton Roads: The Development and Deployment of Ironclad Warships During the First Year of the American Civil War
In: Fifty-Ninth Annual Meeting of the Society for the History of Technology
Date: June 2016
All Publications
Books
- Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision Making
Date: September 2013
Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making considers approaches to increasing the professionalization of the nation's cybersecurity workforce. This report examines workforce requirements for cybersecurity and the segments and job functions in which professionalization is most needed; the role of assessment tools, certification, licensing, and other means for assessing and enhancing professionalization; and emerging approaches, such as performance-based measures. It also examines requirements for the federal (military and civilian) workforce, the private sector, and state and local government. The report focuses on three essential elements: (1) understanding the context for cybersecurity workforce development, (2) considering the relative advantages, disadvantages, and approaches to professionalizing the nation's cybersecurity workforce, and (3) setting forth criteria that can be used to identify which, if any, specialty areas may require professionalization and set forth criteria for evaluating different approaches and tools for professionalization. Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making characterizes the current landscape for cybersecurity workforce development and sets forth criteria that the federal agencies participating in the National Initiative for Cybersecurity Education - as well as organizations that employ cybersecurity workers - could use to identify which specialty areas may require professionalization and to evaluate different approaches and tools for professionalization.
- Critical Information Infrastructure Protection
Date: October 2008
- The Internet in Turkey and Pakistan: A Comparative Analysis.
Date: December 2000
- The Diffusion of the Internet in China.
Date: November 2000
- The Internet from the Top of the World: Nepal Case Study
Date: November 2000
- A Proposal for an International Convention on Cyber Crime and Terrorism.
Date: August 2000
- High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century, Center for International Security and Arms Control
Date: May 1998
This study was much of the basis for further major changes in U.S. export controls on high performance computing made in 1999 - Old Law for a New World? The Applicability of International Law to Information Warfare. Center for International Security and Arms Control,
Date: March 1997
An extended version was published as a book by ACTIS/NDU, Washington, DC [see below]. - The Information Technologies and Defense: A Demand-Pull Assessment. Center for International Security and Arms Contro
Date: February 1996
- Building on the Basics: An Examination of High Performance Computing Export Control Policy in the 1990s
Date: November 1995
This study became much of the basis for major changes in U.S. policy as announced personally by President Clinton in October 1995. It also was much of the basis for a renegotiated bilateral treaty with Japan and for new Export Administration Regulations. - Introduction to the Design and Analysis of Algorithms. (McGraw-Hill, 1977). (Computer Science Series.) 371 pages.
Date: 1977
Early senior-graduate level text on this subject. The MIR Publishing House in the USSR has translated this book. It has also been offered as a selection on several occasions by computer science book clubs. An International Student Edition was published in Japan - An Examination of High-Performance Computing Export Control Policy in the 1990s.
- Dual Use Technologies and Export Controls in the Post-Cold War Era.
- Global Initiatives to Secure Cyberspace: An Emerging Landscape
- Global Trends in Computer Technology and Their Impact on Export Control, Committee on International Developments in Computer Science and Technology, National Research Council, Computer Science and Technology Board
- Information Security Policies, Processes and Practices,
- Information Warfare and International Law
- Is the Elephant Learning to Dance? The Diffusion of the Internet in the Republic of India, Georgia Tech Information Security Center and the Center for International Security and Cooperation
- Panel on the Future Design and Implementation of U.S. National Security Export Controls, Committee on Science, Engineering and Public Policy, Finding Common Ground: U.S. Export Controls in a Changed Global Environment, National Academy of Sciences
- Professionalizing the Nation’s Cybersecurity Workforce? Criteria for Decision-Making, National Research Council
- Protecting Critical Infrastructures Against Cyber-Attack,
- Technology and East-West Trade, Office of Technology Assessment,
- Technology and Soviet Energy Availability
- The Revolution in Information and Communications Technology and the Conduct of U.S. Foreign Affairs
- The Transnational Dimensions of Cyber Crime and Terrorism.
- Towards a Safer and More Secure Cyberspace, Committee on Improving Cybersecurity Research in the United States, National Research Council
This study was supported by the U.S. House of Representatives, DHS, NSF, NIST and DARPA, and was briefed to them and multiple other US government agencies and industry companies June – September, 2007. See also Peter G. Neumann, “E-migrating Risks?” Comm. of the ACM, Vol. 50, No. 9, Sept. 2007, 120.
- “An Introduction to Graph Theory and Some of Its Applications,” in Trends in Linguistics: Computers in Language Research
- “Software in the Soviet Union: Progress and Problems”
- “The Landscape of International Computing”
Journal Articles
- Privacy and security would cybersecurity professionalization help address the cybersecurity crisis? Evaluating the trade-offs involved in cybersecurity professionalization
In: Communications of the ACM
Date: February 2014
Evaluating the trade-offs involved in cybersecurity professionalization. - Building the nation's cyber security workforce: Contributions from the CAE colleges and universities
In: ACM Transactions on Management Information Systems
Date: 2014
This article presents a view of the necessary size and composition of the US national cyber security workforce, and considers some of the contributions that the government-designated Centers of Academic Excellence (CAE) might make to it. Over the last dozen years about 200 million taxpayer dollars have gone into funding many of these CAEs, with millions explicitly targeted to help them build capacity. The most visible intended output has been in the form of around 125 Scholarship for Service (SFS) students per year going mostly into the workforce of the federal government. Surely the output capacity of these 181 colleges and universities is greater than that, and should be helping to protect the rest of US citizens and taxpayers. We take a need-based look at what the nation's workforce should look like, and then consider some possibilities of what the CAE schools could be doing to help to close the gaps between that perceived need and the supply and demand. © 2014 ACM. - Multilateral Cyber Solutions: Contemporary Realities
Date: May 2012
The article explores what kind of trust based relationships can best support "continuous monitoring", the new strategy of sharing cybersecurity threats so that they can be addressed. The International Telecommunications Union is not an appropriate place to develop these trust based relationships.
- The Coming African Tsunami of Information Insecurity
Date: December 2010
- Cyberspace as a medium for terrorists
In: Technological Forecasting and Social Change
Date: February 2007
Given that terrorists are quickly acquiring technical skills that increase the utility of cyberspace to an effective distributed organizational network and the likelihood of potential attacks on U.S. critical infrastructure and defense systems, we consider the value of cyberspace to terrorists. To this end, it is necessary to address the following questions pertinent to the attributes of cyberspace to examine why and how terrorists may utilize cyberspace to advance their goals: (1) What is cyberterrorism? (2) Is cyberterrorism warfare? (3) Why would terrorists use cyberspace? (4) What do we know or anticipate that terrorists want to do in cyberspace? (5) How do we deal with terrorists in cyberspace? We conclude with an assessment of the cyberterrorism threat facing the U.S. today and recommendations that address increasing technical capabilities and security measures for intelligence gathering, digital control and supervisory control and data acquisition (DC/SCADA) systems, and emergency response systems. © 2006 Elsevier Inc. All rights reserved. - Engineering communism: How two Americans spied for Stalin and founded the Soviet Silicon Valley.
In: TECHNOLOGY AND CULTURE
Date: July 2006
- Wiring the Wilderness in Alaska and the Yukon
In: Communications of the ACM
Date: June 2001
Breaking down the partitions that divide the digital world. - From Via Maris to electronic highway: The Internet in Canaan
In: COMMUNICATIONS OF THE ACM
Date: July 2000
- Cyber-attacks and international law
In: SURVIVAL
Date: 2000
- Lebedev and the Birth of Soviet Computing
Date: 1994
- The Soviet Bloc's Unified System of Computers
Date: June 1978
Chapters
- Information Flows and Field Armies
In: Astride Two Worlds: Technology and the American Civil War, pp. 87-114
Date: 2016
- “Risks and Exposures,
Date: May 2006
- The Global Diffusion of Computing: Issues in Development and Policy
Date: October 1997
- “Computing Technologies in Eastern Europe: The Impact of Reform”
Date: October 1989
- “The Prospective Impacts of Computing: Selected Economic-Industrial-Strategic Issues”
Date: November 1987
- “The Partial Integration of the CEMA Computer Industries: An Overview”
Date: March 1986
- “Computing and the Development of the Soviet Economy”
Date: November 1979
- "Core High Technology Industries in the USSR and Eastern Europe"
- "Toward a Treaty-based International Regime on Cyber Crime and Terrorism”
- Emerging privacy and security concerns for digital wallet deployment.
- Terrorist Use of Communication Technology and Social Networks
- “A Look at Worldwide High-Performance Computing and Its Economic Implications for the U.S.”
- “Advanced Technology: How Will the USSR Adjust?”
- “Information Societies”
- “Information Technologies and the Soviet Citizen: Toward a ‘Soviet-Style Information Society’?”
- “Preventing and Responding to Cyber Crime and Terrorism: Some International Dimensions”
- “Technology Transfer and the Development of the Soviet Computer Industry”
- “The Impact of U.S. Export Controls on the Soviet Computer Industry”
- “The International Landscape of Cyber Security”
- “The Soviet Union and the Personal Computer Revolution,’’
Conferences
- International Impact and Consequences of the American Civil War: Ironclad Warships
In: Conference on the Global Aspects of Civil War: Impact and Consequences, ISA-South (International Studies Association)
Date: October 2016
- Ironclad Strategies and Their Implementations in the United States and Confederate States Navies: Contrasts in Policies, Politics, Infrastructure, Results and Legacies
In: 43rd Annual Meeting of the International Committee on the History of Technology (ICOHTEC) including the 11th Symposium on the So
Date: July 2016
- The Races to Hampton Roads: The Development and Deployment of Ironclad Warships During the First Year of the American Civil War
In: Fifty-Ninth Annual Meeting of the Society for the History of Technology
Date: June 2016
- The civil aviation analogy - Part I - International cooperation to protect civil aviation against cyber crime and terrorism
Date: 2001
Other Publications
- “Privacy and Security: Would Cybersecurity Professionalization Help Address the Cybersecurity Crisis?”
In: Communications of the ACM [Peer Reviewed]
Date: February 2014
- Multi-level Modeling of Complex Socio-Technical Systems
In: Procedia Computer Science [Peer Reviewed]
Date: 2013
- Command, Control, and Communications During the American Civil War: Information Flows and Field Armies
Date: November 2012
Seymour Goodman Presented at: Astride Two Ages: Technology and the Civil War, A Sesquicentennial Symposium on the American Civil War, Smithsonian Institution, Washington, DC, November 9-11, 2012. Note: This talk begins at about 48 minutes 19 seconds into the first link and continues on the second.
- “Ubiquitous Data Collection: Rethinking Privacy Debates”
In: IEEE Computer [Peer Reviewed]
Date: June 2011
- "The Coming African Tsunami of Information Insecurity”
In: Communications of the ACM [Peer Reviewed]
Date: December 2010
- Soviet Computing - List of Publications
Date: 2009
- “Global Sourcing of IT Services and Information Security: Prudence Before Playing”
In: Comm. of the American Association for Information Systems [Peer Reviewed]
Date: December 2007
- “Identify and Mitigate the Risks of Global IT Outsourcing”
In: The Journal of Global Information Technology [Peer Reviewed]
Date: October 2007
- “Toward a Safer and More Secure Cyberspace”
In: Communications of the ACM [Peer Reviewed]
Date: October 2007
- “Global Diffusion of the Internet IV: The Internet in Ghana”
In: Comm. of the AIS [Peer Reviewed]
Date: 2004
- “The Origins of Digital Computing in Europe”
In: Communications of the ACM [Peer Reviewed]
Date: September 2003
- “Introducing the Global Diffusion of the Internet Series”
In: Comm. of the AIS [Peer Reviewed]
Date: 2003
- “Information Security Education at the Georgia Institute of Technology”
In: Journal of Information Security [Peer Reviewed]
Date: July 2002
- “A Framework for Assessing the Global Diffusion of the Internet.”
In: Journal of the AIS [Peer Reviewed]
Date: November 2001
- “Computing at the Top of the World”
In: Communications of the ACM [Peer Reviewed]
Date: November 2000
- China's state-coordinated Internet infrastructure
In: Communications of the ACM [Peer Reviewed]
Date: June 1999
- “Finland: The Unknown Soldier on the Information Technology Front”
In: Communications of the ACM [Peer Reviewed]
Date: March 1999
- HPC export controls: navigating choppy waters
In: Communications of the ACM [Peer Reviewed]
Date: November 1998
- The Internet in India: better times ahead?
In: Communications of the ACM [Peer Reviewed]
Date: November 1998
- An Internet diffusion framework
In: Communications of the ACM [Peer Reviewed]
Date: October 1998
- “Infrastructure Protection: An International Perspective"
In: Communications of the ACM [Peer Reviewed]
Date: June 1998
- The Internet gains acceptance in the Persian Gulf
In: Communications of the ACM [Peer Reviewed]
Date: March 1998
- Who governs the Internet?
In: Communications of the ACM [Peer Reviewed]
Date: August 1997
- “Information Technology and the Terrorist Threat”
In: Survival [Peer Reviewed]
Date: August 1997
- “Social Equity and Prosperity: Thailand Information Technology Policy into the 21st Century”
In: The Information Society [Peer Reviewed]
Date: 1997
- War, information technologies, and international asymmetries
In: Communications of the ACM [Peer Reviewed]
Date: December 1996
- “Is Big Brother Hanging by His Bootstraps?”
In: Communications of the ACM [Peer Reviewed]
Date: July 1996
- “Information Technology for Local Administration Support: The Governorates Project in Egypt”
In: MIS Quarterly [Peer Reviewed]
Date: June 1996
- “Vietnam: Information Technology for the Transition”
In: IEEE Computer [Peer Reviewed]
Date: March 1996
- Cyberspace across the Sahara: computing in North Africa
In: Communications of the ACM [Peer Reviewed]
Date: December 1995
- Computing in Chile: the jaguar of the Pacific Rim?
In: Communications of the ACM [Peer Reviewed]
Date: September 1995
- Little engines that could: computing in small energetic countries
In: Communications of the ACM [Peer Reviewed]
Date: May 1995
- "Computers as Substitute Soldiers?”
In: Communications of the ACM [Peer Reviewed]
Date: February 1995
- “Computing in Vietnam: An Asian Tiger in the Rough”
In: Communications of the ACM [Peer Reviewed]
Date: 1995
- “The Information Society: Image Versus Reality in National Computer Plans”
In: Information Infrastructure and Policy [Peer Reviewed]
Date: 1995
- “Information Technologies in South Africa: Problems and Prospects”
In: IEEE Computer [Peer Reviewed]
Date: December 1994
- The global diffusion of the Internet: patterns and problems
In: Communications of the ACM [Peer Reviewed]
Date: August 1994
- Israel: of swords and software plowshares
In: Communications of the ACM [Peer Reviewed]
Date: June 1994
- “S. A. Lebedev and the Birth of Soviet Computing”
In: IEEE Annals of the History of Computing [Peer Reviewed]
Date: May 1994
- Computing in South Africa: an end to “apartness”?
In: Communications of the ACM [Peer Reviewed]
Date: February 1994
- “Explaining and Alleviating Information Management Indeterminism: A Knowledge-based Framework”
In: Information Processing and Management [Peer Reviewed]
Date: 1994
- Under the stress of reform: high-performance computing in the former Soviet Union
In: Communications of the ACM [Peer Reviewed]
Date: October 1993
- “Subduing Software Pirates”
In: Technology Review [Peer Reviewed]
Date: October 1993
- Computing in India: an Asian elephant learning to dance
In: Communications of the ACM [Peer Reviewed]
Date: June 1993
- Sub-Saharan Africa: a technological desert
In: Communications of the ACM [Peer Reviewed]
Date: February 1993
- “Cuba, Communism and Computing”
In: Communications of the ACM [Peer Reviewed]
Date: November 1992
- “International Software Piracy"
In: IEEE Computer [Peer Reviewed]
Date: November 1992
- “Computing in the Middle East”
In: Communications of the ACM [Peer Reviewed]
Date: August 1992
- “MercoSur: Reconciling Four Disparate Information Technology Policies”
In: International Information Systems [Peer Reviewed]
Date: July 1992
- Computing in the Brazilian Amazon
In: Communications of the ACM [Peer Reviewed]
Date: April 1992
- Information management in research collaboration
In: International Journal of Man-Machine Studies [Peer Reviewed]
Date: March 1992
- “National Information Technology Policies in East-Central Europe and the Soviet Union”
In: International Information Systems [Peer Reviewed]
Date: 1992
- Computing in a less-developed country
In: Communications of the ACM [Peer Reviewed]
Date: December 1991
- From under the rubble: computing and the resuscitation of Romania
In: Communications of the ACM [Peer Reviewed]
Date: September 1991
- “The Soviet Computer Industry: A Tale of Two Sectors”
In: Communications of the ACM [Peer Reviewed]
Date: June 1991
- “International Electronic Mail Gains Significance in the Soviet Union and Eastern Europe”
In: IEEE Computer [Peer Reviewed]
Date: March 1991
- “Informatization of Soviet Society: American Observations"
In: Information and the Public Sector [Peer Reviewed]
Date: 1991
- “The Globalization of Computing: Perspectives on a Changing World"
In: ACM [Peer Reviewed]
Date: 1991
- “Trends in East-West Technology Transfer,’’
In: IEEE Computer [Peer Reviewed]
Date: July 1990
- “High-Speed Computers of the Soviet Union”
In: IEEE Computer [Peer Reviewed]
Date: September 1988
- The Information Technologies and Soviet Society: Problems and Prospects
In: IEEE Transactions on Systems, Man, and Cybernetics [Peer Reviewed]
Date: July 1987
- “MIS in Soviet Industrial Enterprises: The Limits of Reform from Above”
In: ACM [Peer Reviewed]
Date: November 1986
- “Computing in the USSR: Recent Progress and Policies”
In: Soviet Economy [Peer Reviewed]
Date: October 1986
- “Microcomputing in the Soviet Union and Eastern Europe”
In: Abacus [Peer Reviewed]
Date: 1985
- "Socialist Technological Integration: The Case of the East European Computer Industries”
In: The Information Society [Peer Reviewed]
Date: 1984
- “We Are Not Alone: A Sample of International Policy Challenges and Issues”
In: The Information Society [Peer Reviewed]
Date: 1984
- “U.S. Computer Export Control Policies: Value Conflicts and Policy Choices"
In: ACM [Peer Reviewed]
Date: September 1982
- “Software: Recommendations for an Export Control Policy,’’
In: ACM [Peer Reviewed]
Date: April 1980
- “Soviet Computing and Technology Transfer: An Overview"
In: World Politics [Peer Reviewed]
Date: July 1979
- “The Soviet Bloc’s Unified System of Computers”
In: ACM Computing Surveys [Peer Reviewed]
Date: June 1978
- "Export Control Reconsidered,
In: Science and Technology ( NSA) [Peer Reviewed]
- "Global Diffusion of the Internet VI: The Internet in Togo"
In: Communications of the AIS [Peer Reviewed]
- “A Case Study of Electronic Commerce in Nepal”
- “Information Technology: Vulnerabilities and Threats”
- “Multilateral Cyber Security Solutions: Contemporary Realities”
- “On Designing Reliable Hierarchical Structure
- “On Liberty in Cyberspace: Impact of the Internet on Human Rights”
In: Stanford Journal of International Relations [Peer Reviewed]
- “Scientific Computing in the Soviet Union.”
In: Computers in Physics [Peer Reviewed]
- “The Information Technologies and East European Societies”
In: East European Politics and Societies [Peer Reviewed]
- “Trouble on the Auction Block,’’
In: Journal of Interdisciplinary History [Peer Reviewed]