메뉴 건너뛰기




Volumn 27, Issue 5, 2011, Pages 326-335

The (social) construction of information security

Author keywords

Causal insulation; Constructionism; Information security; Security perimeters; System theory

Indexed keywords


EID: 80053226094     PISSN: 01972243     EISSN: 10876537     Source Type: Journal    
DOI: 10.1080/01972243.2011.607038     Document Type: Article
Times cited : (21)

References (27)
  • 1
    • 84855688895 scopus 로고    scopus 로고
    • Approaches in anomaly-based network intrusion detection systems
    • Advances in Information Security 38. Berlin: Springer
    • Bolzoni, D., and S. Etalle. 2008. Approaches in anomaly-based network intrusion detection systems. In Intrusion Detection Systems, pp. 1-15. Advances in Information Security 38. Berlin: Springer.
    • (2008) Intrusion Detection Systems , pp. 1-15
    • Bolzoni, D.1    Etalle, S.2
  • 4
    • 80053241361 scopus 로고    scopus 로고
    • Election Process Advisory Commission, accessed June 17, 2011
    • Election Process Advisory Commission. 2007. Voting with confidence. http://www.kiesraad.nl/nl/OverigeContent/Bestanden/pdfthema/PdfvoorEngelsesite/Votingwithconfidence.pdf (accessed June 17, 2011).
    • (2007) Voting With Confidence
  • 5
    • 70449482204 scopus 로고    scopus 로고
    • Floridi's philosophy of information and information ethics: Current perspectives, future directions
    • Ess, C. 2009. Floridi's philosophy of information and information ethics: Current perspectives, future directions. The Information Society 25(3):159-168.
    • (2009) The Information Society , vol.25 , Issue.3 , pp. 159-168
    • Ess, C.1
  • 6
    • 77951061744 scopus 로고    scopus 로고
    • Software as risk: Introduction of open standards in the Danish public sector
    • Federspiel, S. B., and B. Brincker. 2010. Software as risk: Introduction of open standards in the Danish public sector. The Information Society 26(1): 38-47.
    • (2010) The Information Society , vol.26 , Issue.1 , pp. 38-47
    • Federspiel, S.B.1    Brincker, B.2
  • 7
    • 0011101139 scopus 로고    scopus 로고
    • Information ethics: On the philosophical foundation of computer ethics
    • Floridi, L. 1999. Information ethics: on the philosophical foundation of computer ethics. Ethics and Information Technology 1(1): 37-56.
    • (1999) Ethics and Information Technology , vol.1 , Issue.1 , pp. 37-56
    • Floridi, L.1
  • 8
    • 33744479964 scopus 로고    scopus 로고
    • The ontological interpretation of informational privacy
    • Floridi, L. 2005. The ontological interpretation of informational privacy. Ethics and Information Technology 7(4): 185-200.
    • (2005) Ethics and Information Technology , vol.7 , Issue.4 , pp. 185-200
    • Floridi, L.1
  • 9
    • 67650342504 scopus 로고    scopus 로고
    • Regulating Profiling in a Democratic Constitutional State
    • eds. M. Hildebrandt and S. Gutwirth, Berlin: Springer
    • Gutwirth, S., and P. de Hert. 2008. Regulating Profiling in a Democratic Constitutional State. In Profiling the European citizen: Crossdisciplinary perspectives, eds. M. Hildebrandt and S. Gutwirth, pp. 271-302. Berlin: Springer.
    • (2008) Profiling the European Citizen: Crossdisciplinary Perspectives , pp. 271-302
    • Gutwirth, S.1    de Hert, P.2
  • 10
    • 70349118502 scopus 로고    scopus 로고
    • In WITS '05: Proceedings of the 2005 Workshop on Issues in the Theory of Security, New York, NY: ACM
    • Jacobs, B., W. Pieters, and M. Warnier. 2005. Statically checking confidentiality via dynamic labels. In WITS '05: Proceedings of the 2005 Workshop on Issues in the Theory of Security, pp. 50-56. New York, NY: ACM.
    • (2005) Statically Checking Confidentiality Via Dynamic Labels , pp. 50-56
    • Jacobs, B.1    Pieters, W.2    Warnier, M.3
  • 11
    • 80053271292 scopus 로고    scopus 로고
    • Jericho Forum, accessed June 17, 2011
    • Jericho Forum. 2005. Jericho whitepaper. https://www.opengroup.org/jericho/BusinessCaseforDPv1.0.pdf (accessed June 17, 2011).
    • (2005) Jericho Whitepaper
  • 12
    • 84957805078 scopus 로고    scopus 로고
    • The Platform for enterprise privacy practices: Privacy-enabled management of customer data
    • In PET'02: Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, Berlin: Springer-Verlag
    • Karjoth, G., M. Schunter, and M. Waidner. 2003. The Platform for enterprise privacy practices: privacy-enabled management of customer data. In PET'02: Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, pp. 194-198. Lecture Notes in Computer Science 2482. Berlin: Springer-Verlag.
    • (2003) Lecture Notes In Computer Science , vol.2482 , pp. 194-198
    • Karjoth, G.1    Schunter, M.2    Waidner, M.3
  • 14
    • 0003487794 scopus 로고
    • Stanford, CA: Stanford University Press
    • Luhmann, N. 1995. Social systems. Stanford, CA: Stanford University Press.
    • (1995) Social Systems
    • Luhmann, N.1
  • 16
    • 0036824048 scopus 로고    scopus 로고
    • A better ballot box?
    • Mercuri, R. 2002. A better ballot box? IEEE Spectrum 39:26-50.
    • (2002) IEEE Spectrum , vol.39 , pp. 26-50
    • Mercuri, R.1
  • 17
  • 18
    • 0032282474 scopus 로고    scopus 로고
    • Protecting privacy in an information age: The problem of privacy in public
    • Nissenbaum, H. 1998. Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy 17(5/6):559-596.
    • (1998) Law and Philosophy , vol.17 , Issue.5-6 , pp. 559-596
    • Nissenbaum, H.1
  • 20
    • 33745894129 scopus 로고    scopus 로고
    • Acceptance of voting technology: Between confidence and trust
    • In Trust management, 4th International Conference, iTrust 2006, Berlin: Springer
    • Pieters, W. 2006. Acceptance of voting technology: Between confidence and trust. In Trust management, 4th International Conference, iTrust 2006, pp. 283-297. Lecture Notes in Computer Science 3986. Berlin: Springer.
    • (2006) Lecture Notes In Computer Science , vol.3986 , pp. 283-297
    • Pieters, W.1
  • 21
    • 70350436675 scopus 로고    scopus 로고
    • Combatting electoral traces: The Dutch tempest discussion and beyond
    • In E-voting and Identity: Second International Conference, VOTE-ID 2009, Berlin: Springer
    • Pieters, W. 2009. Combatting electoral traces: The Dutch tempest discussion and beyond. In E-voting and Identity: Second International Conference, VOTE-ID 2009, 172-190. Lecture Notes in Computer Science 5767. Berlin: Springer.
    • (2009) Lecture Notes In Computer Science , vol.5767 , pp. 172-190
    • Pieters, W.1
  • 22
    • 79952042266 scopus 로고    scopus 로고
    • Reve{a,i}ling the risks: A phenomenology of information security
    • Pieters, W. 2010. Reve{a,i}ling the risks: A phenomenology of information security. Techné: Research in Philosophy and Technology 14:176-188.
    • (2010) Techné: Research In Philosophy and Technology , vol.14 , pp. 176-188
    • Pieters, W.1
  • 23
    • 79952041624 scopus 로고    scopus 로고
    • Explanation and trust: What to tell the user in security and AI
    • Pieters, W. 2011a. Explanation and trust: what to tell the user in security and AI. Ethics and Information Technology 13(1):53-64.
    • (2011) Ethics and Information Technology , vol.13 , Issue.1 , pp. 53-64
    • Pieters, W.1
  • 25
    • 38149049950 scopus 로고    scopus 로고
    • Where can an insider attack?
    • In Workshop on formal aspects in security and trust, FAST 2006, Berlin: Springer
    • Probst, C.W., R. R. Hansen, and F. Nielson. 2007. Where can an insider attack? In Workshop on formal aspects in security and trust, FAST 2006, pp. 127-142. Lecture Notes in Computer Science 4691. Berlin: Springer.
    • (2007) Lecture Notes In Computer Science , vol.4691 , pp. 127-142
    • Probst, C.W.1    Hansen, R.R.2    Nielson, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.