David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Techne 14 (3):194-206 (2010)
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. This paper develops a phenomenological account of information security, in which a distinction is made between revealed and reveiled security instead. Linking these notions with the concepts of confidence and trust, the paper provides a phenomenological explanation of the electronic voting controversy in the Netherlands
|Keywords||No keywords specified (fix it)|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
Wolter Pieters (2011). Explanation and Trust: What to Tell the User in Security and AI? [REVIEW] Ethics and Information Technology 13 (1):53-64.
Similar books and articles
Emilian Kavalski (2009). Timescapes of Security: Clocks, Clouds, and the Complexity of Security Governance. World Futures 65 (7):527 – 551.
Percy Makholwa, Security: The Africa Stag - a Study of African Security Vacuum, Mercenarism and Private Security.
Stephen John (2011). Security, Knowledge and Well-Being. Journal of Moral Philosophy 8 (1):68-91.
Helen Nissenbaum (2005). Where Computer Security Meets National Security. Ethics and Information Technology 7 (2):61-73.
Jonathan Herington (2012). The Concept of Security. In Michael Selgelid & Christian Enemark (eds.), Ethical and Security Aspects of Infectious Disease Control: Interdisciplinary Perspectives. Ashgate
John D'Arcy & Anat Hovav (2009). Does One Size Fit All? Examining the Differential Effects of Is Security Countermeasures. Journal of Business Ethics 89 (1):59 - 71.
Andrea M. Matwyshyn (2009). CSR and the Corporate Cyborg: Ethical Corporate Information Security Practices. [REVIEW] Journal of Business Ethics 88 (4):579 - 594.
Fiona Robinson (2011). The Ethics of Care: A Feminist Approach to Human Security. Temple University Press.
Rüdiger W. Waldkirch, Matthias Meyer & Karl Homann (2009). Accounting for the Benefits of Social Security and the Role of Business: Four Ideal Types and Their Different Heuristics. [REVIEW] Journal of Business Ethics 89 (3):247 - 267.
Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1):1-30.
Paul El Khoury Luca Compagna, Fabio Massacci Alžběta Krausová & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1).
Added to index2011-01-09
Total downloads6 ( #378,120 of 1,780,586 )
Recent downloads (6 months)1 ( #291,765 of 1,780,586 )
How can I increase my downloads?