Abstract
This paper addresses how people construct meanings regarding “the concept of security”, based upon the descriptions collected from participants in a case study of the use of electronic identification in ICT platforms in schools. The aim of the paper is to reflect on the concept of security by identifying and analyzing how people build their own understanding of security when using ICT platforms in schools. The analysis identifies three ontological instances of security: security as an ideal state of affairs, security as a value and information security. The analysis also clarifies the difference between the objective and subjective nature of security, as well as the differences between factual and perceived information security. As a result, I raise several research questions concerning “security”, and identify common assumptions with regard to constructing the concept of security.
Chapter PDF
Similar content being viewed by others
References
Giddens, A.: The consequences of modernity. Polity in association with Blackwell, Cambridge (1990)
Beck, U., Ritter, M.: Risk society: towards a new modernity. Theory, culture & society. Sage, London (1992); 99–948605
Castells, M.: The information age: economy, society and culture. The rise of the network society, vol. 1. Blackwell, Malden (1996)
Castells, M.: The information age: economy, society and culture. The power of identity, vol. 2. Blackwell, Malden (1997)
Castells, M.: Communication power. Oxford Univ. Press, Oxford (2011)
Heeks, R., Bailur, S.: Analyzing e-government research: Perspectives, philosophies, theories, methods, and practice. Government Information Quarterly 24(2), 243–265 (2007)
Axelsson, K., Melin, U., Lindgren, I.: Public e-services for agency efficiency and citizen benefit-Findings from a stakeholder centered analysis. Government Information Quarterly 30(1), 10–22 (2013)
Melin, U., Axelsson, K., Söderström, F.: Managing the Development of Secure Identification – Investigating a National e-ID Initiative within a Public e-service Context. In: ECIS 2013. European Conference on Information Systems, Utrecht (2013)
Wihlborg, E.: eID (electronic identification) as an Innovation in the Interface of Politics and Technology, U. Symposium, Editor (2012)
Rothstein, B.: Creating Political Legitimacy: Electoral Democracy Versus Quality of Government. American Behavioral Scientist 53(3), 311–330 (2009)
Skolverket, IT-användning och it-kompetens i skolan, Skolverket, Editor. Stockholm, Skolverket (2013)
Sweden, S.: Use of computers and the Internet by private persons in 2012, Stockholm (2013)
Alvesson, M., Sandberg, J.: Constructing research questions: doing interesting research. SAGE, London (2013)
Alvesson, M., Sandberg, J.: Generating Research Questions Through Problematization. Academy of Management Review 36(2), 247–271 (2011)
Alvesson, M., Kärreman, D.: Qualitative research and theory development: mystery as method. Sage Publications, Thousand Oaks (2011)
Bryman, A.: Social research methods, 4th edn. Oxford University Press, Oxford (2012)
Creswell, J.W., Creswell, J.W.: Qualitative inquiry and research design: choosing among five approaches, 3rd edn. SAGE Publications, Thousand Oaks (2013)
Gustafsson, M., Wihlborg, E.: Organizing safe on-line interaction and trust in governmental services. A case study of identification channels for public e-services in schools. JeDEM. The eJournal of eDemocracy and Open Government (2013)
Wihlborg, E., Gustafsson, M.: Electronic identification in practice – a case study of the use and organization of eID in public e-services in schools. In: SWEG 2013. 10th Scandinavian Workshop on E-government, Oslo (2013)
Searle, J.R.: The construction of social reality. Penguin, London (1996)
Berger, P.L., Luckmann, T.: The social construction of reality: a treatise in the sociology of knowledge. Doubleday, Garden City (1966)
Searle, J.R.: The construction of social reality. Free Press, New York (1995)
Oscarson, P.: Actual and perceived information systems security. Linköping studies in arts and science, pp. 0282–9800. Department of Management and Engineering, Linköping University, Linköping (2007)
FG_10.23_LK, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. Universitet, Editor (2012)
FG_11.27_eBR, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
FG_11.27_lBR, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
I_10.22_LK, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. Universitet, Editor (2012)
I_11.14_rBJ, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
I_11.27_rBR, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
I_12.04_FFK, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
I_12.05_rFK, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
FG_12.04_eFK, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
I_11.06_rAT, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
FG_11.14_lBJ, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
FG_12.04_lFK, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
I_11.12_LK, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
FG_11.05_lAT, FUSe - Framtidens säkra elektroniska identifiering – framväxt och användning av e-legitimationer. L. universitet, Editor (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Gustafsson, M.S. (2014). Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools. In: Hansen, M., Hoepman, JH., Leenes, R., Whitehouse, D. (eds) Privacy and Identity Management for Emerging Services and Technologies. Privacy and Identity 2013. IFIP Advances in Information and Communication Technology, vol 421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55137-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-55137-6_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55136-9
Online ISBN: 978-3-642-55137-6
eBook Packages: Computer ScienceComputer Science (R0)