2019
DOI: 10.1007/s13194-018-0237-1
|View full text |Cite
|
Sign up to set email alerts
|

A refinement to the general mechanistic account

Abstract: Phyllis Illari and Jon Williamson propose a formulation for a general mechanistic account, the purpose of which is to capture the similarities across mechanistic accounts in the sciences. Illari and Williamson extract insight from mechanisms in astrophysics-which are notably different from the typical biological mechanisms discussed in the literature on mechanisms-to show how their general mechanistic account accommodates mechanisms across various sciences. We present argumentation that demonstrates why an ame… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…There must be capacity to tailor controls to match the specificity of negative behaviour controls and features which facilitate positive behaviours. The work of Hatleback and Spring [44], and Chua et al [17], are steps toward shared terminology to navigate between prevention and preservation of behaviours.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…There must be capacity to tailor controls to match the specificity of negative behaviour controls and features which facilitate positive behaviours. The work of Hatleback and Spring [44], and Chua et al [17], are steps toward shared terminology to navigate between prevention and preservation of behaviours.…”
Section: Discussionmentioning
confidence: 99%
“…For our purposes, this is directly addressed by adopting the mechanistic approach to cybersecurity described by Hatleback and Spring [44]. With this, a behaviour can be an indexed entity, as a file or data, but also exist as an activity in a system, producing a visible phenomenon.…”
Section: Prevention and Preservation Of Behavioursmentioning
confidence: 99%
See 1 more Smart Citation
“…To address this shortcoming, we adopt a mechanistic approach similar to that described by Hatleback and Spring [57]. With this, a behaviour can be an indexed entity, as a file or data, but also exist as an activity in a system, producing a visible phenomenon.…”
Section: Condition Three: Dependencies Between Assets and Legitimate ...mentioning
confidence: 99%
“…A foundation for precision in sociotechnical security controls extends the definition of an asset to acknowledge the activities of users that contribute to the asset. This adapts the definition of indexed entities [57] to acknowledge the connection between the entity and the activity -that the activity causes changes to the entity (the data asset) -and that these changes are the phenomena that a cyber-risk owner can see. This relates (positive and negative) real-world behaviours to the identifiable data and IT systems which are subject to the decisions of a cyber-risk owner.…”
Section: Parkin and Yt Chua / Cyber-risk Framework For Coordination O...mentioning
confidence: 99%