Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control 2014
DOI: 10.1109/icnsc.2014.6819659
|View full text |Cite
|
Sign up to set email alerts
|

Acceptance of ICT-intensive socio-technical infrastructure systems: Smart metering case in the Netherlands

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 3 publications
0
16
0
Order By: Relevance
“…3 Discussions about "empowerment" also point in the direction of the capacity to act [75,76]. 4 In Germany, such "associations" are often comparable to American non-profit organizations. 5 Likewise, Ashby [77] characterizes machines as "law-abiding," because no machine can be called "self-organizing," as it cannot automatically change its way of organization.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…3 Discussions about "empowerment" also point in the direction of the capacity to act [75,76]. 4 In Germany, such "associations" are often comparable to American non-profit organizations. 5 Likewise, Ashby [77] characterizes machines as "law-abiding," because no machine can be called "self-organizing," as it cannot automatically change its way of organization.…”
Section: Resultsmentioning
confidence: 99%
“…They include major technology companies, transmission service operators, federal and local business associations, and consumer and environmental associations. 4 The narratives of these experts, combined with extensive document reviews, provide the main source for our descriptions of the German ES visions. Moreover, they guided our research toward the inclusion of complexity and the resulting challenges in the three case studies.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…We propose to consider the deployment of security-sensitive technologies as social experiments, in the sense of society being subject to a test with uncertain outcome. 1 We argue that (i) the deployment of such technologies is by definition a social experiment, and that (ii) much can be learnt about real-world security by designing such experiments consciously. This paper is therefore not primarily about experimentation with security solutions (such as cryptographic protocols), yet with technologies in a wider sense in which security controls appear as important building blocks.…”
Section: Introductionmentioning
confidence: 99%