2018
DOI: 10.4013/sdrj.2018.112.03
|View full text |Cite
|
Sign up to set email alerts
|

Holding on to dissensus: Participatory interactions in security design

Abstract: Recent high-profile cyber-attacks affecting the National Health Service (NHS) in the UK have brought into focus the fact that data, devices, and people are so intermingled that we now need a new way of approaching everyday security that provides an account of place. The assumption until now has been that the security of the individual will follow from technical security and that designing for security requires purely technological solutions. Our creative engagement method puts the human security of actors in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Participatory Action Research: Engaging methods such as action research and participatory action research (PAR) were first introduced to the field of information systems in the 90's [3]. Since then, such creative engagement methods have been applied to security studies [1], [12]. The purpose of these methods is to be playful, participative, open-ended, and democratic [12].…”
Section: B Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…Participatory Action Research: Engaging methods such as action research and participatory action research (PAR) were first introduced to the field of information systems in the 90's [3]. Since then, such creative engagement methods have been applied to security studies [1], [12]. The purpose of these methods is to be playful, participative, open-ended, and democratic [12].…”
Section: B Methodologymentioning
confidence: 99%
“…Since then, such creative engagement methods have been applied to security studies [1], [12]. The purpose of these methods is to be playful, participative, open-ended, and democratic [12].…”
Section: B Methodologymentioning
confidence: 99%
“…To achieve this, they propose a methodology consisting of passive and active data collection cycles -meant to collect accurate data about security behaviours and attitudes in organizations [3]. Heath, Hall, and Coles-Kemp [13] focus on the security design of a home banking system by intersecting aspects of co-design and participatory physical modelling. More specifically, participants interact with different security scenarios by using LEGO kits and achieve positive insights by doing so.…”
Section: Co-design and Securitymentioning
confidence: 99%
“…Re-casting the values of the welfare system so that efficiency, employment and self-efficacy are matched with values of solidarity, reciprocity and care creates new placements of access and security that are located within the wider welfare ecosystem. Framing welfare as a form of care acknowledges the potential for conflict but also provides capacity for working with, rather than against, the breakdowns of everyday patterns and interactions (Hall, Coles-Kemp, and Heath 2018).…”
Section: Possible Futures In Dialogue With the Lived Presentmentioning
confidence: 99%