scholarly journals The Cybersecurity Aspects of New Entities Need a Cybernetic, Holistic Perspective

Author(s):  
Rob Van Kranenburg ◽  
Gaelle Le Gars

In our connected world security and proof (evidence constituted in Verifiable Credentials (VC, W3C)) is distributed over what an individual can attest, what my objects tell about me (that is why AI = inferences from that data, is so important), and my behavior: “apply shaving foam” is a number in coelition.org. It is clear that we can no longer isolate the notion of security as in securing devices or securing infrastructure. In this brief article which is the background to a number of workshops that the authors and the Journal will host together, we sketch what we believe to be the end of a paradigm of a government model that has outsourced capabilities to the market. It is in the process of privatizing its last public capability: identity management. This is causing tremendous stress in systems, services, organizational procedures, and individuals. We propose a holistic perspective, distributing security at two points: at the device level and a moral movement at a societal level. As a time out to create room to discuss this broadly, we propose a particular model of SSI and disposable identities.

1979 ◽  
Vol 24 (9) ◽  
pp. 695-696
Author(s):  
PETER SUEDFELD
Keyword(s):  

1986 ◽  
Vol 31 (2) ◽  
pp. 110-112 ◽  
Author(s):  
Carol M. Werner

2007 ◽  
Author(s):  
Steve A. Nida ◽  
Arona R. Muckenfuss ◽  
D. Michelle Turner ◽  
Kipling D. Williams

1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


2011 ◽  
Vol 1 (1) ◽  
pp. 30-34
Author(s):  
Catherine Morley

In 2007, when I began studies toward two diplomas, one in textile arts, and one in documentary film this seeming ‘change of focus’ prompted questions from dietetics and research colleagues: Was I changing careers? What did visual arts and film have to do with dietetics and research? In addition to personal reasons for these studies, I wanted ‘time out’ from consulting and research to develop my knowledge and skills in these artforms, and to explore them as means to broaden the reach of research findings. In this article, I discuss the potential for film and visual arts in dietetics practice and education. Arts-based inquiry and practice offer ways to disrupt power differentials, to question what counts as knowledge and whose/what voices ought to count, to invite reflections on and conversations about meanings imbedded in food and in eating behaviour, and to integrate this knowledge into collaborative, client-centred approaches to nutrition education.


Sign in / Sign up

Export Citation Format

Share Document