{"id":"https://openalex.org/W2173962540","doi":"https://doi.org/10.1007/978-3-642-55137-6_18","title":"Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools","display_name":"Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2173962540","doi":"https://doi.org/10.1007/978-3-642-55137-6_18","mag":"2173962540"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-55137-6_18","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-55137-6_18","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-55137-6_18.pdf","source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-55137-6_18.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069619799","display_name":"Mariana S. Gustafsson","orcid":"https://orcid.org/0000-0001-6099-4252"},"institutions":[{"id":"https://openalex.org/I102134673","display_name":"Link\u00f6ping University","ror":"https://ror.org/05ynxx418","country_code":"SE","type":"education","lineage":["https://openalex.org/I102134673"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Mariana S. Gustafsson","raw_affiliation_strings":["Department for Management and Engineering, Political Science Unit, Link\u00f6ping University, Sweden","LIU - Link\u00f6ping University (SE-581 83 Link\u00f6ping - Sweden)"],"affiliations":[{"raw_affiliation_string":"Department for Management and Engineering, Political Science Unit, Link\u00f6ping University, Sweden","institution_ids":["https://openalex.org/I102134673"]},{"raw_affiliation_string":"LIU - Link\u00f6ping University (SE-581 83 Link\u00f6ping - Sweden)","institution_ids":["https://openalex.org/I102134673"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5069619799"],"corresponding_institution_ids":["https://openalex.org/I102134673"],"apc_list":null,"apc_paid":null,"fwci":5.0861,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.94844176,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"224","last_page":"236"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10557","display_name":"Social Media and Politics","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10953","display_name":"E-Government and Public Services","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.658155083656311},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5675572156906128},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5482726693153381},{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.5095763206481934},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.504625678062439},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5017166137695312},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.43645456433296204},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.417026162147522},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.40528276562690735},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.34785398840904236},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12540322542190552}],"concepts":[{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.658155083656311},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5675572156906128},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5482726693153381},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.5095763206481934},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.504625678062439},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5017166137695312},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.43645456433296204},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.417026162147522},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.40528276562690735},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.34785398840904236},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12540322542190552},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-55137-6_18","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-55137-6_18","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-55137-6_18.pdf","source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01276077v1","is_oa":true,"landing_page_url":"https://hal.science/hal-01276077","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Marit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.224-236, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. &#x27E8;10.1007/978-3-642-55137-6_18&#x27E9;","raw_type":"Book sections"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-55137-6_18","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-55137-6_18","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-55137-6_18.pdf","source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2173962540.pdf","grobid_xml":"https://content.openalex.org/works/W2173962540.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W122193584","https://openalex.org/W269653639","https://openalex.org/W609297471","https://openalex.org/W636341350","https://openalex.org/W1541515907","https://openalex.org/W1555293867","https://openalex.org/W1557459633","https://openalex.org/W1757850293","https://openalex.org/W1808411157","https://openalex.org/W1841722716","https://openalex.org/W1978246972","https://openalex.org/W2053120142","https://openalex.org/W2062199894","https://openalex.org/W2071202231","https://openalex.org/W2073506374","https://openalex.org/W2099043095","https://openalex.org/W2149868499","https://openalex.org/W2162713456","https://openalex.org/W2168157886","https://openalex.org/W2611634515","https://openalex.org/W2798862961","https://openalex.org/W3129696931","https://openalex.org/W4210822710"],"related_works":["https://openalex.org/W2336014427","https://openalex.org/W2033357182","https://openalex.org/W139145738","https://openalex.org/W2592164127","https://openalex.org/W2738206145","https://openalex.org/W2387034603","https://openalex.org/W2898468158","https://openalex.org/W2495229164","https://openalex.org/W147109933","https://openalex.org/W2366741068"],"abstract_inverted_index":{"This":[0],"paper":[1,38],"addresses":[2],"how":[3,51],"people":[4,52],"construct":[5],"meanings":[6],"regarding":[7],"\u201cthe":[8],"concept":[9,44,131],"of":[10,23,26,36,45,57,71,78,99,132],"security\u201d,":[11],"based":[12],"upon":[13],"the":[14,24,37,43,91,94,104,130],"descriptions":[15],"collected":[16],"from":[17],"participants":[18],"in":[19,29,32,63],"a":[20,82,113],"case":[21],"study":[22],"use":[25],"electronic":[27],"identification":[28],"ICT":[30,61],"platforms":[31,62],"schools.":[33,64],"The":[34,65,87],"aim":[35],"is":[39],"to":[40,128],"reflect":[41],"on":[42],"security":[46,58,73,80],"by":[47],"identifying":[48],"and":[49,84,96,108,122],"analyzing":[50],"build":[53],"their":[54],"own":[55],"understanding":[56],"when":[59],"using":[60],"analysis":[66,88],"identifies":[67],"three":[68],"ontological":[69],"instances":[70],"security:":[72],"as":[74,81,101,103],"an":[75],"ideal":[76],"state":[77],"affairs,":[79],"value":[83],"information":[85,110],"security.":[86,111,133],"also":[89],"clarifies":[90],"difference":[92],"between":[93,106],"objective":[95],"subjective":[97],"nature":[98],"security,":[100],"well":[102],"differences":[105],"factual":[107],"perceived":[109],"As":[112],"result,":[114],"I":[115],"raise":[116],"several":[117],"research":[118],"questions":[119],"concerning":[120],"\u201csecurity\u201d,":[121],"identify":[123],"common":[124],"assumptions":[125],"with":[126],"regard":[127],"constructing":[129]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-10-10T00:00:00"}
