Soft security

Last updated

Soft security usually refers to security that protects something from harm in quiet and unobtrusive ways, often invisibly and after the fact, rather than with visible barriers before the fact. Soft security can refer to immediate security measures, such as silent burglar alarms or motion detectors, but often refers to more elaborate social security systems such as the "moral network"[ clarification needed ] in a tightly knit community — for example, a cluster of friends on a busy city street.

The term has gained widespread use in wiki communities, notably MeatballWiki.[ citation needed ]

The differentiation between "soft security" and "hard security"[ clarification needed ] was first made by Rasmusson and Jansson [1] who used the term hard security for traditional mechanisms like authentication and access control, and soft security for social control mechanisms.

There is a difference between the related concepts of quality control and soft security. [2] Soft security attempts to discourage harm and mitigate any damage, while quality control attempts to improve a product and weed out non-conforming output. The social controls on the production of Wikipedia documents demonstrate both principles, using discussion pages, accessible edit histories, policies and guidelines, in contrast to traditional document control mechanisms such as workflow and authorization, to achieve both soft security and quality control. [2]

In commercial security, soft security is often achieved through training of staff to manage the environment (1) to make disruptions more noticeable, (2) to make disruptions less socially acceptable, and (3) to create a perceived vested interest in the public. [3]

Related Research Articles

<span class="mw-page-title-main">Wiki</span> Type of website that visitors can edit

A wiki is an online hypertext publication collaboratively edited and managed by its own audience, using a web browser. A typical wiki contains multiple pages for the subjects or scope of the project, and could be either open to the public or limited to use within an organization for maintaining its internal knowledge base.

<span class="mw-page-title-main">Intranet</span> Network of private resources in an organization

An intranet is a computer network for sharing information, easier communication, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders. The term is used in contrast to public networks, such as the Internet, but uses the same technology based on the Internet protocol suite.

<span class="mw-page-title-main">Hyperlink</span> Method of referencing visual computer data

In computing, a hyperlink, or simply a link, is a digital reference to data that the user can follow or be guided to by clicking or tapping. A hyperlink points to a whole document or to a specific element within a document. Hypertext is text with hyperlinks. The text that is linked from is known as anchor text. A software system that is used for viewing and creating hypertext is a hypertext system, and to create a hyperlink is to hyperlink. A user following hyperlinks is said to navigate or browse the hypertext.

<span class="mw-page-title-main">Power (social and political)</span> Ability to influence the behavior of others

In social science and politics, power is the social production of an effect that determines the capacities, actions, beliefs, or conduct of actors. Power does not exclusively refer to the threat or use of force (coercion) by one actor against another, but may also be exerted through diffuse means. Power may also take structural forms, as it orders actors in relation to one another, and discursive forms, as categories and language may lend legitimacy to some behaviors and groups over others.

<span class="mw-page-title-main">Safety</span> State of being secure from harm, injury, danger, or other non-desirable outcomes

Safety is the state of being "safe", the condition of being protected from harm or other danger. Safety can also refer to the control of recognized hazards in order to achieve an acceptable level of risk.

<span class="mw-page-title-main">Paternalism</span> Sociological behaviour

Paternalism is action that limits a person's or group's liberty or autonomy and is intended to promote their own good. Paternalism can also imply that the behavior is against or regardless of the will of a person, or also that the behavior expresses an attitude of superiority. Paternalism, paternalistic and paternalist have all been used as a pejorative for example in the context of societal and/or political realms and references.

Governance is the process of making and enforcing decisions within an organization or society. It is the process of interactions through the laws, social norms, power or language as structured in communication of an organized society over a social system. It is done by the government of a state, by a market, or by a network. It is the process of choosing the right course among the actors involved in a collective problem that leads to the creation, reinforcement, or reproduction of acceptable conduct and social order". In lay terms, it could be described as the political processes that exist in and between formal institutions.

Human security is a paradigm for understanding global vulnerabilities whose proponents challenges the traditional notion of national security through military security by arguing that the proper referent for security should be at the human rather than national level. Human security reveals a people-centred and multi-disciplinary understanding of security which involves a number of research fields, including development studies, international relations, strategic studies, and human rights. The United Nations Development Programme's 1994 Human Development Report is considered a milestone publication in the field of human security, with its argument that ensuring "freedom from want" and "freedom from fear" for all persons is the best path to tackle the problem of global insecurity.

Achieved status is a concept developed by the anthropologist Ralph Linton for a social position that a person can acquire on the basis of merit and is earned or chosen. It is the opposite of ascribed status and reflects personal skills, abilities, and efforts. Examples of achieved status are being an Olympic athlete, a criminal, or a college professor.

<span class="mw-page-title-main">Information pollution</span>

Information pollution is the contamination of information supply with irrelevant, redundant, unsolicited, hampering and low-value information. Examples include misinformation, junk e-mail and media violence.

The following outline is provided as an overview of and topical guide to the human self:

Regarding the civil engineering of shorelines, soft engineering is a shoreline management practice that uses sustainable ecological principles to restore shoreline stabilization and protect riparian habitats. Soft Shoreline Engineering (SSE) uses the strategic placement of organic materials such as vegetation, stones, sand, debris, and other structural materials to reduce erosion, enhance shoreline aesthetic, soften the land-water interface, and lower costs of ecological restoration.

<span class="mw-page-title-main">Computer appliance</span> Dedicated computer system

A computer appliance is a computer system with a combination of hardware, software, or firmware that is specifically designed to provide a particular computing resource. Such devices became known as appliances because of the similarity in role or management to a home appliance, which are generally closed and sealed, and are not serviceable by the user or owner. The hardware and software are delivered as an integrated product and may even be pre-configured before delivery to a customer, to provide a turn-key solution for a particular application. Unlike general purpose computers, appliances are generally not designed to allow the customers to change the software and the underlying operating system, or to flexibly reconfigure the hardware.

A job safety analysis (JSA) is a procedure which helps integrate accepted safety and health principles and practices into a particular task or job operation. In a JSA, each basic step of the job is to identify potential hazards and to recommend the safest way to do the job. Other terms used to describe this procedure are job hazard analysis (JHA), hazardous task analysis (HTA) and job hazard breakdown.

Genealogical bewilderment is a term referring to potential identity problems that could be experienced by a child who was either fostered, adopted, or conceived via an assisted reproductive technology procedure such as surrogacy or gamete donation.

<span class="mw-page-title-main">History of wikis</span> History of wiki collaborative platforms

The history of wikis began in 1994, when Ward Cunningham gave the name "WikiWikiWeb" to the knowledge base, which ran on his company's website at c2.com, and the wiki software that powered it. The wiki went public in March 1995, the date used in anniversary celebrations of the wiki's origins. c2.com is thus the first true wiki, or a website with pages and links that can be easily edited via the browser, with a reliable version history for each page. He chose "WikiWikiWeb" as the name based on his memories of the "Wiki Wiki Shuttle" at Honolulu International Airport, and because "wiki" is the Hawaiian word for "quick".

<span class="mw-page-title-main">Block (Internet)</span> Restriction on accessing an online resource

On the Internet, a block or ban is a technical measure intended to restrict access to information or resources. Blocking and its inverse, unblocking, may be implemented by the owners of computers using software.

Folksonomy is a classification system in which end users apply public tags to online items, typically to make those items easier for themselves or others to find later. Over time, this can give rise to a classification system based on those tags and how often they are applied or searched for, in contrast to a taxonomic classification designed by the owners of the content and specified when it is published. This practice is also known as collaborative tagging, social classification, social indexing, and social tagging. Folksonomy was originally "the result of personal free tagging of information [...] for one's own retrieval", but online sharing and interaction expanded it into collaborative forms. Social tagging is the application of tags in an open online environment where the tags of other users are available to others. Collaborative tagging is tagging performed by a group of users. This type of folksonomy is commonly used in cooperative and collaborative projects such as research, content repositories, and social bookmarking.

<i>Common Knowledge?</i> 2014 book by Dariusz Jemielniak

Common Knowledge? An Ethnography of Wikipedia is a 2014 book about Wikipedia's community of contributors. The author is Dariusz Jemielniak, who is a Wikipedia contributor himself.

References

  1. Rasmusson, Lars; Jansson, Sverker (1996). "Simulated Social Control for Secure Internet Commerce". In Meadows, Catherine (ed.). Proceedings of the 1996 New Security Paradigms Workshop. Association for Computing Machinery.
  2. 1 2 Walsh, Kathleen M. & Oh, Sarah (2010). "Self-Regulation: How Wikipedia Leverages User-Generated Quality Control under Section 230". SSRN   1579054.
  3. Steven R.Keller. "Protecting the City Art Museum: Museum Security: Concepts/Practices" (PDF). Architect’s Security Group.