2014
DOI: 10.1007/978-3-642-55137-6_18
|View full text |Cite
|
Sign up to set email alerts
|

Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…Subsequently, I looked for patterns, in terms of recurring themes on security. The dialogue was guided by questions such as how do people perceive 'security' in the context of their work in school; what is security believed to be, what are the assumptions, the attitudes and the actions involved (Gustafsson, 2014).…”
Section: Methods Of Analysis In the Papersmentioning
confidence: 99%
See 4 more Smart Citations
“…Subsequently, I looked for patterns, in terms of recurring themes on security. The dialogue was guided by questions such as how do people perceive 'security' in the context of their work in school; what is security believed to be, what are the assumptions, the attitudes and the actions involved (Gustafsson, 2014).…”
Section: Methods Of Analysis In the Papersmentioning
confidence: 99%
“…(2015) look at actors' interpretations of digitalisation changes that occur in local practices -in a number of schools, hospitals, and municipal administrations. In Gustafsson (2014), a translation of the concept of security is presented, using some analytical tools from Searle (1996) social theory. Finally, the fourth paper addresses advanced digitalisation as an issue in governance network-building.…”
Section: The Role Of the Papersmentioning
confidence: 99%
See 3 more Smart Citations