Soft Security
Get Soft Security essential facts below. View Videos or join the Soft Security discussion. Add Soft Security to your PopFlock.com topic list for future reference or share this resource on social media.
Soft Security

Soft security usually refers to security that protects something from harm in quiet and unobtrusive ways, often invisibly and after the fact, rather than with visible barriers before the fact. Soft security can refer to immediate security measures, such as silent burglar alarms or motion detectors, but often refers to more elaborate social security systems such as the "moral network"[clarification needed] in a tightly-knit community -- for example, a cluster of friends on a busy city street.

The term has gained widespread use in wiki communities, notably MeatballWiki.[]

The differentiation between "soft security" and "hard security"[clarification needed] was first made by Rasmusson and Jansson[1] who used the term hard security for traditional mechanisms like authentication and access control, and soft security for social control mechanisms.

There is a difference between the related concepts of quality control and soft security.[2] Soft security attempts to discourage harm and mitigate any damage, while quality control attempts to improve a product and weed out non-conforming output. The social controls on the production of Wikipedia documents demonstrate both principles, using discussion pages, accessible edit histories, policies and guidelines, in contrast to traditional document control mechanisms such as workflow and authorization, to achieve both soft security and quality control.[2]

In commercial security, soft security is often achieved through training of staff to manage the environment (1) to make disruptions more noticeable, (2) to make disruptions less socially acceptable, and (3) to create a perceived vested interest in the public.[3]

References

  1. ^ Rasmusson, Lars; Jansson, Sverker (1996). "Simulated Social Control for Secure Internet Commerce". In Meadows, Catherine (ed.). Proceedings of the 1996 New Security Paradigms Workshop. Association for Computing Machinery.
  2. ^ a b Walsh, Kathleen M. & Oh, Sarah (2010). "Self-Regulation: How popflock.com resource Leverages User-Generated Quality Control under Section 230". SSRN 1579054.
  3. ^ Steven R.Keller. "Protecting the City Art Museum: Museum Security: Concepts/Practices" (PDF). Architect's Security Group.

External links


  This article uses material from the Wikipedia page available here. It is released under the Creative Commons Attribution-Share-Alike License 3.0.

Soft_security
 



 



 
Music Scenes