Soft Security

De Mi caja de notas

Protocoles de communication Communication non violente

> La sécurité douce n’est pas faible - meatball


Soft security usually refers to security that protects something from harm in quiet and unobtrusive ways, often invisibly and after the fact, rather than with visible barriers before the fact. Soft security can refer to immediate security measures, such as silent burglar alarms or motion detectors, but often refers to more elaborate social security systems such as the "moral network"[clarification needed] in a tightly knit community — for example, a cluster of friends on a busy city street.

The term has gained widespread use in wiki communities, notably MeatballWiki.[citation needed]

The differentiation between "soft security" and "hard security"[clarification needed] was first made by Rasmusson and Jansson[1] who used the term hard security for traditional mechanisms like authentication and access control, and soft security for social control mechanisms.

There is a difference between the related concepts of quality control and soft security.[2] Soft security attempts to discourage harm and mitigate any damage, while quality control attempts to improve a product and weed out non-conforming output. The social controls on the production of Wikipedia documents demonstrate both principles, using discussion pages, accessible edit histories, policies and guidelines, in contrast to traditional document control mechanisms such as workflow and authorization, to achieve both soft security and quality control.[2]

In commercial security, soft security is often achieved through training of staff to manage the environment (1) to make disruptions more noticeable, (2) to make disruptions less socially acceptable, and (3) to create a perceived vested interest in the public.[3]

References

  1. ^ Rasmusson, Lars; Jansson, Sverker (1996). "Simulated Social Control for Secure Internet Commerce". In Meadows, Catherine (ed.). Proceedings of the 1996 New Security Paradigms Workshop. Association for Computing Machinery.
  2. ^ a b Walsh, Kathleen M. & Oh, Sarah (2010). "Self-Regulation: How Wikipedia Leverages User-Generated Quality Control under Section 230". SSRN 1579054.
  3. ^ Steven R.Keller. "Protecting the City Art Museum: Museum Security: Concepts/Practices" (PDF). Architect’s Security Group.