{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:54:13Z","timestamp":1725792853965},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642551369"},{"type":"electronic","value":"9783642551376"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55137-6_18","type":"book-chapter","created":{"date-parts":[[2014,5,2]],"date-time":"2014-05-02T01:34:40Z","timestamp":1398994480000},"page":"224-236","source":"Crossref","is-referenced-by-count":0,"title":["Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools"],"prefix":"10.1007","author":[{"given":"Mariana S.","family":"Gustafsson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"18_CR1","volume-title":"The consequences of modernity","author":"A. Giddens","year":"1990","unstructured":"Giddens, A.: The consequences of modernity. Polity in association with Blackwell, Cambridge (1990)"},{"key":"18_CR2","unstructured":"Beck, U., Ritter, M.: Risk society: towards a new modernity. Theory, culture & society. Sage, London (1992); 99\u2013948605"},{"key":"18_CR3","series-title":"The rise of the network society","volume-title":"The information age : economy, society and culture","author":"M. Castells","year":"1996","unstructured":"Castells, M.: The information age: economy, society and culture. The rise of the network society, vol.\u00a01. Blackwell, Malden (1996)"},{"key":"18_CR4","series-title":"The power of identity","volume-title":"The information age : economy, society and culture","author":"M. Castells","year":"1997","unstructured":"Castells, M.: The information age: economy, society and culture. The power of identity, vol.\u00a02. Blackwell, Malden (1997)"},{"key":"18_CR5","volume-title":"Communication power","author":"M. Castells","year":"2011","unstructured":"Castells, M.: Communication power. Oxford Univ. Press, Oxford (2011)"},{"issue":"2","key":"18_CR6","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.giq.2006.06.005","volume":"24","author":"R. Heeks","year":"2007","unstructured":"Heeks, R., Bailur, S.: Analyzing e-government research: Perspectives, philosophies, theories, methods, and practice. Government Information Quarterly\u00a024(2), 243\u2013265 (2007)","journal-title":"Government Information Quarterly"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.giq.2012.08.002","volume":"30","author":"K. Axelsson","year":"2013","unstructured":"Axelsson, K., Melin, U., Lindgren, I.: Public e-services for agency efficiency and citizen benefit-Findings from a stakeholder centered analysis. Government Information Quarterly\u00a030(1), 10\u201322 (2013)","journal-title":"Government Information Quarterly"},{"key":"18_CR8","unstructured":"Melin, U., Axelsson, K., S\u00f6derstr\u00f6m, F.: Managing the Development of Secure Identification \u2013 Investigating a National e-ID Initiative within a Public e-service Context. In: ECIS 2013. European Conference on Information Systems, Utrecht (2013)"},{"key":"18_CR9","unstructured":"Wihlborg, E.: eID (electronic identification) as an Innovation in the Interface of Politics and Technology, U. Symposium, Editor (2012)"},{"issue":"3","key":"18_CR10","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1177\/0002764209338795","volume":"53","author":"B. Rothstein","year":"2009","unstructured":"Rothstein, B.: Creating Political Legitimacy: Electoral Democracy Versus Quality of Government. American Behavioral Scientist\u00a053(3), 311\u2013330 (2009)","journal-title":"American Behavioral Scientist"},{"key":"18_CR11","unstructured":"Skolverket, IT-anv\u00e4ndning och it-kompetens i skolan, Skolverket, Editor. Stockholm, Skolverket (2013)"},{"key":"18_CR12","unstructured":"Sweden, S.: Use of computers and the Internet by private persons in 2012, Stockholm (2013)"},{"key":"18_CR13","doi-asserted-by":"crossref","DOI":"10.4135\/9781446270035","volume-title":"Constructing research questions: doing interesting research","author":"M. Alvesson","year":"2013","unstructured":"Alvesson, M., Sandberg, J.: Constructing research questions: doing interesting research. SAGE, London (2013)"},{"issue":"2","key":"18_CR14","doi-asserted-by":"publisher","first-page":"247","DOI":"10.5465\/AMR.2011.59330882","volume":"36","author":"M. Alvesson","year":"2011","unstructured":"Alvesson, M., Sandberg, J.: Generating Research Questions Through Problematization. Academy of Management Review\u00a036(2), 247\u2013271 (2011)","journal-title":"Academy of Management Review"},{"key":"18_CR15","doi-asserted-by":"crossref","DOI":"10.4135\/9781446287859","volume-title":"Qualitative research and theory development: mystery as method","author":"M. Alvesson","year":"2011","unstructured":"Alvesson, M., K\u00e4rreman, D.: Qualitative research and theory development: mystery as method. Sage Publications, Thousand Oaks (2011)"},{"key":"18_CR16","volume-title":"Social research methods","author":"A. Bryman","year":"2012","unstructured":"Bryman, A.: Social research methods, 4th edn. Oxford University Press, Oxford (2012)","edition":"4"},{"key":"18_CR17","volume-title":"Qualitative inquiry and research design : choosing among five approaches","author":"J.W. Creswell","year":"2013","unstructured":"Creswell, J.W., Creswell, J.W.: Qualitative inquiry and research design: choosing among five approaches, 3rd edn. SAGE Publications, Thousand Oaks (2013)","edition":"3"},{"key":"18_CR18","unstructured":"Gustafsson, M., Wihlborg, E.: Organizing safe on-line interaction and trust in governmental services. A case study of identification channels for public e-services in schools. JeDEM. The eJournal of eDemocracy and Open Government (2013)"},{"key":"18_CR19","unstructured":"Wihlborg, E., Gustafsson, M.: Electronic identification in practice \u2013 a case study of the use and organization of eID in public e-services in schools. In: SWEG 2013. 10th Scandinavian Workshop on E-government, Oslo (2013)"},{"key":"18_CR20","volume-title":"The construction of social reality","author":"J.R. Searle","year":"1996","unstructured":"Searle, J.R.: The construction of social reality. Penguin, London (1996)"},{"key":"18_CR21","volume-title":"The social construction of reality : a treatise in the sociology of knowledge","author":"P.L. Berger","year":"1966","unstructured":"Berger, P.L., Luckmann, T.: The social construction of reality: a treatise in the sociology of knowledge. Doubleday, Garden City (1966)"},{"key":"18_CR22","volume-title":"The construction of social reality","author":"J.R. Searle","year":"1995","unstructured":"Searle, J.R.: The construction of social reality. Free Press, New York (1995)"},{"key":"18_CR23","unstructured":"Oscarson, P.: Actual and perceived information systems security. Link\u00f6ping studies in arts and science, pp. 0282\u20139800. Department of Management and Engineering, Link\u00f6ping University, Link\u00f6ping (2007)"},{"key":"18_CR24","unstructured":"FG_10.23_LK, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. Universitet, Editor (2012)"},{"key":"18_CR25","unstructured":"FG_11.27_eBR, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR26","unstructured":"FG_11.27_lBR, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR27","unstructured":"I_10.22_LK, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. Universitet, Editor (2012)"},{"key":"18_CR28","unstructured":"I_11.14_rBJ, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR29","unstructured":"I_11.27_rBR, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR30","unstructured":"I_12.04_FFK, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR31","unstructured":"I_12.05_rFK, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR32","unstructured":"FG_12.04_eFK, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR33","unstructured":"I_11.06_rAT, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR34","unstructured":"FG_11.14_lBJ, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR35","unstructured":"FG_12.04_lFK, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR36","unstructured":"I_11.12_LK, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"},{"key":"18_CR37","unstructured":"FG_11.05_lAT, FUSe - Framtidens s\u00e4kra elektroniska identifiering \u2013 framv\u00e4xt och anv\u00e4ndning av e-legitimationer. L. universitet, Editor (2012)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Emerging Services and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55137-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T18:18:31Z","timestamp":1558894711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55137-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642551369","9783642551376"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55137-6_18","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2014]]}}}