Abstract
The title of this volume is “Security by design”. This can be read as a statement, as an expression of confidence that it is possible to be secure by design. In that case the obvious next step is to think about possible ways of ensuring security by design, starting, for instance, with the solutions that have been developed to solve the seemingly analogous problems of safety or prevention by design. But what if the title had been “Security by design?” or in other words a question rather than a statement? In that case the title would not be taken as an expression of confidence but rather as an admission of uncertainty or even of impotence, a possible doubt of whether security can be ensured by design. The obvious next step would then be to take a closer look at the two central concepts, namely “security” and “design”. The current chapter will do just that.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rittel HWJ (1988) The reasoning of designers. (Arbeitspapier zum international congress on planning and design theory, Boston, August 1987.) Universität Stuttgart: Schriftenreihe des Instituts für Grundlagen der Planung
Perrow C (1984) Normal accidents. Basic Books, New York
von Foerster H (2002) Understanding systems: conversations on epistemology and ethics (IFSR International series in systems science and systems engineering, vol 17.) Springer, Berlin
Lovins AB, Lovins LH (1982) Brittle power. Brick House Publishing Co, Andover, MA
Zwetsloot GIJM et al (2013) The case for research into the zero accident vision. Saf Sci 58:41–48
Hollnagel E (2014) Safety-I and Safety-II: the past and future of safety management. Ashgate, Farnham, UK
Burati DL, Godoy SG (1982) Sneak analysis application guidelines. RADC-TR-82-179. Rome Air Development Center
Hahn AH (1991) Applying sneak analysis to the identification of human errors of commission. Reliability Engineering & System Safety 33:289–300
Wiener N (1964) God & Golem, Inc. A comment on certain points where cybernetics impinges on religion. The MIT Press, Cambridge, Massachusetts
Morozov E (2013) The perils of perfection. The New York Times, 2 March 2013
Ashby WR (1956) An introduction to cybernetics. Methuen & Co, London
Conant RC, Ashby WR (1970) Every good regulator of a system must be a model of that system. Int J Syst Sci 1(2):89–97
Westrum R (1993) Cultures with requisite imagination. In: Wise JA, Hopkin VD, Stager P (eds) Verification ad validation of complex systems: human factors issues. Springer Verlag, Berlin, pp 401–416
Adamski AJ, Westrum R (2003) Requisite imagination. The fine art of anticipating what might go wrong. In: E Hollnagel (ed), Handbook of cognitive task design. Lawrence Erlbaum, New Jersey
Westrum R (2006) A typology of Resilience Situations. In: Hollnagel E, Woods DD, Leveson N (eds), Resilience engineering. concepts and precepts. Ashgate, Aldershot, UK
Green AE (1988) Human factors in industrial risk assessment—some early work. In: Goodstein LP, Andersen HB, Olsen SE (eds) Task, errors and mental models. Taylor & Francis, London
Hollnagel E (1995) Latent failure conditions and safety barrier integrity. Invited presentation at Joint OECD/NEA-IAEA symposium on human factors and organisation in NPP maintenance outages: impact on safety. Stockholm, Sweden, 19–22 June
Hollnagel E (2004) Barriers and accident prevention. Ashgate, Aldershot, UK
Hollnagel E (2017) Safety-II in practice: developing the resilience potentials. Routledge, Abingdon, UK
Weick KE (1987) Organizational culture as a source of high reliability. Calif Manag Rev 29(2):112–128
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Hollnagel, E. (2018). To Feel Secure or to Be Secure, That Is the Question. In: Masys, A. (eds) Security by Design. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-78021-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-78021-4_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78020-7
Online ISBN: 978-3-319-78021-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)