Cryptography Reference
In-Depth Information
Journal of Philosophy 95, no. 5 (1998): 215-254, and Beth Preston, “The Case of the
Recalcitrant Prototype,” in Doing Things with Things: The Design and Use of Everyday
Objects , ed. Alan Costall and Ole Dreier (Farnham, UK: Ashgate, 2006), 15-27.
10. Crowley, “Uses and Abuses of the Secret Ballot in the American Age of Reform,”
51. Similar debates went on in France at the turn of the century; see Alain Garrigou,
Yves Déloye, and Olivier Ihl, “La construction sociale du vote: Fétichisme et raison
instrumentale,” Politix 6, no. 22 (1993): 5-42.
11. Some of these alliances have been forged in the broader field of information
security. See, for example, Security and Usability: Designing Secure Systems That People
Can Use , ed. Lorrie Faith Cranor and Simson Garfinkel (Sebastopol, CA: O'Reilly
Media, 2005); Adam Shostack and Andrew Stewart, The New School of Information
Security (Boston: Addison-Wesley Professional, 2008); and Ross Anderson's web page
on economics and security resources, http://www.cl.cam.ac.uk/~rja14/econsec.html.
Search WWH ::




Custom Search