Using Actor Network Theory to Understand Information Security Management - Security and Privacy - Silver Linings in the Cloud Access content directly
Conference Papers Year : 2010

Using Actor Network Theory to Understand Information Security Management

Abstract

This paper presents an Actor Network Theory (ANT) analysis of a computer hack at a large university. Computer hacks are usually addressed through technical means thus ensuring that perpetrators are unable to exploit system vulnerabilities. We however argue that a computer hack is a result of different events in a heterogeneous network embodying human and non-human actors. Hence a secure organizational environment is one that is characterized by 'stability' and 'social order', which is a result of negotiations and alignment of interests among different actants. The argument is conducted through a case study. Our findings reveal not only the usefulness of ANT in developing an understanding of the (in)security environment at the case study organization, but also the ability of ANT to identify differences in interests among actants. At a practical level, our analysis suggests three principles that management needs to pay attention to in order to prevent future security breaches.
Fichier principal
Vignette du fichier
4-Paper-133-USING_ACTOR_NETWORK_THEORY_TO_UNDERSTAND_INFORMATION_SECURITY_MANAGEMENT-Hedstrom_Karin.pdf (140.83 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01054504 , version 1 (07-08-2014)

Licence

Attribution

Identifiers

Cite

Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson. Using Actor Network Theory to Understand Information Security Management. 25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.43-54, ⟨10.1007/978-3-642-15257-3_5⟩. ⟨hal-01054504⟩
261 View
200 Download

Altmetric

Share

Gmail Facebook X LinkedIn More