Using Actor Network Theory to Understand Information Security Management

نویسندگان

  • Karin Hedström
  • Gurpreet Dhillon
  • Fredrik Karlsson
چکیده

This paper presents an Actor Network Theory (ANT) analysis of a computer hack at a large university. Computer hacks are usually addressed through technical means thus ensuring that perpetrators are unable to exploit system vulnerabilities. We however argue that a computer hack is a result of di erent events in a heterogeneous network embodying human and non-human actors. Hence a secure organizational environment is one that is characterized by 'stability' and 'social order', which is a result of negotiations and alignment of interests among different actants. The argument is conducted through a case study. Our ndings reveal not only the usefulness of ANT in developing an understanding of the (in)security environment at the case study organization, but also the ability of ANT to identify di erences in interests among actants. At a practical level, our analysis suggests three principles that management needs to pay attention to in order to prevent future security breaches.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Explaining the Role of Management Accounting Information System in Strategy Formulation with Actors Network Approach

The real challenge of business environment is derived from a situation where organizations need to find opportunities on how to introduce ideas and new products to market that provide future earnings stream. Management accounting is used as a tool in this process and provides information on opportunities and threats. The purpose of this research is to explain the role of management accounting i...

متن کامل

The Symbiosis of Human and Semantic Technology Through the Lens of Actor-Network Theory

Background:  Semantic technologies (STs) have made machine reasoning possible by providing intelligent data management methods. This capability has created new forms of interaction between humans and STs, which is called "semantic interaction."  The increasing spread of this form of interaction in daily life reveals the need to identify the factors affecting it and introduce the requirements of...

متن کامل

An Integrated Social Actor and Service Oriented Architecture (SOA) Approach for Improved Electronic Health Record (EHR) Privacy and Confidentiality in the US National Healthcare Information Network (NHIN)

The emerging US National Healthcare Information Network (NHIN) will improve healthcare’s efficacy, efficiency, and safety. The first-generation NHIN being developed has numerous advantages and limitations. One of the most difficult aspects of today’s NHIN is ensuring privacy and confidentiality for personal health data, because family and caregivers have multiple complex legal relationships to ...

متن کامل

ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs

Traditional information security modelling approaches often focus on containment of assets within boundaries. Due to what is called de-perimeterisation, such boundaries, for example in the form of clearly separated company networks, disappear. This paper argues that in a deperimeterised situation a focus on containment in security modelling is ineffective. Most importantly, the tree structure i...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010