oru.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Using actor network theory to understand information security management
Örebro University, Swedish Business School at Örebro University. (MELAB)ORCID iD: 0000-0003-2304-7170
Virginia Commonwealth University, Richmond, USA.
Örebro University, Swedish Business School at Örebro University. (MELAB)ORCID iD: 0000-0002-3265-7627
2010 (English)In: Security and privacy: silver linings in the cloud / [ed] Kai Rannenberg, Vijay Varadharajan, Christian Weber, Berlin, Germany: Springer, 2010, p. 43-54Conference paper, Published paper (Refereed)
Abstract [en]

This paper presents an Actor Network Theory (ANT) analysis of a computer hack at a large university. Computer hacks are usually addressed through technical means thus ensuring that perpetrators are unable to exploit system vulnerabilities. We however argue that a computer hack is a result of different events in a heterogeneous network embodying human and non-human actors. Hence a secure organizational environment is one that is characterized by ‘stability’ and ‘social order’, which is a result of negotiations and alignment of interests among different actants. The argument is conducted through a case study. Our findings reveal not only the usefulness of ANT in developing an understanding of the (in)security environment at the case study organization, but also the ability of ANT to identify differences in interests among actants. At a practical level, our analysis suggests three principles that management needs to pay attention to in order to prevent future security breaches.

Place, publisher, year, edition, pages
Berlin, Germany: Springer, 2010. p. 43-54
Series
IFIP Advances in Information and Communication Technology ; 330
Keywords [en]
Information security, computer hack, actor network theory, IS security
National Category
Computer and Information Sciences
Research subject
Informatics
Identifiers
URN: urn:nbn:se:oru:diva-12779DOI: 10.1007/978-3-642-15257-3_5ISI: 000306342600005Scopus ID: 2-s2.0-84885075680ISBN: 978-3-642-15256-6 (print)OAI: oai:DiVA.org:oru-12779DiVA, id: diva2:381319
Conference
25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010
Available from: 2010-12-27 Created: 2010-12-27 Last updated: 2018-01-12Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Hedström, KarinKarlsson, Fredrik

Search in DiVA

By author/editor
Hedström, KarinKarlsson, Fredrik
By organisation
Swedish Business School at Örebro University
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 479 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf