Using Actor Network Theory to understand information security management

18Citations
Citations of this article
42Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper presents an Actor Network Theory (ANT) analysis of a computer hack at a large university. Computer hacks are usually addressed through technical means thus ensuring that perpetrators are unable to exploit system vulnerabilities. We however argue that a computer hack is a result of different events in a heterogeneous network embodying human and non-human actors. Hence a secure organizational environment is one that is characterized by 'stability' and 'social order', which is a result of negotiations and alignment of interests among different actants. The argument is conducted through a case study. Our findings reveal not only the usefulness of ANT in developing an understanding of the (in)security environment at the case study organization, but also the ability of ANT to identify differences in interests among actants. At a practical level, our analysis suggests three principles that management needs to pay attention to in order to prevent future security breaches. © IFIP International Federation for Information Processing 2010.

Cite

CITATION STYLE

APA

Hedström, K., Dhillon, G., & Karlsson, F. (2010). Using Actor Network Theory to understand information security management. In IFIP Advances in Information and Communication Technology (Vol. 330, pp. 43–54). https://doi.org/10.1007/978-3-642-15257-3_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free