The model of an intelligent information security control system for supply chains based on the spatial concepts of the actor-network theory

2020 ◽  
Vol 5 ◽  
pp. 94-106
Author(s):  
Y.M. Iskanderov ◽  
◽  
M.D. Pautov

Aim. The use of modern information technologies makes it possible to achieve a qualitatively new level of control in supply chains. In these conditions, ensuring information security is the most important task. The article shows the possibilities of applying the spatial concepts of the actor-network theory in the interests of forming a relevant intelligent information security management system for supply chains. Materials and methods. The article discusses a new approach based on the provisions of the actor-network theory, which makes it possible to form the structure of an intelligent information security control system for supply chains, consisting of three main functional blocks: technical, psychological and administrative. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fl uids. Results. It is shown that the stability of this system in the space of networks is a necessary condition for its successful functioning in the space of regions, and its resilience in the space of fl uids gained through the dynamic knowledge formation helps overcome the adverse effects of the fl uidity. The problems of the intentional / unintentional nature of information security threats, as well as the reactivity / proactivity of the corresponding responses of the intelligent information security management system for supply chains are investigated. Conclusions. The proposed approach showed the possibility of using such an interdisciplinary tool in the fi eld of information security as the concepts of the actor-network theory. The intelligent information security control system built on its basis ensures that almost all the features of solving information security problems in supply chains are taken into account.

2020 ◽  
Vol 46 (1) ◽  
pp. 81-111 ◽  
Author(s):  
Rebecca Slayton

Information security governance has become an elusive goal and a murky concept. This paper problematizes both information security governance and the broader concept of governance. What does it mean to govern information security, or for that matter, anything? Why have information technologies proven difficult to govern? And what assurances can governance provide for the billions of people who rely on information technologies every day? Drawing together several distinct bodies of literature—including multiple strands of governance theory, actor–network theory, and scholarship on sociotechnical regimes—this paper conceptualizes networked action on a spectrum from uncertain governance to governing uncertainty. I advance a twofold argument. First, I argue that networks can better govern uncertainty as they become more able not only to enroll actors in a collective agenda, but also to cut ties with those who seek to undermine that agenda. And second, I argue that the dominant conception of information security governance, which emphasizes governing uncertainty through risk management, in practice devolves to uncertain governance. This is largely because information technologies have evolved toward greater connectedness—and with it, greater vulnerability—creating a regime of insecurity. This evolution is illustrated using the history of the US government’s efforts to govern information security.


Author(s):  
Dan Harnesk

Over the past 20 years, researchers have made significant headway into understanding information security, with most studies focusing on internal organizational information security affairs. This study adds to the cumulative tradition by creating a concept for the convergence of information security in B2B network contexts. More specifically, the move from information security safeguards to information security observers is presented in depth. By adopting the Actor Network Theory and the Process Theory, this chapter demonstrates how three conversion, use, and performance sub-processes constitute the devised process of converging information security. Each sub-process directs attention towards definition, integration, the evaluation of security and how the metaphor of the observer may operate in the B2B network context.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zelinna Pablo ◽  
Kerry London ◽  
Peter S.P. Wong ◽  
Malik Khalfan

Purpose Current understandings of innovation in construction portray it as linear, deterministic phenomena centered around novel objects and technologies deployed in sequentially-organized supply chains. This study aims to develop an enriched understanding of construction innovation as non-linear, socio-material and dynamic phenomena in complex networks by formulating a novel conceptual apparatus of complex adaptive supply networks (CASNs) expanded through actor-network theory (ANT) concepts. Design/methodology/approach This combined CASN/ANT apparatus is mobilized in the context of a qualitative case study involving a housing construction supply network in Australia making use of offsite manufacturing (OSM) techniques. Findings The study shows that innovative technologies such as novel OSM products can play an important though not necessarily deterministic role in the evolution of CASNs. The study also explicates the process by which the enrollment of non-human agents and the resulting CASN evolution are linked: innovative technologies shape human and non-human interactions in ways that redefine task delegation, role definition and schemas that are fundamental to the shape of CASNs. Originality/value Findings provide a compelling empirical basis for arguing that CASNs must be conceptualized as heterogeneous systems and that innovation in construction must be understood as non-linear, socio-material and dynamic, rather than linear and driven by technological determinism. The study also interrogates limiting notions of supply chains and supports the notion of alternative inter-organizational forms to understand construction project work.


Author(s):  
Huda Ibrahim ◽  
Hasmiah Kasimin

An effi cient and effective information technology transfer from developed countries to Malaysia is an important issue as a prerequisite to support the ICT needs of the country to become not only a ICT user but also a ICT producer. One of the factors that infl uences successful information technology transfer is managing the process of how technology transfer occurs in one environment. It involves managing interaction between all parties concerned which requires an organized strategy and action toward accomplishing technology transfer objective in an integrated and effective mode. Using a conceptual framework based on the Actor Network Theory (ANT), this paper will analyse a successful information technology transfer process at a private company which is also a supplier of information technology (IT) products to the local market. This framework will explain how the company has come up with a successful technology transfer in a local environment. Our study shows that the company had given interest to its relationships with all the parties involved in the transfer process. The technology transfer programme and the strategy formulated take into account the characteristics of technology and all those involved.  


2017 ◽  
Vol 23 (2) ◽  
pp. 100-121
Author(s):  
Michel Chambon

This article explores the ways in which Christians are building churches in contemporary Nanping, China. At first glance, their architectural style appears simply neo-Gothic, but these buildings indeed enact a rich web of significances that acts upon local Christians and beyond. Building on Actor-Network Theory and exploring the multiple ties in which they are embedded, I argue that these buildings are agents acting in their own right, which take an active part in the process of making the presence of the Christian God tangible.


2020 ◽  
Author(s):  
Milena Heinsch ◽  
Tania Sourdin ◽  
Caragh Brosnan ◽  
Hannah Cootes

Sign in / Sign up

Export Citation Format

Share Document