Convergence of Information Security in B2B Networks

Author(s):  
Dan Harnesk

Over the past 20 years, researchers have made significant headway into understanding information security, with most studies focusing on internal organizational information security affairs. This study adds to the cumulative tradition by creating a concept for the convergence of information security in B2B network contexts. More specifically, the move from information security safeguards to information security observers is presented in depth. By adopting the Actor Network Theory and the Process Theory, this chapter demonstrates how three conversion, use, and performance sub-processes constitute the devised process of converging information security. Each sub-process directs attention towards definition, integration, the evaluation of security and how the metaphor of the observer may operate in the B2B network context.

2020 ◽  
Vol 5 ◽  
pp. 94-106
Author(s):  
Y.M. Iskanderov ◽  
◽  
M.D. Pautov

Aim. The use of modern information technologies makes it possible to achieve a qualitatively new level of control in supply chains. In these conditions, ensuring information security is the most important task. The article shows the possibilities of applying the spatial concepts of the actor-network theory in the interests of forming a relevant intelligent information security management system for supply chains. Materials and methods. The article discusses a new approach based on the provisions of the actor-network theory, which makes it possible to form the structure of an intelligent information security control system for supply chains, consisting of three main functional blocks: technical, psychological and administrative. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fl uids. Results. It is shown that the stability of this system in the space of networks is a necessary condition for its successful functioning in the space of regions, and its resilience in the space of fl uids gained through the dynamic knowledge formation helps overcome the adverse effects of the fl uidity. The problems of the intentional / unintentional nature of information security threats, as well as the reactivity / proactivity of the corresponding responses of the intelligent information security management system for supply chains are investigated. Conclusions. The proposed approach showed the possibility of using such an interdisciplinary tool in the fi eld of information security as the concepts of the actor-network theory. The intelligent information security control system built on its basis ensures that almost all the features of solving information security problems in supply chains are taken into account.


2020 ◽  
Vol 46 (1) ◽  
pp. 81-111 ◽  
Author(s):  
Rebecca Slayton

Information security governance has become an elusive goal and a murky concept. This paper problematizes both information security governance and the broader concept of governance. What does it mean to govern information security, or for that matter, anything? Why have information technologies proven difficult to govern? And what assurances can governance provide for the billions of people who rely on information technologies every day? Drawing together several distinct bodies of literature—including multiple strands of governance theory, actor–network theory, and scholarship on sociotechnical regimes—this paper conceptualizes networked action on a spectrum from uncertain governance to governing uncertainty. I advance a twofold argument. First, I argue that networks can better govern uncertainty as they become more able not only to enroll actors in a collective agenda, but also to cut ties with those who seek to undermine that agenda. And second, I argue that the dominant conception of information security governance, which emphasizes governing uncertainty through risk management, in practice devolves to uncertain governance. This is largely because information technologies have evolved toward greater connectedness—and with it, greater vulnerability—creating a regime of insecurity. This evolution is illustrated using the history of the US government’s efforts to govern information security.


2012 ◽  
Vol 7 (3) ◽  
pp. 251-265 ◽  
Author(s):  
Lawrence T. Corrigan ◽  
Albert J. Mills

Author(s):  
Jim Underwood ◽  
Bruce McCabe

Inter-organizational information systems depend at least as much on collaboration across organizational cultures as on the development of technical infrastructure for their success. Actor-network theory (ANT) is a useful approach for bringing together social and technical considerations. In this chapter we discuss key features of ANT and show how it might be applied to a particular case of IOIS adoption; this ANT approach is compared to co-evolutionary theory which was originally applied to this case. Some possible extensions to ANT are contemplated, and we offer advice to those attempting ANT-based research. We also give advice, based on ANT, to those undertaking IOIS development.


2008 ◽  
Vol 23 (2) ◽  
pp. 97-108 ◽  
Author(s):  
Juan Rodon ◽  
Joan Antoni Pastor ◽  
Feliciano Sesé ◽  
Ellen Christiaanse

Although inter-organizational information systems (IOIS) implementation has been widely studied, mainstream literature has not focused on understanding how implementation unfolds and how the existing components of the installed base shape the process. This paper addresses this gap by conducting a socio-technical, process-oriented, and multilevel study. Based on a longitudinal in-depth case study of the implementation of an industry IOIS, we develop an explication of IOIS implementation that considers the role of the installed base. Using the lens of actor-network theory (ANT), we counter the mainstream IOIS literature by showing that IOIS implementation cannot only be explained by a fixed set of independent factors; instead, the dynamic mutual shaping of socio-technical actors throughout implementation complements existing factor-based models in explaining the evolution and the outcome (success or failure). The study also shows the importance of complying with the technical and non-technical components of the installed base for an IOIS to be successfully initiated.


Author(s):  
Kjell Tryggestad ◽  
Chris Harty ◽  
Peter Holm Jacobsen

The aim of this chapter is to include buildings in studies of context. It foregrounds what is usually considered contextual background—the building—and focuses on the hospital building and the ways in which it matters for the organization and performance of health care. Our approach to the question of context is processual, socio-technical, and inspired by actor-network theory. The actor-network theory lens allows the researcher to consider the building as both background and foreground, as object, context, and process. As an object, and as a matter of fact, the building resides in the background, yet it can always become foregrounded as a matter of concern. This can happens for a multitude of reasons, including that the “object” itself might create unwelcome surprises and obstacles for its human users and, in turn, spur further attempts by specialists in building construction to contain these through mitigating projects and redesign.


2013 ◽  
Vol 28 (2) ◽  
pp. 111-123
Author(s):  
William (Bill) Bonner

The call for historical research In IS, mirrored In other fields of business studies, Is an explicit recognition of the predominance of presentism in business research; the use of the past only to justify and validate current beliefs or inserting modern beliefs onto the past, rather than using the past to understand and reveal current assumptions and biases. There is freedom in severing time and centering ourselves and our artifacts (computer technology), looking to improve the future unburdened by the past. Yet, if that assumption is wrong, and the present is instead fluid and unstable because the past embedded in the present is tension filled and unresolved, this raises fundamental challenges to the work that we do, the value of that work to others, and is cause for reflection on our impact as educators. This paper demonstrates the merits of using Actor-Network Theory as a methodology for historical IS research, through its use in a Canadian case study. The study was prompted by the apparent resolution of a privacy controversy, involving personal motor vehicle registration information in the province of Alberta, through an appeal to something called ‘historical purposes and practices.’ Strangely, the purposes and practices were never identified. This begged the question, ‘what was the substance of this argument and how come it was successful?’ Tracing actual ‘purposes and practices,’ from the early 1900s to the present, reveals how historical, contextual understanding offers not only insights into, but can alter our very understanding of, the present.


Author(s):  
Albena Yaneva

The chapter contributes to unravelling how Actor-Network-Theory (ANT) as a method of inquiry might inform the archaeological understanding of the contemporary world. To illustrate this, the author engages in an inquiry on Shin Takamatsu’s architecture following Guattari’s fascination with his architectural machines in the 1980s. Drawing on two epistemological figures-the hasty sightseer and the slow ethnographer-the chapter demonstrates two different approaches to contemporary architecture. It is argued that ANT methodologies can help to create a space in which the past, present, and future are combined and are still in the process of becoming. Equipped with ANT-inspired methods, contemporary archaeologists can engage in explorations of vibrant processes and emergent world-making techniques.


Sign in / Sign up

Export Citation Format

Share Document