Skip to Main content Skip to Navigation
Conference papers

Using Actor Network Theory to Understand Information Security Management

Abstract : This paper presents an Actor Network Theory (ANT) analysis of a computer hack at a large university. Computer hacks are usually addressed through technical means thus ensuring that perpetrators are unable to exploit system vulnerabilities. We however argue that a computer hack is a result of different events in a heterogeneous network embodying human and non-human actors. Hence a secure organizational environment is one that is characterized by 'stability' and 'social order', which is a result of negotiations and alignment of interests among different actants. The argument is conducted through a case study. Our findings reveal not only the usefulness of ANT in developing an understanding of the (in)security environment at the case study organization, but also the ability of ANT to identify differences in interests among actants. At a practical level, our analysis suggests three principles that management needs to pay attention to in order to prevent future security breaches.
Document type :
Conference papers
Complete list of metadata

Cited literature [2 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Thursday, August 7, 2014 - 11:42:00 AM
Last modification on : Thursday, May 2, 2019 - 2:58:09 PM
Long-term archiving on: : Wednesday, November 26, 2014 - 1:31:23 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson. Using Actor Network Theory to Understand Information Security Management. 25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.43-54, ⟨10.1007/978-3-642-15257-3_5⟩. ⟨hal-01054504⟩



Record views


Files downloads