Abstract
Actor-network theory based concept of spatialities was applied to the comprehensive intelligent information security management system composed of the three blocks: technical, psychological and legal. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fluids. The system stability in the space of networks is considered a precondition for its successful performance in the space of regions, and its resilience in the space of fluids gained through the dynamic knowledge formation helps overcome the adverse effects of the fluidity. We further reflect on the intentionality/unintentionality of the information security threats and reactivity/proactivity of the relevant system responses. The ANT-based topological approach presented in this paper in combination with other relevant methods has a potential of developing into an efficient theoretical tool for future research in the fields of information systems and information security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Iskanderov, Y., Pautov, M.: Security of information processes in supply chains. In: Abraham A., Kovalev S., Tarassov V., Snasel V., Sukhanov A. (eds) Proceedings of the Third International Scientific Conference “Intelligent Information Technologies for Industry” (IITI 2018). IITI’18 2018. Advances in Intelligent Systems and Computing, vol 875. Springer, Cham (2019)
Balzacq, T.: A theory of actor-network for cyber-security. European Journal of International Security, pp. 1–23. https://doi.org/10.1017/eis.2016.8 2016. © British International Studies Association (2016)
Iskanderov Y., Pautov M.: Actor-network approach to self-organisation in global logistics networks. In: Kotenko I., Badica C., Desnitsky V., El Baz D., Ivanovic M. (eds) Intelligent Distributed Computing XIII. IDC 2019. Studies in Computational Intelligence, vol 868. Springer, Cham (2020)
Suteanu, C.: Complexity, science and the public: the geography of a new interpretation. Theor. Cult. Soc. 22(5), 130 (2005)
United Nations Office on Drugs and Crime, Comprehensive Study on Cybercrime (Vienna: UNODC, 2013). www.globalinitiative.net/wpfb-file/unodc-comprehensive-study-on-cybercrime-pdf/}
Bloomfield, B.P., Vurdubakis, T.: The outer limits: monsters, actor networks and the writing of displacement. Organization 6(4), 626 (1999)
Harvey, D.: Justice, Nature and the Geography of Difference (Oxford: Blackwell, 1996), pp. 260–1 (1996)
Brdiczka, O., Liu, J., Price, B., Shen, J., Patil, A., Chow, R., Bart, E., Ducheneaut, N.: Proactive insider threat detection through graph learning and psychological context. In: IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA (2012)
Iskanderov, Y., Pautov, M.: Agents and multi-agent systems as actor-networks. In: edited by: Rocha, A., Steels, L., van den Herik, J.P., Proceedings of the 12th International Conference on Agents and Artificial Intelligence ICAART 2020, 22–24 February 2020, vol. 1, pp. 179–184 (2020)
Silic, M.: Using ANT to understand dark side of computing – Computer underground impact on eSecurity in the dual use context. University of St Gallen. Institute of Information Management (2015)
Cordella, A., Shaikh, M.: Actor-network theory and after: what’s new for IS research. In: European conference on information systems, 19-06-2003 – 21-06-2003 (2003)
Tatnall, A.: Actor-network theory as a socio-technical approach to information systems research. Socio-technical and Human Cognition Elements of Information Systems, pp. 266–283. IGI Global, USA (2003)
Vakhshtayn, V.S.: Dzhon Lo: sotsiologiya mezhdu semiotikoy i topologiey [John Law: sociology between semiotics and topology] the Russian Sociological Review, vol. 1, pp. 24–29 (in Russian) (2006)
Law, J.: ‘Objects, Spaces and Others’, published by the Centre for Science Studies, Lancaster University, Lancaster LA1 4YN, UK, 2020. http://www.comp.lancs.ac.uk/sociology/papers/Law-Objects-Spaces-Others.pdf
Iskanderov, Yu.M., Doroshenko, V.I.: Organization of transport-technological processes on the basis of integrated information systems. Collection of articles of the International Scientific and Practical Conference The New Economy and the Main Directions of its Formation, pp. 53–62, St. Petersburg Polytechnic University of Peter the Great, (2016). ISBN: 978-5-7422-5215-3
Iskanderov, Yu.M.: Design of models of an integrated information system of transport logistics based on multi-agent technologies. Collection of articles of the International Scientific and Practical Conference. The New Economy and the Main Directions of its Formation, pp. 62–69, St. Petersburg Polytechnic University of Peter the Great, (2016). ISBN: 978-5-7422-5215-3
Shackleford, D.: Combatting Cyber Risks in the Supply Chain, A SANS Institute Whitepaper (2015). https://www.sans.org/reading-room/whitepapers
Callon, M.: Some Elements of a Sociology of Translation; Domestication of the Scallops and the Fishermen of St. Brieuc Bay// Power, Action and Belief/ J. Law (ed.). L.: Routledge, 1986. P. 196–223. (1986)
ISO/IEC 27001 Information technology - Security techniques - Information security management systems - Requirements, ISO, Geneva (2013)
GDPR Portal: www.eugdpr.org
De Laet, M., Mol, A.: The zimbabwe bush pump: mechanics of a fluid technology. Soc. Stud. Sci. 30(2), 225–263 (2000)
Law, J., Mol, A.: Situating technoscience: an inquiry into spatialities. Environ. Plan. D: Soc. Space 19(5), 609–621 (2001). https://doi.org/10.1068/d243t
Bell, M.A.: The Five Principles of Organizational Resilience. Gartner, Inc. (2002)
Christopher, M., Peck, H.: Building the resilient supply chain. Int. J. Logist. Manage. 15(2) (2004)
Starr, R., Newfrock, J., Delurey, M.: Enterprise resilience: managing risk in the networked economy. Strat. Bus. 30, 70–79 (2002)
Berry, D.M.: The Philosophy of Software: Code and Mediation in the Digital Age. Basingstoke, Hampshire ; New York: Palgrave Macmillan (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Iskanderov, Y., Pautov, M. (2020). Comprehensive Intelligent Information Security Management System (CIISMS) for Supply Networks: The Actor-Network Perspective. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives in Intelligent Systems. CoMeSySo 2020. Advances in Intelligent Systems and Computing, vol 1294. Springer, Cham. https://doi.org/10.1007/978-3-030-63322-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-63322-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63321-9
Online ISBN: 978-3-030-63322-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)