Skip to main content

Comprehensive Intelligent Information Security Management System (CIISMS) for Supply Networks: The Actor-Network Perspective

  • Conference paper
  • First Online:
Software Engineering Perspectives in Intelligent Systems (CoMeSySo 2020)

Abstract

Actor-network theory based concept of spatialities was applied to the comprehensive intelligent information security management system composed of the three blocks: technical, psychological and legal. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fluids. The system stability in the space of networks is considered a precondition for its successful performance in the space of regions, and its resilience in the space of fluids gained through the dynamic knowledge formation helps overcome the adverse effects of the fluidity. We further reflect on the intentionality/unintentionality of the information security threats and reactivity/proactivity of the relevant system responses. The ANT-based topological approach presented in this paper in combination with other relevant methods has a potential of developing into an efficient theoretical tool for future research in the fields of information systems and information security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Iskanderov, Y., Pautov, M.: Security of information processes in supply chains. In: Abraham A., Kovalev S., Tarassov V., Snasel V., Sukhanov A. (eds) Proceedings of the Third International Scientific Conference “Intelligent Information Technologies for Industry” (IITI 2018). IITI’18 2018. Advances in Intelligent Systems and Computing, vol 875. Springer, Cham (2019)

    Google Scholar 

  2. Balzacq, T.: A theory of actor-network for cyber-security. European Journal of International Security, pp. 1–23. https://doi.org/10.1017/eis.2016.8 2016. © British International Studies Association (2016)

  3. Iskanderov Y., Pautov M.: Actor-network approach to self-organisation in global logistics networks. In: Kotenko I., Badica C., Desnitsky V., El Baz D., Ivanovic M. (eds) Intelligent Distributed Computing XIII. IDC 2019. Studies in Computational Intelligence, vol 868. Springer, Cham (2020)

    Google Scholar 

  4. Suteanu, C.: Complexity, science and the public: the geography of a new interpretation. Theor. Cult. Soc. 22(5), 130 (2005)

    Article  Google Scholar 

  5. United Nations Office on Drugs and Crime, Comprehensive Study on Cybercrime (Vienna: UNODC, 2013). www.globalinitiative.net/wpfb-file/unodc-comprehensive-study-on-cybercrime-pdf/}

  6. Bloomfield, B.P., Vurdubakis, T.: The outer limits: monsters, actor networks and the writing of displacement. Organization 6(4), 626 (1999)

    Article  Google Scholar 

  7. Harvey, D.: Justice, Nature and the Geography of Difference (Oxford: Blackwell, 1996), pp. 260–1 (1996)

    Google Scholar 

  8. Brdiczka, O., Liu, J., Price, B., Shen, J., Patil, A., Chow, R., Bart, E., Ducheneaut, N.: Proactive insider threat detection through graph learning and psychological context. In: IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA (2012)

    Google Scholar 

  9. Iskanderov, Y., Pautov, M.: Agents and multi-agent systems as actor-networks. In: edited by: Rocha, A., Steels, L., van den Herik, J.P., Proceedings of the 12th International Conference on Agents and Artificial Intelligence ICAART 2020, 22–24 February 2020, vol. 1, pp. 179–184 (2020)

    Google Scholar 

  10. Silic, M.: Using ANT to understand dark side of computing – Computer underground impact on eSecurity in the dual use context. University of St Gallen. Institute of Information Management (2015)

    Google Scholar 

  11. Cordella, A., Shaikh, M.: Actor-network theory and after: what’s new for IS research. In: European conference on information systems, 19-06-2003 – 21-06-2003 (2003)

    Google Scholar 

  12. Tatnall, A.: Actor-network theory as a socio-technical approach to information systems research. Socio-technical and Human Cognition Elements of Information Systems, pp. 266–283. IGI Global, USA (2003)

    Chapter  Google Scholar 

  13. Vakhshtayn, V.S.: Dzhon Lo: sotsiologiya mezhdu semiotikoy i topologiey [John Law: sociology between semiotics and topology] the Russian Sociological Review, vol. 1, pp. 24–29 (in Russian) (2006)

    Google Scholar 

  14. Law, J.: ‘Objects, Spaces and Others’, published by the Centre for Science Studies, Lancaster University, Lancaster LA1 4YN, UK, 2020. http://www.comp.lancs.ac.uk/sociology/papers/Law-Objects-Spaces-Others.pdf

  15. Iskanderov, Yu.M., Doroshenko, V.I.: Organization of transport-technological processes on the basis of integrated information systems. Collection of articles of the International Scientific and Practical Conference The New Economy and the Main Directions of its Formation, pp. 53–62, St. Petersburg Polytechnic University of Peter the Great, (2016). ISBN: 978-5-7422-5215-3

    Google Scholar 

  16. Iskanderov, Yu.M.: Design of models of an integrated information system of transport logistics based on multi-agent technologies. Collection of articles of the International Scientific and Practical Conference. The New Economy and the Main Directions of its Formation, pp. 62–69, St. Petersburg Polytechnic University of Peter the Great, (2016). ISBN: 978-5-7422-5215-3

    Google Scholar 

  17. Shackleford, D.: Combatting Cyber Risks in the Supply Chain, A SANS Institute Whitepaper (2015). https://www.sans.org/reading-room/whitepapers

  18. Callon, M.: Some Elements of a Sociology of Translation; Domestication of the Scallops and the Fishermen of St. Brieuc Bay// Power, Action and Belief/ J. Law (ed.). L.: Routledge, 1986. P. 196–223. (1986)

    Google Scholar 

  19. ISO/IEC 27001 Information technology - Security techniques - Information security management systems - Requirements, ISO, Geneva (2013)

    Google Scholar 

  20. GDPR Portal: www.eugdpr.org

  21. De Laet, M., Mol, A.: The zimbabwe bush pump: mechanics of a fluid technology. Soc. Stud. Sci. 30(2), 225–263 (2000)

    Article  Google Scholar 

  22. Law, J., Mol, A.: Situating technoscience: an inquiry into spatialities. Environ. Plan. D: Soc. Space 19(5), 609–621 (2001). https://doi.org/10.1068/d243t

    Article  Google Scholar 

  23. Bell, M.A.: The Five Principles of Organizational Resilience. Gartner, Inc. (2002)

    Google Scholar 

  24. Christopher, M., Peck, H.: Building the resilient supply chain. Int. J. Logist. Manage. 15(2) (2004)

    Google Scholar 

  25. Starr, R., Newfrock, J., Delurey, M.: Enterprise resilience: managing risk in the networked economy. Strat. Bus. 30, 70–79 (2002)

    Google Scholar 

  26. Berry, D.M.: The Philosophy of Software: Code and Mediation in the Digital Age. Basingstoke, Hampshire ; New York: Palgrave Macmillan (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yury Iskanderov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Iskanderov, Y., Pautov, M. (2020). Comprehensive Intelligent Information Security Management System (CIISMS) for Supply Networks: The Actor-Network Perspective. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives in Intelligent Systems. CoMeSySo 2020. Advances in Intelligent Systems and Computing, vol 1294. Springer, Cham. https://doi.org/10.1007/978-3-030-63322-6_10

Download citation

Publish with us

Policies and ethics