The Order Machine - The Ontology of Information Security

被引:0
|
作者
Vuorinen, Jukka [1 ]
Tetri, Pekka [2 ]
机构
[1] Univ Turku, Dept Social Res, SF-20500 Turku, Finland
[2] Univ Oulu, Dept Informat Proc Sci, Oulu, Finland
来源
关键词
Information Security; Spatiality; Territory; Information Security Threat; Socio-Technical Security; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, information security has been approached in terms of how to achieve the confidentiality, integrity, and availability of information. In this paper, we seek to ontologically examine information security by using Gilles Deleuze and Felix Guattari's philosophical concepts of machine, coupling, interruption, and territory. Through these concepts, we conceptualize information security as an order-seeking, connection-based, territorial security machine that attempts to subject and harness other actors - from technical devices and physical barriers to employees and various combinations of these actors - to carry out the security machine's protective tasks. The goal of the security machine is to block or interrupt the chaotic forces of the outside and, thus, to maintain the fragile order of information. However, the process of interrupting the outside requires interruption of the inside as well: users and organizations are interrupted daily by the security machine and its practices. Yet this aspect of information security has remained largely unexamined. We argue that the question of what information security does to its subjects - what its effects are - in the protected system should be examined more thoroughly.
引用
收藏
页码:695 / 713
页数:19
相关论文
共 50 条
  • [1] Ontology in Information Security
    Arbanas, Krunoslav
    Cubrilo, Mirko
    [J]. JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2015, 39 (02) : 107 - 136
  • [2] An Ontology of Information Security
    Herzog, Almut
    Shahmehri, Nahid
    Duma, Claudiu
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (04) : 1 - 23
  • [3] Maintenance & Information Security Ontology
    Si Ahmed, Boualem
    Berrani, Meryem
    Fatima, Nibouche
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2017, : 312 - 317
  • [4] AN ONTOLOGY TO THE INFORMATION SECURITY MANAGEMENT
    Mattos, Mauro Marcelo
    Heckmann, Jacques Robert
    da Silva, Paulo Fernando
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS CISIS 2015, 2015, : 326 - 329
  • [5] Information and third order ontology
    Goppold, A
    [J]. BIOSYSTEMS, 1998, 46 (1-2) : 169 - 173
  • [6] Information Security in Enterprises - Ontology Perspective
    Schiavone, Stephen
    Garg, Lalit
    Summers, Kelly
    [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON IS MANAGEMENT AND EVALUATION (ECIME 2013), 2013, : 164 - 173
  • [7] An Ontology Based Storage of Security Information
    Kotenko, Igor
    Fedorchenko, Andrey
    Doynikova, Elena
    Chechulin, Andrey
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (04): : 655 - 667
  • [8] An Ontology Based Approach to Information Security
    Pereira, Teresa
    Santos, Henrique
    [J]. METADATA AND SEMANTIC RESEARCH, PROCEEDINGS, 2009, 46 : 183 - 192
  • [9] Information Security Ontology Model For Internet of Thing
    Ren, Weiwu
    Hu, Liang
    Zhao, Kuo
    Jia, Bing
    [J]. MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2466 - +
  • [10] Towards information security ontology in business networks
    Aaltonen, Jukka
    Krone, Oliver
    Mustonen, Pekka
    [J]. Frontiers in Artificial Intelligence and Applications, 2009, 190 (01) : 366 - 372