Affiliation:
1. Luleå University of Technology, Sweden
Abstract
Over the past 20 years, researchers have made significant headway into understanding information security, with most studies focusing on internal organizational information security affairs. This study adds to the cumulative tradition by creating a concept for the convergence of information security in B2B network contexts. More specifically, the move from information security safeguards to information security observers is presented in depth. By adopting the Actor Network Theory and the Process Theory, this chapter demonstrates how three conversion, use, and performance sub-processes constitute the devised process of converging information security. Each sub-process directs attention towards definition, integration, the evaluation of security and how the metaphor of the observer may operate in the B2B network context.
Reference93 articles.
1. The description of technical objects;M.Akrich;Shaping technology/building society. Studies in sociotechnical change,1992
2. Contractual Commitments, Bargaining Power, and Governance Inseparability: Incorporating History into Transaction Cost Theory
3. Using and validating the strategic alignment model
4. Aytes, K., & Connolly, T. (2003). A research model for investigating human behavior related to computer security. Proceedings of the 2003 American Conference on Information Systems, Tampa, FL, August 4-6.
5. Structures of responsibility and security of information systems