Our intension is to describe the abstract environment and the elements of information security. We bring together the basic concepts and patterns of thought of information security with the Deleuze & Guattari’s concepts of machine and territory. Security can be seen as a value-driven machine that produces security on various levels. Value growth and dominating market logics provides the fuel for the machine. It is comprised of three levels: physical, technical, and social. Change in any of the levels will affect the social agent, for example an employee. In the value-driven process, territories are established. They are safe zones with a certain order and rhythm. Insiders are brought in to the order. While this is done, the social agents wi...
Abstract: This paper proposes a theory on information security. We argue that information security i...
This thesis is about grounding an increasingly common practice in an established theory where no exp...
In our connected world security and proof (evidence constituted in Verifiable Credentials (VC, W3C))...
Our intension is to describe the abstract environment and the elements of information security. We b...
Building a culture of information security involves consideration of problems of management in socie...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Security is one of the foundations on which a stable and cohesive society is built. It is this secur...
In our modern information societies, we not only use and welcome computers; we are highly dependent ...
This paper aims to explore social and organizational aspects of information security management. The...
Information security (InfoSec) has ontologically been characterised as an order machine. The order m...
Describing the layout of the entire volume, this chapter explains how its parts emerged from an orga...
This article seeks to identify the understanding and importance of knowing the concepts and definiti...
Information security (InfoSec) has ontologically been characterised as an order machine. The order m...
Security is one of the foundations on which a stable and cohesive society is built. It is this secur...
In the age of the information society, determined by the evolution of digital technology, informatio...
Abstract: This paper proposes a theory on information security. We argue that information security i...
This thesis is about grounding an increasingly common practice in an established theory where no exp...
In our connected world security and proof (evidence constituted in Verifiable Credentials (VC, W3C))...
Our intension is to describe the abstract environment and the elements of information security. We b...
Building a culture of information security involves consideration of problems of management in socie...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Security is one of the foundations on which a stable and cohesive society is built. It is this secur...
In our modern information societies, we not only use and welcome computers; we are highly dependent ...
This paper aims to explore social and organizational aspects of information security management. The...
Information security (InfoSec) has ontologically been characterised as an order machine. The order m...
Describing the layout of the entire volume, this chapter explains how its parts emerged from an orga...
This article seeks to identify the understanding and importance of knowing the concepts and definiti...
Information security (InfoSec) has ontologically been characterised as an order machine. The order m...
Security is one of the foundations on which a stable and cohesive society is built. It is this secur...
In the age of the information society, determined by the evolution of digital technology, informatio...
Abstract: This paper proposes a theory on information security. We argue that information security i...
This thesis is about grounding an increasingly common practice in an established theory where no exp...
In our connected world security and proof (evidence constituted in Verifiable Credentials (VC, W3C))...