2012
DOI: 10.17705/1jais.00306
|View full text |Cite
|
Sign up to set email alerts
|

The Order Machine – The Ontology of Information Security

Abstract: Traditionally, information security has been approached in terms of how to achieve the confidentiality, integrity, and availability of information. In this paper, we seek to ontologically examine information security by using Gilles Deleuze and Félix Guattari's philosophical concepts of machine, coupling, interruption, and territory. Through these concepts, we conceptualize information security as an order-seeking, connection-based, territorial security machine that attempts to subject and harness other actors… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
19
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 7 publications
0
19
0
Order By: Relevance
“…According to Pieters [7], the philosophical basis of security research has received little attention until now and "the scientific endeavor of security [has] been left largely unexamined" (see also [8]). Most of "the existing research literature on information security is driven by practical aspirations" [8][9].…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…According to Pieters [7], the philosophical basis of security research has received little attention until now and "the scientific endeavor of security [has] been left largely unexamined" (see also [8]). Most of "the existing research literature on information security is driven by practical aspirations" [8][9].…”
Section: Introductionmentioning
confidence: 99%
“…Most of "the existing research literature on information security is driven by practical aspirations" [8][9]. The focus is on such questions as how to develop secure information systems and how to prevent abuse of a system, where the main objectives are confidentiality, integrity, and availability (CIA) [10][11][12].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations