Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Industry 4.0 Introduction in Critical Infrastructure: Information Security Reasoning in Practice
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Digital Services and Systems.ORCID iD: 0000-0002-0498-4858
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Digital Services and Systems.ORCID iD: 0000-0002-0280-3160
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Digital Services and Systems.ORCID iD: 0000-0002-5706-4588
2024 (English)In: The International Journal of Technology, Knowledge and Society, ISSN 1832-3669, Vol. 20, no 1, p. 1-15Article in journal (Refereed) Published
Abstract [en]

The article presents an empirical study of critical infrastructure service providers in consulting, energy, and mining. The study aims to investigate how such service providers perceive and explain information security and challenges in the context of an information technology-operational technology (IT-OT) interconnected environment, that is, Industry 4.0. The study is based on qualitative data from semi-structured interviews with informants holding three different types of positions at the organizations, that is, OT security advisor, business developer, and information security coordinator. The study indicatively concludes that role and responsibility significantly impact practitioners’ reasoning and standpoints. Similarly, security focuses, or prioritization, differs between IT and OT. In line with the literature, the findings indicate that mindsets or mental models need further attention. The article, thus, suggests three research directions to develop insight for expanding information security practices to encompass human and organizational challenges based on behaviors, roles, norms, and attitudes.

Place, publisher, year, edition, pages
Common Ground Research Networks , 2024. Vol. 20, no 1, p. 1-15
Keywords [en]
Operational Technology, Incident Management, Information Technology, Cybersecurity, Risk Management
National Category
Information Systems
Research subject
Information Systems; Cyber Security
Identifiers
URN: urn:nbn:se:ltu:diva-103836DOI: 10.18848/1832-3669/CGP/v20i01/1-15OAI: oai:DiVA.org:ltu-103836DiVA, id: diva2:1829429
Projects
ISSUES
Funder
Interreg
Note

Validerad;2024;Nivå 1;2024-04-11 (signyg);

License full text: This work is licensed under a Creative Commons Attribution 4.0 International License(CC BY 4.0).

Available from: 2024-01-19 Created: 2024-01-19 Last updated: 2024-04-19Bibliographically approved

Open Access in DiVA

fulltext(278 kB)159 downloads
File information
File name FULLTEXT02.pdfFile size 278 kBChecksum SHA-512
e0cc8530e4383efbb09025339af36647f518ecbb4515dbf7cb3c177098191620a637bfe4770ab93f7a9c5720a0b2b7b6b59742d53b2d3b0a94e6ab923816cf5e
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Authority records

Holmström, AntonLugnet, JohanEricson, Åsa

Search in DiVA

By author/editor
Holmström, AntonLugnet, JohanEricson, Åsa
By organisation
Digital Services and Systems
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 160 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 225 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf