<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>Human Information Interaction</title>
<title_fa>تعامل انسان و اطلاعات</title_fa>
<short_title>Human Information Interaction</short_title>
<subject>Literature &amp; Humanities</subject>
<web_url>http://hii.khu.ac.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2423-7418</journal_id_issn>
<journal_id_issn_online>2423-7418</journal_id_issn_online>
<journal_id_pii></journal_id_pii>
<journal_id_doi>doi</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid></journal_id_sid>
<journal_id_nlai></journal_id_nlai>
<journal_id_science></journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1404</year>
	<month>6</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2025</year>
	<month>9</month>
	<day>1</day>
</pubdate>
<volume>12</volume>
<number>2</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>fa</language>
	<article_id_doi></article_id_doi>
	<title_fa>شناسایی مؤلفه‌های انسانی-غیرانسانی فرهنگ امنیت اطلاعات: یک مطالعه کیفی مبتنی بر نظریه کنشگر-شبکه (ANT)</title_fa>
	<title>Identifying the Human-Nonhuman Components of Information Security Culture: A Qualitative Study Based on Actor-Network Theory (ANT)</title>
	<subject_fa>تخصصي</subject_fa>
	<subject>Special</subject>
	<content_type_fa>پژوهشي</content_type_fa>
	<content_type>Research</content_type>
	<abstract_fa>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;direction:rtl&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;هدف:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; &lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;با تبدیل&#8204;شدن اطلاعات به ارزشمندترین دارایی سازمان&#8204;ها و افزایش پیچیدگی تهدیدات سایبری، سرمایه&#8204;گذاری کلانی بر راهکارهای امنیتی صورت گرفته است. بااین&#8204;حال، شواهد نشان می&#8204;دهد که بیش از &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;۹۰&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt; درصد نقض&#8204;های امنیتی عمده ریشه در خطاهای انسانی دارد. این امر، اهمیت پرداختن به &amp;laquo;فرهنگ امنیت اطلاعات&amp;raquo; را به&#8204;عنوان مکمل ضروری راهکارهای فنی، بیش&#8204;ازپیش آشکار می&#8204;سازد. مدل&#8204;های سنتی فرهنگ امنیت اطلاعات (مانند مدل&#8204;های شاین و هافستد) عمدتاً انسان&#8204;محور بوده و نقش کنشگران غیرانسانی را نادیده می&#8204;گیرند. این شکاف نظری، ضرورت به&#8204;کارگیری چارچوب&#8204;های جامعی مانند نظریه کنشگر-شبکه&lt;/span&gt;&lt;/span&gt;&lt;span dir=&quot;LTR&quot; style=&quot;font-size:11.0pt&quot;&gt; (&lt;/span&gt;&lt;span dir=&quot;LTR&quot; style=&quot;font-size:9.0pt&quot;&gt;ANT&lt;/span&gt;&lt;span dir=&quot;LTR&quot; style=&quot;font-size:11.0pt&quot;&gt;) &lt;/span&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;را برای درک تعامل پویای تمامی عوامل مؤثر ایجاب می&#8204;کند. این مطالعه باهدف پرکردن این شکاف و شناسایی مؤلفه&#8204;های انسانی و غیرانسانی مؤثر در فرهنگ امنیت اطلاعات در یک سازمان مالی حیاتی انجام شد&lt;/span&gt;&lt;/span&gt;&lt;span dir=&quot;LTR&quot; style=&quot;font-size:11.0pt&quot;&gt;.&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;direction:rtl&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;روش پژوهش: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;پژوهش حاضر به روش کیفی تفسیرگرایانه و با تحلیل مصاحبه&#8204;های نیمه&#8204;ساختاریافته با &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;۲۵&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt; مدیر، کارشناس و کاربر در بانک مرکزی ایران، همراه با مشاهده میدانی و بررسی اسناد انجام شد&lt;/span&gt;&lt;/span&gt;&lt;span dir=&quot;LTR&quot; style=&quot;font-size:11.0pt&quot;&gt;.&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;direction:rtl&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;یافته&#8204;ها: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;نتایج نشان داد فرهنگ امنیتی حاصل تعامل پویای سه گروه انسانی است: &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;۱)&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;مدیران ارشد (تصمیم&#8204;گیران راهبردی)، &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;۲)&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;کارکنان (اجراکنندگان رفتارهای روزمره) و &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;۳)&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;تیم&#8204;های فنی (ترجمه&#8204;کنندگان سیاست&#8204;ها به اقدامات عملی). همچنین، پنج دسته کنشگر غیرانسانی شناسایی شد: سیاست&#8204;ها (مثل &lt;/span&gt;&lt;/span&gt;&lt;span dir=&quot;LTR&quot; style=&quot;font-size:9.0pt&quot;&gt;ISO 27001&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;)، &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;فناوری&#8204;ها (نظیر &lt;/span&gt;&lt;/span&gt;&lt;span dir=&quot;LTR&quot; style=&quot;font-size:9.0pt&quot;&gt;SIEM&lt;/span&gt; &lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;و &lt;/span&gt;&lt;/span&gt;&lt;span dir=&quot;LTR&quot; style=&quot;font-size:9.0pt&quot;&gt;MFA&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;)،&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt; زیرساخت&#8204;ها، اسناد و فرآیندهای سازمانی. نکته کلیدی، نقش کنشگران هیبریدی (ترکیب انسان-فناوری) مانند سیستم&#8204;های احراز هویت بود که رفتار کاربران را تغییر می&#8204;دهند&lt;/span&gt;&lt;/span&gt;&lt;span dir=&quot;LTR&quot; style=&quot;font-size:11.0pt&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;b&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;نتیجه&#8204;گیری: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;در مقایسه با مدل&#8204;های خطی، این پژوهش ثابت کرد بهبود فرهنگ امنیتی نیازمند طراحی شبکه&#8204;ای است که تعامل متقابل تمام کنشگران را مدنظر قرار دهد. پیشنهادها شامل توسعه فناوری&#8204;های کاربرپسند، الگوسازی مدیران، و ادغام امنیت در فرآیندهای کاری است. این چارچوب برای سازمان&#8204;های مالی و حاکمیتی که با چالش&#8204;های مشابه روبرو هستند، کاربرد دارد&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</abstract_fa>
	<abstract>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Introduction&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;This study tries to find out the human and non-human things that affect how information security culture is formed. It uses the Actor-Network Theory (ANT) to look at this. Today, information is very important for businesses, and there are more cyber threats than ever. Because of this, organizations are spending a lot on security tools. But more than 90% of big security problems come from human errors. This shows that having a strong information security culture is very important, and it works well with technical tools&lt;/span&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;FA&quot; new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Most of the traditional ways of looking at information security culture, like the ones from Schein and Hofstede, focus mainly on people and don&amp;#39;t consider non-human factors like technology, rules, or systems. This is a gap in the theory, so using a more complete framework like ANT helps understand how all these factors work together&lt;/span&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;FA&quot; new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;ANT looks at how humans and non-humans, such as technology, policies, and infrastructure, are treated equally in networks&lt;/span&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;FA&quot; new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;.&lt;/span&gt; &lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;It also looks at how ideas and actions change as they move through these networks. This helps understand how information security culture develops over time&lt;/span&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;FA&quot; new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;.&lt;/span&gt; &lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;The main questions this study looks at are&lt;/span&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;FA&quot; new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;:&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;What are the important human factors that help create information security culture&lt;/span&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;FA&quot; new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;?&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;What are the important non-human factors&lt;/span&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;FA&quot; new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;What role do hybrid actors&amp;mdash;those that mix humans and technology&amp;mdash;play in building security culture&lt;/span&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;FA&quot; new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;?&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;This research is new in theory, method, and practice&lt;/span&gt;&lt;span dir=&quot;RTL&quot; lang=&quot;FA&quot; new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;.&lt;/span&gt; &lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;It gives a more full picture of how information security culture works by bringing together different kinds of factors.&lt;/span&gt;&lt;span lang=&quot;FA&quot; dir=&quot;RTL&quot; style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Methods and Materoal&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;This study used a qualitative method based on the interpretivist viewpoint. In this approach, there isn&amp;rsquo;t one true reality&amp;mdash;instead, reality is shaped by people&amp;rsquo;s experiences and how they see things, and it changes depending on the situation. The researcher isn&amp;rsquo;t just watching from the side; they help build understanding together with the people involved.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;The research focused on the Central Bank of the Islamic Republic of Iran because it was seen as the best place to study information security culture. This is because this organisation plays a key role in setting cybersecurity rules for the banking system, faces many complex security threats, and handles highly sensitive financial information. Within this organization, the ongoing balance between strong security policies and the need for new technology created a good setting to look at how people and technology work together.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Data for this study was gathered using semi-structured interviews with 25 managers, experts, and important users. These people were chosen through purposive and snowball sampling until no new ideas were coming up. They were picked because they had at least five years of work experience and were directly involved with security matters in big projects within the organization. The interview questions were based on five main topics, looking through the idea of actor-network theory. These topics covered roles, how people interact with technology, things that influence the culture, current problems, and how policies and technology affect how employees behave.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;To make the data more complete and credible, we also observed employees&amp;#39; actual behavior on the job and studied documents like security policies, internal reports, and guidelines. Using multiple sources of data in this way helped compare information and cut down on possible biases. The data was analyzed in six steps using the Brown and Clarke content analysis method and the MAXQDA version 2024 software. To make sure the results were accurate and reliable, we also used the participant review technique. The study followed ethical guidelines, including getting informed consent and keeping participants&amp;#39; information private.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Results and Discussion&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;This study shows that information security culture comes from the ongoing interaction between people and other factors. Among the people involved, three main groups were found: senior managers, who make important decisions, set standards, and allocate resources; regular employees, who carry out daily tasks and are the first line of defense in security, and whose responsibility and quick reporting affect how well security policies work; and technical teams, who help turn policies into action, handle security problems, and provide ongoing training to users.&lt;/span&gt;&lt;span lang=&quot;FA&quot; dir=&quot;RTL&quot; style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Among the human challenges, there were several key issues like the mismatch between security rules and how work is done, high work pressure, people not wanting to change their habits, and the balance between user comfort and system security. Also, psychological factors such as the need for trust, being open and honest, and having a personal drive to do the right thing were important in building a security culture. These learning and culture-building efforts were supported by ongoing training, encouraging people to report problems without fear of being punished, and sharing responsibility as a team.&lt;/span&gt;&lt;span lang=&quot;FA&quot; dir=&quot;RTL&quot; style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;In the section about non-human actors, five main groups were found: policies and standards like ISO 27001 that set rules and guidelines; security tools such as SIEM, DLP, and multi-factor authentication that help watch over systems and influence how people behave; technical systems like networks and hardware; written guides and rules that explain how humans and technology work together; and organizational steps like reporting and feedback processes.&lt;/span&gt;&lt;span lang=&quot;FA&quot; dir=&quot;RTL&quot; style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;A major part of this study found that there are hybrid actors that exist between humans and non-human elements. These actors include things like multi-factor authentication systems that slowly become part of how people work; policies that use technology to control actions, like automatic limits on copying data; and processes within organizations that help learn about security, such as using attack simulation tools. These hybrid actors show that the line between people and technology in information security culture is not fixed. To improve security culture, it&amp;#39;s important to focus on both human and technological aspects at the same time.&lt;/span&gt;&lt;span lang=&quot;FA&quot; dir=&quot;RTL&quot; style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;When we compare these findings to traditional models, we see that traditional models are mostly focused on humans and see technology as just a tool. However, the actor-network approach treats both humans and non-humans as equal parts of a network. This gives a more connected and changing view of information security culture. In this view, culture isn&amp;#39;t something fixed&amp;mdash;it comes from the ongoing interactions and discussions between all the different actors involved.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span lang=&quot;FA&quot; dir=&quot;RTL&quot; style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span lang=&quot;FA&quot; dir=&quot;RTL&quot; style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;b&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Conclusion&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span lang=&quot;FA&quot; dir=&quot;RTL&quot; style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;This study finds that information security culture is formed by the dynamic interaction of human and non-human actors&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Key Human Actors&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;:&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-left: 56px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Senior Managers: Make decisions and allocate resources&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 56px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Employees: The first line of defense; their responsibility and reporting are crucial&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 56px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Technical Teams: Implement policies and provide training&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Key Non-Human Actors&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;:&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-left: 56px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Policies and standards (e.g., ISO 27001)&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 56px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Security tools (e.g., SIEM, DLP, multi-factor authentication)&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 56px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Technical infrastructure and written guides&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Crucial Finding: Hybrid Actors&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;The study highlights &amp;quot;hybrid actors&amp;quot; that blur the line between people and technology, such as&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;:&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-left: 56px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Multi-factor authentication becoming a routine part of work&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 56px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Automated policies that enforce rules&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-left: 56px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;Attack simulation tools used for training&lt;/span&gt;&lt;span b=&quot;&quot; dir=&quot;RTL&quot; lang=&quot;FA&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:70.4pt&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;So, unlike traditional human-focused models, this study uses an actor-network approach, treating humans and non-humans as equal partners. In this view, security culture is not fixed but is constantly created through the interactions between all these actors. Therefore, improving it requires addressing both human and technological aspects simultaneously.&lt;/span&gt;&lt;span lang=&quot;FA&quot; dir=&quot;RTL&quot; style=&quot;font-family:&quot;B Nazanin&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&amp;nbsp;&lt;/div&gt;</abstract>
	<keyword_fa>فرهنگ امنیت اطلاعات, نظریه کنشگر-شبکه (انت), کنشگر انسانی, کنشگر غیرانسانی, امنیت سایبری</keyword_fa>
	<keyword>Information security culture, actor-network theory (ANT), human actor, non-human actor, cybersecurity.</keyword>
	<start_page>46</start_page>
	<end_page>70</end_page>
	<web_url>http://hii.khu.ac.ir/browse.php?a_code=A-10-1070-1&amp;slc_lang=fa&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>mohammad hossein</first_name>
	<middle_name></middle_name>
	<last_name>marzban</last_name>
	<suffix></suffix>
	<first_name_fa>محمد حسین</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>مرزبان</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>mo.marzban@iau.ac.ir</email>
	<code>10031947532846006140</code>
	<orcid>10031947532846006140</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Department of Information Technology Management, Science and Research Branch, Islamic Azad University, Tehran, Iran</affiliation>
	<affiliation_fa>گروه مدیریت فناوری اطلاعات، دانشکده مدیریت و اقتصاد، واحد علوم و تحقیقات، دانشگاه آزاد اسلامی، تهران، ایران.</affiliation_fa>
	 </author>


	<author>
	<first_name>rahman</first_name>
	<middle_name></middle_name>
	<last_name>sharifzadeh</last_name>
	<suffix></suffix>
	<first_name_fa>رحمان</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>شریف زاده</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>sharifzadeh@irandoc.ac.ir</email>
	<code>10031947532846006141</code>
	<orcid>10031947532846006141</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>Iranian Research Institute for Information Sceince snd Technology (IranDoc), Tehran, Iran.</affiliation>
	<affiliation_fa>پژوهشکده جامعه و اطلاعات، گروه پژوهشی اخلاق و حقوق اطلاعات، پژوهشگاه علوم و فناوری اطلاعات ایران (ایران داک)</affiliation_fa>
	 </author>


	<author>
	<first_name></first_name>
	<middle_name></middle_name>
	<last_name></last_name>
	<suffix></suffix>
	<first_name_fa>علیرضا</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>پورابراهیمی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>poorebrahimi@gmail.com</email>
	<code>10031947532846006142</code>
	<orcid>10031947532846006142</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Department of Industrial Management, Karaj Branch, Islamic Azad University, Karaj, Iran. </affiliation>
	<affiliation_fa>گروه مدیریت صنعتی، دانشکده مدیریت و حسابداری، واحد کرج، دانشگاه آزاد اسلامی، کرج، ایران</affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
