Strategic Communication for Supporting Cyber-Security

被引:0
|
作者
Kuusisto, Tuija [1 ]
Kuusisto, Rauno [1 ,2 ]
机构
[1] Natl Def Univ, Dept Tact & Operat Art, Helsinki, Finland
[2] Univ Jyvaskyla, Dept Math Informat Technol, Jyvaskyla, Finland
关键词
Complex Adaptive Systems; Cyber-Security Theory; Information Assurance; Social Systems; System Modeling; Time;
D O I
10.4018/ijcwt.2013070105
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. First, the paper studies shortly the key concepts of the cyber world and strategic communication. A social system model of a society is applied as an approach for the identifying of emergent phenomena and characteristics of the cyber-security. The social system model is populated with a small set of empirical data about cyber-security exercises. The results of the analysis of the empirical data are examples of the emergent phenomena of cyber-security. They can be considered as one set of the focus areas of the strategic level communication.
引用
收藏
页码:72 / 79
页数:8
相关论文
共 50 条
  • [11] Challenging confidence in cyber-security
    Strand, Chris, 1600, Elsevier Ltd (2014):
  • [12] The Science of Social Cyber-Security
    Carley, Kathleen
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 459 - 459
  • [13] On Cyber-Security of Information Systems
    Sneps-Sneppe, Manfred
    Sukhomlin, Vladimir
    Namiot, Dmitry
    DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 201 - 211
  • [14] A CYBER-SECURITY STORM MAP
    Ferebee, Denise
    Dasgupta, Dipankar
    Wu, Qishi
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 93 - 102
  • [15] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [16] Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph
    Mendsaikhan, Otgonpurev
    Hasegawa, Hirokazu
    Yamaguchi, Yukiko
    Shimada, Hajime
    IEEE ACCESS, 2020, 8 (08): : 177041 - 177052
  • [17] On SCADA PLC and Fieldbus Cyber-Security
    Davidson, Cordell
    Andel, Todd
    Yampolskiy, Mark
    McDonald, Todd
    Glisson, Brad
    Thomas, Tom
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 140 - 148
  • [18] Cyber-Security of Smart Microgrids: A Survey
    Nejabatkhah, Farzam
    Li, Yun Wei
    Liang, Hao
    Reza Ahrabi, Rouzbeh
    ENERGIES, 2021, 14 (01)
  • [19] Cyber-security: Who will provide protection?
    ViaSat, United Kingdom
    Comput. Fraud Secur., 12 (19-20): : 19 - 20
  • [20] Cyber-security in robotics and autonomous systems
    Matellan, Vicente
    Bonaci, Tamara
    Sabaliauskaite, Giedre
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2018, 100 : 41 - 42