Strategic Communication for Supporting Cyber-Security

被引:0
|
作者
Kuusisto, Tuija [1 ]
Kuusisto, Rauno [1 ,2 ]
机构
[1] Natl Def Univ, Dept Tact & Operat Art, Helsinki, Finland
[2] Univ Jyvaskyla, Dept Math Informat Technol, Jyvaskyla, Finland
关键词
Complex Adaptive Systems; Cyber-Security Theory; Information Assurance; Social Systems; System Modeling; Time;
D O I
10.4018/ijcwt.2013070105
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. First, the paper studies shortly the key concepts of the cyber world and strategic communication. A social system model of a society is applied as an approach for the identifying of emergent phenomena and characteristics of the cyber-security. The social system model is populated with a small set of empirical data about cyber-security exercises. The results of the analysis of the empirical data are examples of the emergent phenomena of cyber-security. They can be considered as one set of the focus areas of the strategic level communication.
引用
收藏
页码:72 / 79
页数:8
相关论文
共 50 条
  • [21] THE IMPORTANCE AND ROLE OF NATO IN CYBER-SECURITY
    Cioaca, Catalin
    15TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION: MILITARY SCIENCES. SECURITY AND DEFENSE, CONFERENCE PROCEEDINGS 1, 2009, 1 : 158 - 162
  • [22] WHERE NEXT FOR UK CYBER-SECURITY?
    Neville-Jones, Pauline
    Phillips, Mark
    RUSI JOURNAL, 2012, 157 (06): : 32 - 40
  • [23] AI, Connectivity and Cyber-Security in Avionics
    Gatti, Marc
    Damien, Alienor
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 35 - 38
  • [24] Cyber-security fortresses built on quicksand
    Flexera Software, United States
    Netw. Secur., 8 (5-8):
  • [25] Cyber-Security Incidents and Audit Quality
    Rosati, Pierangelo
    Gogolin, Fabian
    Lynn, Theo
    EUROPEAN ACCOUNTING REVIEW, 2022, 31 (03) : 701 - 728
  • [26] Cyber-Security Threats Origins and their Analysis
    Cerget, Maros
    Hudec, Jan
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (09) : 23 - 41
  • [27] Cyber-security in substation automation systems
    Moreira, Naiara
    Molina, Elias
    Lazaro, Jesus
    Jacob, Eduardo
    Astarloa, Armando
    RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2016, 54 : 1552 - 1562
  • [28] Cultural and psychological factors in cyber-security
    Halevi, Tzipora
    Memon, Nasir
    Lewis, James
    Kumaraguru, Ponnurangam
    Arora, Sumit
    Dagar, Nikita
    Aloul, Fadi
    Chen, Jay
    Journal of Mobile Multimedia, 2017, 13 (1-2): : 43 - 56
  • [29] A genetic epidemiology approach to cyber-security
    Gil, Santiago
    Kott, Alexander
    Barabasi, Albert-Laszlo
    SCIENTIFIC REPORTS, 2014, 4
  • [30] Special Issue on Cyber-Security for Development
    Osei-Bryson, Kweku-Muata
    Vogel, Doug
    INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2014, 20 (02) : 93 - 95