Strategic Communication for Supporting Cyber-Security

被引:0
|
作者
Kuusisto, Tuija [1 ]
Kuusisto, Rauno [1 ,2 ]
机构
[1] Natl Def Univ, Dept Tact & Operat Art, Helsinki, Finland
[2] Univ Jyvaskyla, Dept Math Informat Technol, Jyvaskyla, Finland
关键词
Complex Adaptive Systems; Cyber-Security Theory; Information Assurance; Social Systems; System Modeling; Time;
D O I
10.4018/ijcwt.2013070105
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. First, the paper studies shortly the key concepts of the cyber world and strategic communication. A social system model of a society is applied as an approach for the identifying of emergent phenomena and characteristics of the cyber-security. The social system model is populated with a small set of empirical data about cyber-security exercises. The results of the analysis of the empirical data are examples of the emergent phenomena of cyber-security. They can be considered as one set of the focus areas of the strategic level communication.
引用
收藏
页码:72 / 79
页数:8
相关论文
共 50 条
  • [31] Pennsylvania starts cyber-security initiative
    不详
    COMPUTERS & SECURITY, 2001, 20 (08) : 650 - 650
  • [32] Self-Healing for Cyber-Security
    Gijsen, Bart
    Montalto, Ruggero
    Panneman, Jeffrey
    Falconieri, Federico
    Wiper, Paul
    Zuraniewski, Piotr
    2021 SIXTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2021, : 84 - 90
  • [33] The cyber-security challenge at the connected industry
    Garcia-Bringas, Pablo
    Angulo, Ignacio
    Goti-Elordi, Aitor
    Pastor, Iker
    DYNA, 2019, 94 (03): : 258 - 261
  • [34] Physical Cyber-Security of SCADA Systems
    Bichmou, Ahmed
    Chiocca, Joseph
    Hernandez, Leonarndo
    Hoffmann, R. Wade
    Horsham, Brandon
    Huy Lam
    McKinsey, Vince
    Bibyk, Steven
    PROCEEDINGS OF THE 2019 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2019, : 243 - 248
  • [35] Cyber-Security Training Evaluation Metrics
    Koutsouris, Nikolaos
    Vassilakis, Costas
    Kolokotronis, Nicholas
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 192 - 197
  • [36] A genetic epidemiology approach to cyber-security
    Santiago Gil
    Alexander Kott
    Albert-László Barabási
    Scientific Reports, 4
  • [37] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [38] Cyber-security initiative now underway
    Jevtic, N
    CHEMICAL PROCESSING, 2003, 66 (02): : 17 - 17
  • [39] Plugging the cyber-security skills gap
    Caldwell, Tracey
    Computer Fraud and Security, 2013, 2013 (07): : 5 - 10
  • [40] Fuzz Testing for Automotive Cyber-security
    Fowler, Daniel
    Bryans, Jeremy
    Shaikh, Siraj Ahmed
    Wooderson, Paul
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 239 - 246