Strategic Communication for Supporting Cyber-Security

被引:0
|
作者
Kuusisto, Tuija [1 ]
Kuusisto, Rauno [1 ,2 ]
机构
[1] Natl Def Univ, Dept Tact & Operat Art, Helsinki, Finland
[2] Univ Jyvaskyla, Dept Math Informat Technol, Jyvaskyla, Finland
关键词
Complex Adaptive Systems; Cyber-Security Theory; Information Assurance; Social Systems; System Modeling; Time;
D O I
10.4018/ijcwt.2013070105
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. First, the paper studies shortly the key concepts of the cyber world and strategic communication. A social system model of a society is applied as an approach for the identifying of emergent phenomena and characteristics of the cyber-security. The social system model is populated with a small set of empirical data about cyber-security exercises. The results of the analysis of the empirical data are examples of the emergent phenomena of cyber-security. They can be considered as one set of the focus areas of the strategic level communication.
引用
收藏
页码:72 / 79
页数:8
相关论文
共 50 条
  • [1] Strategic Cyber-Security Perspective in Smart Grids
    Canbek, Gurol
    Sagiroglu, Seref
    [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 178 - 183
  • [2] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [3] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [4] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [5] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [6] Supporting Cyber-Security Based on Hardware-Software Interface Definition
    Macher, Georg
    Sporer, Harald
    Brenner, Eugen
    Kreiner, Christian
    [J]. SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT, EUROSPI 2016, 2016, 633 : 148 - 159
  • [7] Cyber-Security for the Controller Area Network (CAN) Communication Protocol
    Lin, Chung-Wei
    Sangiovanni-Vincentelli, Alberto
    [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 1 - 7
  • [8] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    [J]. BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [9] CYBER-SECURITY RISKS OF FEDWIRE
    Bilger, Mark J.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2019, 14 (04)
  • [10] On Cyber-security of Augmentation Networks
    Neri, Alessandro
    Baldoni, Sara
    Capua, Roberto
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL TECHNICAL MEETING OF THE INSTITUTE OF NAVIGATION, 2019, : 408 - 422