Components of defence strategies in society’s information environment : a case study based on the grounded theory
Mustonen-Ollila, Erja Birgitta; Lehto, Martti; Heikkonen, Jukka (2020). Components of defence strategies in society’s information environment : a case study based on the grounded theory. Security and Defence Quarterly, 28 (1), 19-43. DOI: 10.35467/sdq/118186
Published inSecurity and Defence Quarterly
© 2020 E. B. Mustonen-Ollila, M. Lehto, J. Heikkonen published by War Studies University, Poland.
Objectives: The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. Methods: This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society’s information environment. The collected data were analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these components being developed using the Grounded Theory. Results: This study shows that the goal of politically and militarily hostile actors is to weaken society’s information environment, and that their operations are coordinated and carried out over a long time period. The data validate past studies and reveal relationships between the components of defence strategies. These relationships increase the confidence in the validity of these components and their relationships, and expand the emerging theory. Conclusions: First, the data and findings showed 16 inter-connected components of defence strategies. Second, they showed that the political, military, societal, power, and personal goals of the hostile actors carrying out cyber operations and cyber attacks are to weaken society’s information environment. Third, they revealed that cyber operations and cyber attacks against networks, information and infrastructures are coordinated operations, carried out over a long time period. Finally, it was revealed that the actors defending society’s information environment must rapidly change their own components of defence strategies and use the newest tools and methods for these components in networks, infrastructures and social media. ...