Components of defence strategies in society’s information environment : a case study based on the grounded theory
Mustonen-Ollila, E. B., Lehto, M., & Heikkonen, J. (2020). Components of defence strategies in society’s information environment : a case study based on the grounded theory. Security and Defence Quarterly, 28(1), 19-43. https://doi.org/10.35467/sdq/118186
Julkaistu sarjassa
Security and Defence QuarterlyPäivämäärä
2020Tekijänoikeudet
© 2020 E. B. Mustonen-Ollila, M. Lehto, J. Heikkonen published by War Studies University, Poland.
Objectives:
The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related.
Methods:
This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society’s information environment. The collected data were analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these components being developed using the Grounded Theory.
Results:
This study shows that the goal of politically and militarily hostile actors is to weaken society’s information environment, and that their operations are coordinated and carried out over a long time period. The data validate past studies and reveal relationships between the components of defence strategies. These relationships increase the confidence in the validity of these components and their relationships, and expand the emerging theory.
Conclusions:
First, the data and findings showed 16 inter-connected components of defence strategies. Second, they showed that the political, military, societal, power, and personal goals of the hostile actors carrying out cyber operations and cyber attacks are to weaken society’s information environment. Third, they revealed that cyber operations and cyber attacks against networks, information and infrastructures are coordinated operations, carried out over a long time period. Finally, it was revealed that the actors defending society’s information environment must rapidly change their own components of defence strategies and use the newest tools and methods for these components in networks, infrastructures and social media.
...
Julkaisija
War Studies UniversityISSN Hae Julkaisufoorumista
2300-8741Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/36248137
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Information Influence in Society’s Information Environment : An Empirical Analysis Using the Grounded Theory
Mustonen-Ollila, Erja; Lehto, Martti; Heikkonen, Jukka (Peregrine Technical Solutions, 2020)This paper investigates information influence in society’s Information Environment. The Grounded Theory approach was used to collect and to analyse the data. A conceptual framework of the thematic categories and item ... -
Theory of strategic culture : an analytical framework for Russian cyber threat perception
Kari, Martti J.; Pynnöniemi, Katri (Routledge, 2023)The strategic environment is evolving rapidly with the recognition of cyberspace as a domain of warfare. The increased interest in cyber as a part of defence has heightened the need for theoretical tools suitable to assess ... -
Component search in a metaCASE environment
Äijänen, Matti (2001) -
Readiness Through International Cooperation : Finnish Defence Industrial Strategy in Changing Operational Environment from the Mid-1990s to the Early 2020s
Roiko-Jokela, Heikki; Roiko-Jokela, Tapio; Mangeloja, Esa (Routledge, 2024)After the Cold War, European defence industrial capacity decreased; however, in the 2020s, there is again a need for products of the defence industry. Although Finland is a small country, it has significant production ... -
Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence
Bodström, Tero T. (Peregrine Technical Solutions, 2022)Organisations need to improve their information security practices, given the volume of successful cyberattacks and crimes. To enhance security in an organisation, information security must be considered a business issue, ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.