Show simple item record

dc.contributor.authorMustonen-Ollila, Erja Birgitta
dc.contributor.authorLehto, Martti
dc.contributor.authorHeikkonen, Jukka
dc.date.accessioned2020-07-01T10:32:09Z
dc.date.available2020-07-01T10:32:09Z
dc.date.issued2020
dc.identifier.citationMustonen-Ollila, E. B., Lehto, M., & Heikkonen, J. (2020). Components of defence strategies in society’s information environment : a case study based on the grounded theory. <i>Security and Defence Quarterly</i>, <i>28</i>(1), 19-43. <a href="https://doi.org/10.35467/sdq/118186" target="_blank">https://doi.org/10.35467/sdq/118186</a>
dc.identifier.otherCONVID_36248137
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/71011
dc.description.abstractObjectives: The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. Methods: This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society’s information environment. The collected data were analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these components being developed using the Grounded Theory. Results: This study shows that the goal of politically and militarily hostile actors is to weaken society’s information environment, and that their operations are coordinated and carried out over a long time period. The data validate past studies and reveal relationships between the components of defence strategies. These relationships increase the confidence in the validity of these components and their relationships, and expand the emerging theory. Conclusions: First, the data and findings showed 16 inter-connected components of defence strategies. Second, they showed that the political, military, societal, power, and personal goals of the hostile actors carrying out cyber operations and cyber attacks are to weaken society’s information environment. Third, they revealed that cyber operations and cyber attacks against networks, information and infrastructures are coordinated operations, carried out over a long time period. Finally, it was revealed that the actors defending society’s information environment must rapidly change their own components of defence strategies and use the newest tools and methods for these components in networks, infrastructures and social media.en
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherWar Studies University
dc.relation.ispartofseriesSecurity and Defence Quarterly
dc.rightsCC BY-NC-ND 4.0
dc.subject.othersociety
dc.subject.othergrounded theory
dc.subject.otherinformation environment
dc.subject.othercomponent
dc.subject.otherdefence
dc.titleComponents of defence strategies in society’s information environment : a case study based on the grounded theory
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202007015194
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.description.reviewstatuspeerReviewed
dc.format.pagerange19-43
dc.relation.issn2300-8741
dc.relation.numberinseries1
dc.relation.volume28
dc.type.versionpublishedVersion
dc.rights.copyright© 2020 E. B. Mustonen-Ollila, M. Lehto, J. Heikkonen published by War Studies University, Poland.
dc.rights.accesslevelopenAccessfi
dc.subject.ysogrounded theory
dc.subject.ysoinformaatiosodankäynti
dc.subject.ysokybersodankäynti
dc.subject.ysopuolustuspolitiikka
dc.subject.ysosotilasstrategia
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p7740
jyx.subject.urihttp://www.yso.fi/onto/yso/p8874
jyx.subject.urihttp://www.yso.fi/onto/yso/p27779
jyx.subject.urihttp://www.yso.fi/onto/yso/p9565
jyx.subject.urihttp://www.yso.fi/onto/yso/p37807
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.35467/sdq/118186


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND 4.0
Except where otherwise noted, this item's license is described as CC BY-NC-ND 4.0