Näytä suppeat kuvailutiedot

dc.contributor.authorKuusisto, Rauno
dc.contributor.authorKuusisto, Tuija
dc.date.accessioned2022-08-12T08:35:19Z
dc.date.available2022-08-12T08:35:19Z
dc.date.issued2013
dc.identifier.citationKuusisto, R., & Kuusisto, T. (2013). Strategic Communication for Cyber-security Leadership. <i>Journal of Information Warfare</i>, <i>12</i>(3), 41-48. <a href="https://www.jinfowar.com/journal/volume-12-issue-3/strategic-communication-cyber-security-leadership" target="_blank">https://www.jinfowar.com/journal/volume-12-issue-3/strategic-communication-cyber-security-leadership</a>
dc.identifier.otherCONVID_148882341
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/82499
dc.description.abstractThe purpose of this paper is to form a preliminary hypothesis about how to identify characteristics that a leader needs to focus on when aiming at cyber-security leadership. The paper studies the key concepts and terms of cyber security and presents the physical world and the cyber world framework. The paper refers to a system model of a society and uses that model to analyze the results of two limited media surveys about cyber-related newspaper articles. The media surveys indicate a strong need to organize the cyber world.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherPeregrine Technical Solutions, LLC
dc.relation.ispartofseriesJournal of Information Warfare
dc.relation.urihttps://www.jinfowar.com/journal/volume-12-issue-3/strategic-communication-cyber-security-leadership
dc.rightsIn Copyright
dc.subject.othercyber security theory
dc.subject.othercyber-security
dc.subject.othergovernance
dc.subject.otherinformation security
dc.titleStrategic Communication for Cyber-security Leadership
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202208124043
dc.contributor.laitosTietotekniikan laitosfi
dc.contributor.laitosDepartment of Mathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange41-48
dc.relation.issn1445-3312
dc.relation.numberinseries3
dc.relation.volume12
dc.type.versionpublishedVersion
dc.rights.copyright© The Authors 2013
dc.rights.accesslevelopenAccessfi
dc.subject.ysotietohallinto
dc.subject.ysokyberturvallisuus
dc.subject.ysojohtaminen
dc.subject.ysojulkinen keskustelu
dc.subject.ysosysteemiajattelu
dc.subject.ysolehdistökirjoittelu
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p9816
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p554
jyx.subject.urihttp://www.yso.fi/onto/yso/p8612
jyx.subject.urihttp://www.yso.fi/onto/yso/p24299
jyx.subject.urihttp://www.yso.fi/onto/yso/p20540
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright