dc.contributor.author | Kuusisto, Rauno | |
dc.contributor.author | Kuusisto, Tuija | |
dc.date.accessioned | 2022-08-12T08:35:19Z | |
dc.date.available | 2022-08-12T08:35:19Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Kuusisto, R., & Kuusisto, T. (2013). Strategic Communication for Cyber-security Leadership. <i>Journal of Information Warfare</i>, <i>12</i>(3), 41-48. <a href="https://www.jinfowar.com/journal/volume-12-issue-3/strategic-communication-cyber-security-leadership" target="_blank">https://www.jinfowar.com/journal/volume-12-issue-3/strategic-communication-cyber-security-leadership</a> | |
dc.identifier.other | CONVID_148882341 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/82499 | |
dc.description.abstract | The purpose of this paper is to form a preliminary hypothesis about how to identify characteristics that a leader needs to focus on when aiming at cyber-security leadership. The paper studies the key concepts and terms of cyber security and presents the physical world and the cyber world framework. The paper refers to a system model of a society and uses that model to analyze the results of two limited media surveys about cyber-related newspaper articles. The media surveys indicate a strong need to organize the cyber world. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Peregrine Technical Solutions, LLC | |
dc.relation.ispartofseries | Journal of Information Warfare | |
dc.relation.uri | https://www.jinfowar.com/journal/volume-12-issue-3/strategic-communication-cyber-security-leadership | |
dc.rights | In Copyright | |
dc.subject.other | cyber security theory | |
dc.subject.other | cyber-security | |
dc.subject.other | governance | |
dc.subject.other | information security | |
dc.title | Strategic Communication for Cyber-security Leadership | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-202208124043 | |
dc.contributor.laitos | Tietotekniikan laitos | fi |
dc.contributor.laitos | Department of Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 41-48 | |
dc.relation.issn | 1445-3312 | |
dc.relation.numberinseries | 3 | |
dc.relation.volume | 12 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © The Authors 2013 | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | tietohallinto | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | johtaminen | |
dc.subject.yso | julkinen keskustelu | |
dc.subject.yso | systeemiajattelu | |
dc.subject.yso | lehdistökirjoittelu | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p9816 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p554 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p8612 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24299 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p20540 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | A1 | |