Contextualising the National Cyber Security Capacity in an Unstable Environment: A Spring Land Case Study

Authors: Ben Naseir, M.A., Dogan, H., Apeh, E., Richardson, C. and Ali, R.

Journal: Advances in Intelligent Systems and Computing

Volume: 930

Pages: 373-382

eISSN: 2194-5365

ISSN: 2194-5357

DOI: 10.1007/978-3-030-16181-1_35

Abstract:

Threats to global cyber security, including physical, personnel, and information, continue to evolve and spread across a hyper-connected world, irrespective of international borders, in both their elaboration and the scale of their impact. This cyber domain represents a constant challenge to national security, as its socio-technical components are both real and cognisant. The exacerbation of cyber-attacks undermines countries’ stability, its escalation produces a landscape of genuine global threat, and the magnitude of its expanding attack mechanisms creates a ‘tsunami effect’ on national cyber defenses. This paper reviews the current politically unstable state of Spring Land’s cyber security capacity, utilising Interactive Management (IM) approach. It reports the findings of an IM session conducted during a workshop involving a total of 26 participants from the Spring Land National Cyber Security Authority (NCSA), other government agencies. The workshop utilised different IM techniques, such as Idea Writing (IW), Nominal Group Technique (NGT), and Interpretive Structural Modelling (ISM). Using trigger questions, based on the dimensions of the Cybersecurity Capacity Maturity Model for Nations (CCMM), a set of objectives was derived to contextualise and support identified the key initiatives for the development of national cyber security capacity in the country.

https://eprints.bournemouth.ac.uk/32284/

Source: Scopus

Contextualising the National Cyber Security Capacity in an Unstable Environment: A Spring Land Case Study

Authors: Ben Naseir, M.A., Dogan, H., Apeh, E., Richardson, C. and Ali, R.

Journal: NEW KNOWLEDGE IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1

Volume: 930

Pages: 373-382

eISSN: 2194-5365

ISBN: 978-3-030-16180-4

ISSN: 2194-5357

DOI: 10.1007/978-3-030-16181-1_35

https://eprints.bournemouth.ac.uk/32284/

Source: Web of Science (Lite)

Contextualising the National Cyber Security Capacity in an Unstable Environment: a Spring Land Case Study

Authors: Ben Naseir, M., Dogan, H., Apeh, E., Richardson, C. and Ali, R.

Conference: WorldCIST'19 - 7th World Conference on Information Systems and Technologies

Dates: 16-19 April 2019

https://eprints.bournemouth.ac.uk/32284/

Source: Manual

Contextualising the National Cyber Security Capacity in an Unstable Environment: A Spring Land Case Study.

Authors: Ben Naseir, M.A., Dogan, H., Apeh, E.T., Richardson, C. and Ali, R.

Editors: Rocha, A., Adeli, H., Reis, L.P. and Costanzo, S.

Conference: WorldCIST'19 - 7th World Conference on Information Systems and Technologies

Publisher: Springer

ISBN: 9783030161804

ISSN: 2194-5357

Abstract:

Threats to global cyber security, including physical, personnel, and information, continue to evolve and spread across a hyper-connected world, irrespective of international borders, in both their elaboration and the scale of their impact. This cyber domain represents a constant challenge to national security, as its socio-technical components are both real and cognisant. The exacerbation of cyber-attacks undermines countries’ stability, its escalation produces a landscape of genuine global threat, and the magnitude of its expanding attack mechanisms creates a ‘tsunami effect’ on national cyber defenses. This paper reviews the current politically unstable state of Spring Land’s cyber security capacity, utilising Interactive Management (IM) approach. It reports the findings of an IM session conducted during a workshop involving a total of 26 participants from the Spring Land National Cyber Security Authority (NCSA), other government agencies. The workshop utilised different IM techniques, such as Idea Writing (IW), Nominal Group Technique (NGT), and Interpretive Structural Modelling (ISM). Using trigger questions, based on the dimensions of the Cybersecurity Capacity Maturity Model for Nations (CCMM), a set of objectives was derived to contextualise and support identified the key initiatives for the development of national cyber security capacity in the country.

https://eprints.bournemouth.ac.uk/32284/

Source: BURO EPrints