Ben Naseir, M. A., Dogan, H., Apeh, E. T., Richardson, C. and Ali, R., 2019. Contextualising the National Cyber Security Capacity in an Unstable Environment: A Spring Land Case Study. In: WorldCIST'19 - 7th World Conference on Information Systems and Technologies, 16 - 19 April 2019, La Toja Island, Galicia, Spain.
Full text available as:
|
PDF
Paper 133 WorldCIST 19 Contextualising the National Cyber Security Capacity in an Unstable Environment.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 548kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1007/978-3-030-16181-1_35
Abstract
Threats to global cyber security, including physical, personnel, and information, continue to evolve and spread across a hyper-connected world, irrespective of international borders, in both their elaboration and the scale of their impact. This cyber domain represents a constant challenge to national security, as its socio-technical components are both real and cognisant. The exacerbation of cyber-attacks undermines countries’ stability, its escalation produces a landscape of genuine global threat, and the magnitude of its expanding attack mechanisms creates a ‘tsunami effect’ on national cyber defenses. This paper reviews the current politically unstable state of Spring Land’s cyber security capacity, utilising Interactive Management (IM) approach. It reports the findings of an IM session conducted during a workshop involving a total of 26 participants from the Spring Land National Cyber Security Authority (NCSA), other government agencies. The workshop utilised different IM techniques, such as Idea Writing (IW), Nominal Group Technique (NGT), and Interpretive Structural Modelling (ISM). Using trigger questions, based on the dimensions of the Cybersecurity Capacity Maturity Model for Nations (CCMM), a set of objectives was derived to contextualise and support identified the key initiatives for the development of national cyber security capacity in the country.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
ISSN: | 2194-5357 |
Uncontrolled Keywords: | cyber security; cyber security maturity models; cyber security in spring land; interactive management |
Group: | Faculty of Science & Technology |
ID Code: | 32284 |
Deposited By: | Symplectic RT2 |
Deposited On: | 14 May 2019 10:37 |
Last Modified: | 14 Mar 2022 14:16 |
Downloads
Downloads per month over past year
Repository Staff Only - |