Nothing Special   »   [go: up one dir, main page]

Skip to main content

Contextualising the National Cyber Security Capacity in an Unstable Environment: A Spring Land Case Study

  • Conference paper
  • First Online:
New Knowledge in Information Systems and Technologies (WorldCIST'19 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 930))

Included in the following conference series:

Abstract

Threats to global cyber security, including physical, personnel, and information, continue to evolve and spread across a hyper-connected world, irrespective of international borders, in both their elaboration and the scale of their impact. This cyber domain represents a constant challenge to national security, as its socio-technical components are both real and cognisant. The exacerbation of cyber-attacks undermines countries’ stability, its escalation produces a landscape of genuine global threat, and the magnitude of its expanding attack mechanisms creates a ‘tsunami effect’ on national cyber defenses. This paper reviews the current politically unstable state of Spring Land’s cyber security capacity, utilising Interactive Management (IM) approach. It reports the findings of an IM session conducted during a workshop involving a total of 26 participants from the Spring Land National Cyber Security Authority (NCSA), other government agencies. The workshop utilised different IM techniques, such as Idea Writing (IW), Nominal Group Technique (NGT), and Interpretive Structural Modelling (ISM). Using trigger questions, based on the dimensions of the Cybersecurity Capacity Maturity Model for Nations (CCMM), a set of objectives was derived to contextualise and support identified the key initiatives for the development of national cyber security capacity in the country.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. McCrabb, M.: Rough waters. Nav. War Coll. Rev. 70, 141–145 (2017)

    Google Scholar 

  2. DeRouen Jr., K., Goldfinch, S.: What makes a state stable and peaceful? Good governance, legitimacy and legal-rationality matter even more for low-income countries. Civil Wars 14, 499–520 (2012)

    Article  Google Scholar 

  3. Brinkerhoff, D.W.: Rebuilding governance in failed states and post-conflict societies: core concepts and cross-cutting themes. Public Adm. Dev.: Int. J. Manag. Res. Pract. 25, 3–14 (2005)

    Article  Google Scholar 

  4. Nissenbaum, H.: Where computer security meets national security. Ethics Inf. Technol. 7, 61–73 (2005)

    Article  Google Scholar 

  5. Bush, G.W.: President George W. Bush: The National Strategy to Secure Cyberspace. Morgan James Publishing (2003)

    Google Scholar 

  6. W.E.F. Weforum: The Global Risks Report 2018 13th (edn.) (2018). http://www3.weforum.org/docs/WEF_GRR18_Report.pdf

  7. GCSCC: Cybersecurity Capacity Maturity Model for Nations (CMM) (2017). https://www.sbs.ox.ac.uk/cybersecuritycapacity/system/files/CMM%20Version%201_2_0.pdf

  8. ITU: Definition of Cybersecurity (2016). http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/cybersecurity.aspx

  9. Orded, E.: Executive order–improving critical infrastructure cybersecurity (2013)

    Google Scholar 

  10. Argomaniz, J.: The European union policies on the protection of infrastructure from terrorist attacks: a critical assessment. Intell. Natl. Secur. 30, 259–280 (2015)

    Article  Google Scholar 

  11. Hjortdal, M.: China’s use of cyber warfare: Espionage meets strategic deterrence. J. Strateg. Secur. 4, 1 (2011)

    Article  Google Scholar 

  12. Passeri, P.: Cyber Attacks Statistics. http://www.hackmageddon.com/category/security/cyber-attacks-statistics/. Accessed 28 Aug 2017

  13. Geers, K.: The cyber threat to national critical infrastructures: Beyond theory. Inf. Secur. J.: Glob. Perspect. 18, 1–7 (2009)

    Google Scholar 

  14. Wilson, C.: Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. CRS Report for Congress. Congressional Research Service-The Library of Congress (2005)

    Google Scholar 

  15. Prichard, J.J., MacDonald, L.E.: Cyber terrorism: a study of the extent of coverage in computer science textbooks. J. Inf. Technol. Educ.: Res. 3, 279–289 (2004)

    Google Scholar 

  16. NCSA: The National Cyber Security Authority (NCSA) (2013)

    Google Scholar 

  17. Symantec: Cyber crime and cyber security trends in Africa Report, Symantec (2016)

    Google Scholar 

  18. Miron, W., Muita, K.: Cybersecurity capability maturity models for providers of critical infrastructure. Technol. Innov. Manag. Rev. 4, 33 (2014)

    Article  Google Scholar 

  19. Baxter, G., Sommerville, I.: Socio-technical systems: From design methods to systems engineering. Interact. Comput. 23, 4–17 (2011)

    Article  Google Scholar 

  20. Appelbaum, S.H.: Socio-technical systems theory: an intervention strategy for organizational development. Manag. Decis. 35, 452–463 (1997)

    Article  Google Scholar 

  21. Warfield, J.N, Cárdenas, A.R.: A Handbook of Interactive Management. Iowa State Press (2002)

    Google Scholar 

  22. Banathy, B.A.: Information-based design of social systems. Syst. Res. Behav. Sci. 41, 104–123 (1996)

    Article  Google Scholar 

  23. Ward, J., Dogan, H., Apeh, E., Mylonas, A., Katos, V.: Using human factor approaches to an organisation’s bring your own device scheme. In: International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 396–413 (2017)

    Google Scholar 

  24. Janes, F.R.: Interactive management: framework, practice, and complexity, pp. 51–60 (1995)

    Google Scholar 

  25. Dogan, H., Pilfold, S.A., Henshaw, M.: The role of human factors in addressing systems of systems complexity. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics, pp. 1244–1249, (2011)

    Google Scholar 

  26. Shahabadkar, P.: Deployment of interpretive structural modelling methodology in supply chain management–an overview. Int. J. Ind. Eng. Prod. Res. 23, 195–205 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Altaher Ben Naseir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ben Naseir, M.A., Dogan, H., Apeh, E., Richardson, C., Ali, R. (2019). Contextualising the National Cyber Security Capacity in an Unstable Environment: A Spring Land Case Study. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 930. Springer, Cham. https://doi.org/10.1007/978-3-030-16181-1_35

Download citation

Publish with us

Policies and ethics