Abstract
Threats to global cyber security, including physical, personnel, and information, continue to evolve and spread across a hyper-connected world, irrespective of international borders, in both their elaboration and the scale of their impact. This cyber domain represents a constant challenge to national security, as its socio-technical components are both real and cognisant. The exacerbation of cyber-attacks undermines countries’ stability, its escalation produces a landscape of genuine global threat, and the magnitude of its expanding attack mechanisms creates a ‘tsunami effect’ on national cyber defenses. This paper reviews the current politically unstable state of Spring Land’s cyber security capacity, utilising Interactive Management (IM) approach. It reports the findings of an IM session conducted during a workshop involving a total of 26 participants from the Spring Land National Cyber Security Authority (NCSA), other government agencies. The workshop utilised different IM techniques, such as Idea Writing (IW), Nominal Group Technique (NGT), and Interpretive Structural Modelling (ISM). Using trigger questions, based on the dimensions of the Cybersecurity Capacity Maturity Model for Nations (CCMM), a set of objectives was derived to contextualise and support identified the key initiatives for the development of national cyber security capacity in the country.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
McCrabb, M.: Rough waters. Nav. War Coll. Rev. 70, 141–145 (2017)
DeRouen Jr., K., Goldfinch, S.: What makes a state stable and peaceful? Good governance, legitimacy and legal-rationality matter even more for low-income countries. Civil Wars 14, 499–520 (2012)
Brinkerhoff, D.W.: Rebuilding governance in failed states and post-conflict societies: core concepts and cross-cutting themes. Public Adm. Dev.: Int. J. Manag. Res. Pract. 25, 3–14 (2005)
Nissenbaum, H.: Where computer security meets national security. Ethics Inf. Technol. 7, 61–73 (2005)
Bush, G.W.: President George W. Bush: The National Strategy to Secure Cyberspace. Morgan James Publishing (2003)
W.E.F. Weforum: The Global Risks Report 2018 13th (edn.) (2018). http://www3.weforum.org/docs/WEF_GRR18_Report.pdf
GCSCC: Cybersecurity Capacity Maturity Model for Nations (CMM) (2017). https://www.sbs.ox.ac.uk/cybersecuritycapacity/system/files/CMM%20Version%201_2_0.pdf
ITU: Definition of Cybersecurity (2016). http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/cybersecurity.aspx
Orded, E.: Executive order–improving critical infrastructure cybersecurity (2013)
Argomaniz, J.: The European union policies on the protection of infrastructure from terrorist attacks: a critical assessment. Intell. Natl. Secur. 30, 259–280 (2015)
Hjortdal, M.: China’s use of cyber warfare: Espionage meets strategic deterrence. J. Strateg. Secur. 4, 1 (2011)
Passeri, P.: Cyber Attacks Statistics. http://www.hackmageddon.com/category/security/cyber-attacks-statistics/. Accessed 28 Aug 2017
Geers, K.: The cyber threat to national critical infrastructures: Beyond theory. Inf. Secur. J.: Glob. Perspect. 18, 1–7 (2009)
Wilson, C.: Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. CRS Report for Congress. Congressional Research Service-The Library of Congress (2005)
Prichard, J.J., MacDonald, L.E.: Cyber terrorism: a study of the extent of coverage in computer science textbooks. J. Inf. Technol. Educ.: Res. 3, 279–289 (2004)
NCSA: The National Cyber Security Authority (NCSA) (2013)
Symantec: Cyber crime and cyber security trends in Africa Report, Symantec (2016)
Miron, W., Muita, K.: Cybersecurity capability maturity models for providers of critical infrastructure. Technol. Innov. Manag. Rev. 4, 33 (2014)
Baxter, G., Sommerville, I.: Socio-technical systems: From design methods to systems engineering. Interact. Comput. 23, 4–17 (2011)
Appelbaum, S.H.: Socio-technical systems theory: an intervention strategy for organizational development. Manag. Decis. 35, 452–463 (1997)
Warfield, J.N, Cárdenas, A.R.: A Handbook of Interactive Management. Iowa State Press (2002)
Banathy, B.A.: Information-based design of social systems. Syst. Res. Behav. Sci. 41, 104–123 (1996)
Ward, J., Dogan, H., Apeh, E., Mylonas, A., Katos, V.: Using human factor approaches to an organisation’s bring your own device scheme. In: International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 396–413 (2017)
Janes, F.R.: Interactive management: framework, practice, and complexity, pp. 51–60 (1995)
Dogan, H., Pilfold, S.A., Henshaw, M.: The role of human factors in addressing systems of systems complexity. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics, pp. 1244–1249, (2011)
Shahabadkar, P.: Deployment of interpretive structural modelling methodology in supply chain management–an overview. Int. J. Ind. Eng. Prod. Res. 23, 195–205 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ben Naseir, M.A., Dogan, H., Apeh, E., Richardson, C., Ali, R. (2019). Contextualising the National Cyber Security Capacity in an Unstable Environment: A Spring Land Case Study. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 930. Springer, Cham. https://doi.org/10.1007/978-3-030-16181-1_35
Download citation
DOI: https://doi.org/10.1007/978-3-030-16181-1_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16180-4
Online ISBN: 978-3-030-16181-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)