2020
DOI: 10.35467/sdq/118186
|View full text |Cite
|
Sign up to set email alerts
|

Components of defence strategies in society’s information environment: a case study based on the grounded theory

Abstract: The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are interrelated. This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society's information environment. The data collected was analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these compon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 17 publications
(24 reference statements)
0
1
0
Order By: Relevance
“…The issues of solving security problems in the information environment at the macro level, namely the development of the protection of the critical infrastructure of the state, are covered in studies [15,16]. It is also possible to distinguish scholars who are engaged in the development of a system for a comprehensive assessment of the level of security culture in the information environment at the level of individual business entities [17][18][19], integrated approaches to combating information threats, and ensuring an appropriate level of security [20,21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The issues of solving security problems in the information environment at the macro level, namely the development of the protection of the critical infrastructure of the state, are covered in studies [15,16]. It is also possible to distinguish scholars who are engaged in the development of a system for a comprehensive assessment of the level of security culture in the information environment at the level of individual business entities [17][18][19], integrated approaches to combating information threats, and ensuring an appropriate level of security [20,21].…”
Section: Literature Reviewmentioning
confidence: 99%