{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:46:25Z","timestamp":1761979585512,"version":"build-2065373602"},"reference-count":26,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. First, the paper studies shortly the key concepts of the cyber world and strategic communication. A social system model of a society is applied as an approach for the identifying of emergent phenomena and characteristics of the cyber-security. The social system model is populated with a small set of empirical data about cyber-security exercises. The results of the analysis of the empirical data are examples of the emergent phenomena of cyber-security. They can be considered as one set of the focus areas of the strategic level communication.<\/p>","DOI":"10.4018\/ijcwt.2013070105","type":"journal-article","created":{"date-parts":[[2014,3,31]],"date-time":"2014-03-31T18:09:19Z","timestamp":1396289359000},"page":"72-79","source":"Crossref","is-referenced-by-count":4,"title":["Strategic Communication for Supporting Cyber-Security"],"prefix":"10.4018","volume":"3","author":[{"given":"Tuija","family":"Kuusisto","sequence":"first","affiliation":[{"name":"Department of Tactics and Operations Art, National Defence University, Helsinki, Finland"}]},{"given":"Rauno","family":"Kuusisto","sequence":"additional","affiliation":[{"name":"Department of Tactics and Operations Art, National Defence University, Helsinki, Finland & Department of Mathematical Information Technology, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"}]}],"member":"2432","reference":[{"key":"ijcwt.2013070105-0","unstructured":"Ball, P. (2004). Critical mass: How one thing leads to another. Auckland, New Zeland: Arrow Books"},{"key":"ijcwt.2013070105-1","doi-asserted-by":"crossref","DOI":"10.5962\/bhl.title.166289","author":"H.Bergson","year":"1911","journal-title":"Creative evolution"},{"key":"ijcwt.2013070105-2","unstructured":"DOD. (2012). DOD dictionary of military terms. Retrieved December 19, 2012, http:\/\/www.dtic.mil\/doctrine\/dod_dictionary\/"},{"key":"ijcwt.2013070105-3","volume":"Vol. 1","author":"J.Habermas","year":"1984","journal-title":"Reason and the rationalization of society"},{"key":"ijcwt.2013070105-4","volume":"Vol. 2","author":"J.Habermas","year":"1989","journal-title":"Lifeworld and system: a critique of functionalist reason"},{"key":"ijcwt.2013070105-5","doi-asserted-by":"publisher","DOI":"10.1080\/15531180701285244"},{"key":"ijcwt.2013070105-6","article-title":"Preliminary considerations: On national cyber security","author":"M.Hathaway","year":"2012","journal-title":"National cyber security framework manual"},{"journal-title":"Strengthening leading situations via time-divergent communication conducted in ba. Journal of eBusiness Review","year":"2003","author":"T.Helokunnas","key":"ijcwt.2013070105-7"},{"key":"ijcwt.2013070105-8","first-page":"2012","volume":"27032","year":"2012","journal-title":"ISO"},{"key":"ijcwt.2013070105-9","unstructured":"ITU. (2011). ITU national cybersecurity strategy guide. Retrieved November 5, 2013, from http:\/\/www.itu.int\/ITU-D\/cyb\/cybersecurity\/docs\/itu-national-cybersecurity-guide.pdf"},{"key":"ijcwt.2013070105-10","unstructured":"ITU-T. (2008). Overview of cybersecurity. Series X: Data networks, open system communications and security, recommendation ITU-T X.1205. Retrieved November 5, 2013, from http:\/\/www.itu.int\/rec\/T-REC-X.1205-200804-I"},{"journal-title":"At home in the universe: The search for the laws of self-organization and complexity","year":"1995","author":"S.Kauffman","key":"ijcwt.2013070105-11"},{"journal-title":"Content analysis: An introduction to its methodology, 3rd edition","year":"2013","author":"K.Krippendorff","key":"ijcwt.2013070105-12"},{"journal-title":"Aspects on availability","year":"2004","author":"R.Kuusisto","key":"ijcwt.2013070105-13"},{"key":"ijcwt.2013070105-14","unstructured":"Kuusisto, R. (2008). Analyzing the Command and Control Maturity Levels of Collaborating Organizations. In: Proceedings of 13th International Command and Control Research and Technology Symposium (13th ICCRTS), Bellevue, WA, USA, 17-19 June 2008"},{"key":"ijcwt.2013070105-15","unstructured":"Kuusisto, R., & Kuusisto, T. (2003). Time in information operations. In Proceedings of the 4th Australian Conference on Information Warfare and IT Security, Adelaide, Australia (pp. 203-211)."},{"key":"ijcwt.2013070105-16","first-page":"77","article-title":"Information security culture as a social system","author":"R.Kuusisto","year":"2009","journal-title":"Social and human elements of information security"},{"key":"ijcwt.2013070105-17","doi-asserted-by":"crossref","unstructured":"Kuusisto, R., & Kuusisto, T. (2013). Strategic communication for cyber-security leadership. the Journal of Information Warfare, 12(3), 41-48.","DOI":"10.4018\/ijcwt.2013070105"},{"key":"ijcwt.2013070105-18","article-title":"Cyber world as a social system","author":"T.Kuusisto","year":"2014","journal-title":"Cyber security analytics"},{"key":"ijcwt.2013070105-19","unstructured":"Merriam-Webster. (2013). Merriam-Webster online dictionary. Retrieved November 4, 2013, http:\/\/www.merriam-webster.com"},{"key":"ijcwt.2013070105-20","doi-asserted-by":"crossref","DOI":"10.21236\/ADA457288","author":"J.Moffat","year":"2003","journal-title":"Complexity theory and network centric warfare"},{"journal-title":"The social system","year":"1951","author":"T.Parsons","key":"ijcwt.2013070105-21"},{"journal-title":"Objective knowledge, an evolutionary approach","year":"1975","author":"K.Popper","key":"ijcwt.2013070105-22"},{"key":"ijcwt.2013070105-23","unstructured":"Rintakoski, K., & Autti, M. (2008). Compherensive approach, trends, challenges and possibilities for cooperation in crisis prevention and management. Seminar publication on 17th of June, 2008 Helsinki, Finland."},{"key":"ijcwt.2013070105-24","unstructured":"The Security Committee. (2013). The security committee in Finland. Retrieved November 11, 2013, from http:\/\/turvallisuuskomitea.fi\/index.php\/en\/"},{"key":"ijcwt.2013070105-25","unstructured":"Virtanen, T. (2002). Four views on security. Helsinki University of Technology, Department of Computer Science and Engineering, Telecommunications Software and Multimedia Laboratory, Otamedia Oy, Espoo."}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=104524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:02:03Z","timestamp":1654113723000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013070105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013070105","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"type":"print","value":"1947-3435"},{"type":"electronic","value":"1947-3443"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}