Components of defence strategies in society’s information environment: a case study based on the grounded theory

Journal Title: Security and Defence Quarterly - Year 2020, Vol 28, Issue 1

Abstract

The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society’s information environment. The data collected was analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these components was developed using the Grounded Theory. This study shows that the goal of politically and militarily hostile actors is to weaken society’s information environment, and that their operations are coordinated and carried out over a long time period. The data validates past studies and reveals relationships between the components of defence strategies. These relationships increase confidence in the validity of these components and their relationships, and expand the emerging theory. First, the data and findings showed 16 inter-connected components of defence strategies. Second, they showed that the political, military, societal, power, and personal goals of the hostile actors carrying out cyber operations and cyber attacks are to weaken society’s information environment. Third, they revealed that cyber operations and cyber attacks against networks, information and infrastructures are coordinated operations, carried out over a long time period. Finally, it was revealed that the actors defending society’s information environment must rapidly change their own components of defence strategies and use the newest tools and methods for these components in networks, infrastructures and social media.

Authors and Affiliations

Erja Mustonen-Ollila, Martti Lehto, Jukka Heikkonen

Keywords

Related Articles

Review of the book by Trevor Barnes (2020) Dead Doubles: The Extraordinary Worldwide Hunt For One of the Cold War’s Most Notorious Spy Rings. London: Weidenfeld & Nicolson, pp. 327, ISBN: 978-0-06-285699-9

This article is Review of the book by Trevor Barnes (2020) Dead Doubles: The Extraordinary Worldwide Hunt For One of the Cold War’s Most Notorious Spy Rings. London: Weidenfeld & Nicolson, pp. 327, ISBN: 978-0-06-285699-...

North Atlantic Treaty security.

The article discusses security within the North Atlantic Treaty Organisation with respect to threats which may appear in its near and more distant surroundings. The following military threats are discussed: military conf...

The role played by the armed forces for protection of the civilian population as part of humanitarian crises management. The Romanian approach

The actions of the military structures to protect the civilian population have evolved from air defence operations to complex missions of “human security”, based on prevention and intervention in any civil emergency situ...

Vulnerability analysis in critical infrastructures: A methodology

Vulnerability assessment is a crucial aspect for the development of methodologies to define the levels of protection in critical infrastructures. Throughout this research, we discussed the concept of vulnerability and me...

Participation of V4 countries in African peacekeeping missions

The article explores the peacekeeping activities of Poland, Hungary, the Czech Republic and Slovakia and the characteristics of their activities on the African continent. The paper examines the African peacekeeping missi...

Download PDF file
  • EP ID EP705862
  • DOI https://doi.org/10.35467/sdq/118186
  • Views 108
  • Downloads 0

How To Cite

Erja Mustonen-Ollila, Martti Lehto, Jukka Heikkonen (2020). Components of defence strategies in society’s information environment: a case study based on the grounded theory. Security and Defence Quarterly, 28(1), -. https://europub.co.uk/articles/-A-705862