Components of defence strategies in society’s information environment: a case study based on the grounded theory
Journal Title: Security and Defence Quarterly - Year 2020, Vol 28, Issue 1
Abstract
The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society’s information environment. The data collected was analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these components was developed using the Grounded Theory. This study shows that the goal of politically and militarily hostile actors is to weaken society’s information environment, and that their operations are coordinated and carried out over a long time period. The data validates past studies and reveals relationships between the components of defence strategies. These relationships increase confidence in the validity of these components and their relationships, and expand the emerging theory. First, the data and findings showed 16 inter-connected components of defence strategies. Second, they showed that the political, military, societal, power, and personal goals of the hostile actors carrying out cyber operations and cyber attacks are to weaken society’s information environment. Third, they revealed that cyber operations and cyber attacks against networks, information and infrastructures are coordinated operations, carried out over a long time period. Finally, it was revealed that the actors defending society’s information environment must rapidly change their own components of defence strategies and use the newest tools and methods for these components in networks, infrastructures and social media.
Authors and Affiliations
Erja Mustonen-Ollila, Martti Lehto, Jukka Heikkonen
The power and the security – Selected issues.
In this article, the author presents some common areas for the categories of power and security. Diagnosis of the security environment of a political unit should include both A qualitative and quantitative approach to th...
The essence and the environment of the national security control system of the Republic of Poland.
---------------
Psychological operations after the Second World War.
This paper has two purposes. From the personal side, the topic was chosen because I am interested in the history of psychological operations. To benefit the reader, I address psychological operations in selected military...
U.S. Grand Strategy Towards Russia 2001-2017
U.S. foreign policy towards Russia is of the utmost importance for the national security of the countries on the NATO eastern flank. Grand strategies are among the analytical concepts for classification and analysis of U...
“Sweat is invisible in the rain”: Civilian Joint Task Force and counter-insurgency in Borno State, Nigeria
Political, ethnic and religious conflict has given rise to insurgency groups employing a variety of strategies worldwide. In Nigeria, civilians in strife-torn Borno State have formed a number of counter-insurgency (COIN)...