The Opportunities for a National Cyber Strategy and Social Media in the Rhizome Networks

Author(s):  
Aki-Mauri Huhtinen ◽  
Tommi Kangasmaa ◽  
Arto Hirvelä

Securing society is a central task of the state. In the present day as well as in the future, knowledge and information are ever more closely tied to electronic data transfer. Finland's published Cyber Security Strategy depicts how the government safeguards electronic data transfer, that is, information security against different threat and risk scenarios. Cyber Security Strategy was introduced 2013 and has provided guidance to all governmental actors how to implement security activities to be able to respond to increased security threats in networks. Visuality has increasing importance in strategic communications, not least because it is faster than the written word and globally distributed via social media. Relatedly, camera drones are becoming increasingly important tools in the security economy, especially when it comes to enhancing military capability through combat cameras. The main challenge facing society is that the cyber domain in general, and social media in particular, is moving out of the control of the nation-state.

Author(s):  
Aki-Mauri Huhtinen ◽  
Arto Hirvelä ◽  
Tommi Kangasmaa

Securing the society is a central task of the state. In the present day, as well as in the future, knowledge and information are evermore closely tied to electronic data transfer. Finland's newly published Cyber Security Strategy depicts how the government safeguards electronic data transfer, that is, information security against different threat and risk scenarios. Cyberspace has a human element and a technological element. It is a way to influence and affect society. It may be used to influence minds or to attack the physical world, for example by disrupting traffic control. But cyberspace cannot exist without people. The cyberspace offers the platform so called strategic communication. Strategic communication is a concept that unites the efforts of governmental organisations to influence people in support of national interests. Formal organisations and institutions are often seen as being opposed or resistant to change. Social Media and the cyber domain can offer many opportunities but also unknown threats and risks. In this paper we argue that securing an organisation is a living and continuously changing process. Deleuze and Guattari (1983) present the concept of a rhizome, meaning a dynamic weed formation which, opposed to the arboreal and hierarchical structure of the tree, involves spontaneous, unpredictable and distant connections between heterogeneous elements (Linstead & Thanem 2007, 1484) Strategic Communication is the focus of a heated discussion in the military field: How can militaries be credible and uphold the high standards of democracy within the asymmetric and complex battlefield? To be credible one must act according to what is said. The challenge is that the scene is global in the information age. The act, the actor, the scene, the purpose – all are exposed to a global audience through cyberspace on a very short notice. The most effective way of showing the scene and actors is an audiovisual product. Examples of this come from all conflict zones. Militaries are establishing Youtube channels and supplying material from intense fighting and frontline action. The solution for supporting the organisation's own arguments has been the Combat Camera capability, in other words media-trained soldiers who are where the main effort is happening. Within the spirit of strategic communication, the cyber strategy itself is one way to operationalise cyber security by announcing measures to be taken against cyber attacks. In this article the authors reflect on the Finnish Cyber Strategy and Strategic Communications from a phenomenological perspective.


2014 ◽  
Vol 4 (2) ◽  
pp. 23-34
Author(s):  
Aki-Mauri Huhtinen ◽  
Arto Hirvelä ◽  
Tommi Kangasmaa

Securing the society is a central task of the state. In the present day, as well as in the future, knowledge and information are evermore closely tied to electronic data transfer. Finland's newly published Cyber Security Strategy depicts how the government safeguards electronic data transfer, that is, information security against different threat and risk scenarios. Cyberspace has a human element and a technological element. It is a way to influence and affect society. It may be used to influence minds or to attack the physical world, for example by disrupting traffic control. But cyberspace cannot exist without people. The cyberspace offers the platform so called strategic communication. Strategic communication is a concept that unites the efforts of governmental organisations to influence people in support of national interests. Formal organisations and institutions are often seen as being opposed or resistant to change. Social Media and the cyber domain can offer many opportunities but also unknown threats and risks. In this paper we argue that securing an organisation is a living and continuously changing process. Deleuze and Guattari (1983) present the concept of a rhizome, meaning a dynamic weed formation which, opposed to the arboreal and hierarchical structure of the tree, involves spontaneous, unpredictable and distant connections between heterogeneous elements (Linstead & Thanem 2007, 1484) Strategic Communication is the focus of a heated discussion in the military field: How can militaries be credible and uphold the high standards of democracy within the asymmetric and complex battlefield? To be credible one must act according to what is said. The challenge is that the scene is global in the information age. The act, the actor, the scene, the purpose – all are exposed to a global audience through cyberspace on a very short notice. The most effective way of showing the scene and actors is an audiovisual product. Examples of this come from all conflict zones. Militaries are establishing Youtube channels and supplying material from intense fighting and frontline action. The solution for supporting the organisation's own arguments has been the Combat Camera capability, in other words media-trained soldiers who are where the main effort is happening. Within the spirit of strategic communication, the cyber strategy itself is one way to operationalise cyber security by announcing measures to be taken against cyber attacks. In this article the authors reflect on the Finnish Cyber Strategy and Strategic Communications from a phenomenological perspective.


2021 ◽  
Vol 21 (2) ◽  
pp. 171-184
Author(s):  
Muawwan Muawwan

Abstract   The escalation of cyber threats in Singapore has prompted the country to intensify its cyberspace security protection. Singapore then implemented numerous strategies by collaborating across agencies and actors to obtain a protective cyberspace security system. This research aimed at figuring out Singapore Cyber Security Strategy (SCSS) documents comprehensively throughout textual analysis based on qualitative approach of an emerging-dominant elements in documents such as actor, instrument, politic, economy, research, and collaboration which were cooperated within actors. The author also fulfilled this analysis using qualitative approach to measure the data relation and the big picture of SCSS documents. Finally, the author found that Singapore’s strategy in applications and infrasctructure aspects, the government intervened them intensively. Singapore, one of the highest technological expertise countries in Southeast Asia, was fuflnerable getting the threats or attacks. So, this country was regulating an excellent cyber system and infrastructure to proctect their cyber management system secure. Meanwhile, Singapore’s policy in core aspects was a transfer due to the fact that Singapore was multi-ethnical and multi-culturalism country. Thus, Singapore’s strategy for ideological aspects was not regulated significantly in SCSS documents.   Keywords: Cyber Security Strategy, Data Relation, Sovereignty   Abstrak   Eskalasi ancaman terhadap ruang siber yang terjadi di Singapura telah mendorong negara tersebut untuk meningkatkan proteksi keamanan ruang sibernya. Singapura kemudian menerapkan berbagai strategi dengan cara menjalin kerjasama lintas instansi dan aktor untuk memperoleh sistem keamanan ruang siber yang lebih protektif. Tulisan ini bermaksud untuk memahami dokumen Singapore Cyber Security Strategy (SCSS) secara komprehensif dengan melakukan analisis kontekstual berdasarkan pendekatan kualitatif terhadap sejumlah unsur yang dominan muncul di dalam dokumen seperti aktor, instrument, politik, ekonomi, penelitian, dan kolaborasi yang dibangun di antara para aktor. Penulis juga melengkapi analisis ini dengan pendekatan kuantitatif untuk mengukur relasi data dan kecenderungan yang tergambar dari dokumen SCSS tersebut. Hasilnya, penulis menemukan bahwa pada level strategi di sektor application dan infrastruktur, pemerintah Singapura memiliki intervensi penuh dalam mengatur seluruh aktivitas di kedua aspek tersebut. Sebagai salah satu negara yang cukup signifikan di dalam pengelolaan teknologinya di kawasan Asia Tenggara, maka Singapura secara eksklusif berupaya membangun sistem dan infrastruktur siber yang mumpuni untuk melindungi tata kelola ruang siber mereka dari berbagai ancaman. Berbeda pada aspek core yang bersifat lebih terbuka (transfer) lantaran banyak dipengaruhi oleh multietnis dan multikulturalisme. Sehingga proteksi terhadap hal-hal yang bersifat ideologis tidak banyak diatur di dalam dokumen SCSS.   Kata kunci: Kedaulatan, Relasi Data, Strategi Keamanan Siber


2021 ◽  
Vol 21 (1) ◽  
pp. 69-84
Author(s):  
Putri Bilqis Oktaviani ◽  
Anggraeni Silvia

This research discusses the analysis of security strategy policies made by the Malaysian government in the protection and development of Malaysian cyberspace. This research will explain in detail the strategy of developing challenges as well as the aspects that support the Malaysian cyber space to be saved by the Malaysian cyber space. This research will further discuss the Malaysian security strategy through the official document of the Malaysian security strategy which will later be analyzed through the MAXQDA and GEPHI applications in order to classify the various categories that support it. This research will use the security concept published by Hao Yeli in Three - Perspective Theory of Cyber ​​Sovereignty to classify ideas and data. This research finds that the security of the Malaysian system needs to be developed from both capacity and capability so that the government needs to work together with various related parties   Keywords: Cyber Security, Cybersecurity Challenges, Soveignty   Abstrak   Penelitian ini membahas tentang analisis kebijakan strategi keamanan siber yang dibuat oleh pemerintah Malaysia dalam perlindungan dan pengembangan keamanan ruang siber Malaysia. Penelitian ini akan menjelaskan secara details strategi, tantangan serta aspek – aspek yang mendukung pengembangan ruang siber Malaysia guna mengamankan ruang siber Malaysia. Penelitian ini akan membahas lebih jauh strategi keamanan Malaysia melalui dokumen resmi strategi keamanan siber Malaysia yang nantinya akan di bedah melalui aplikasi MAXQDA dan GEPHI guna mengklasifikasikan berbagai kategori yang mendukung. Penelitian ini akan menggunakan konsep keamanan yang dipublikasikan oleh Hao Yeli dalam A Three – Perspective Theory of Cyber Sovereignty guna mengkasifikasikan gagasan dan data dengan menggunakan metode penelitian kuantitatif. Penelitian ini menemukan bahwa keamanan siber Malaysia perlu dikembangkan baik dari kapasitas maupun kapabilitas sehingga pemerintah Malasyaia perlu bekerjasama dengan berbagai pihak yang terkait.   Kata kunci: Cyber Security, Tantangan Keamanan Cyber, Kedaulatan


2017 ◽  
Vol 3 (1) ◽  
pp. 87-95
Author(s):  
Nikola Protrka ◽  
Kristijan Marić ◽  
Mihael Plećaš

Abstract The development of the information and communication technology (ICT), regardless of its many advantages, unfortunately has its disadvantage - the abuse of the cyberworld. The global character of cyberspace is specific in terms of national legislation and its view of specificities. Some countries adopted the recommendation of the Convention on Cybercrime of the Council of Europe (Official Gazette NN-MU 9/02, 4/04) and amended their national legislation, whereas others kept implementing their criminal law solutions, which are outdated and cannot reach the level of this type of criminal offences. Consequently, governments are inclined to cooperate and exchange information about this type of crime due to the fact that the criminal offender may be anywhere, and the offence itself can take place at a great distance from the offender. In September 2015, the government of the Republic of Croatia adopted the National Cyber Security Strategy and the Action Plan for the Implementation of the National Cyber Security Strategy, the first allencompassing strategy of the Republic of Croatia on cyber security. The paper also focuses on the role of the Police College in the Action Plan for the Implementation of the National Cyber Security Strategy.


2020 ◽  
Vol 15 (2) ◽  
Author(s):  
Alih Aji Nugroho

The world is entering a new phase of the digital era, including Indonesia. The unification of the real world and cyberspace is a sign, where the conditions of both can influence each other (Hyung Jun, 2018). The patterns of behavior and public relations in the virtual universe gave rise to new social interactions called the Digital Society. One part of Global Megatrends has also influenced public policy in Indonesia in recent years. Critical mass previously carried out conventionally is now a virtual movement. War of hashtags, petitions, and digital community comments are new tools and strategies for influencing policy. This paper attempts to analyze the extent of digital society's influence on public policy in Indonesia. As well as what public policy models are needed. Methodology used in this analysis is qualitative descriptive. Data collection through literature studies by critical mass digital recognition in Indonesia and trying to find a relationship between political participation through social media and democracy. By processing the pro and contra views regarding the selection of social media as a level of participation, this paper finds that there are overlapping interests that have the potential to distort the articulation of freedom of opinion and participation. - which is characteristic of a democratic state. The result is the rapid development of digital society which greatly influences the public policy process. Digital society imagines being able to participate formally in influencing policy in Indonesia. The democracy that developed in the digital society is cyberdemocracy. Public space in the digital world must be guaranteed security and its impact on the policies that will be determined. The recommendation given to the government is that a cyber data analyst is needed to oversee the issues that are developing in the digital world. Regulations related to the security of digital public spaces must be maximized. The government maximizes cooperation with related stakeholders.Keywords: Digital Society; Democracy; Public policy; Political Participation


Mousaion ◽  
2019 ◽  
Vol 37 (1) ◽  
Author(s):  
Tshepho Lydia Mosweu

Social media as a communication tool has enabled governments around the world to interact with citizens for customer service, access to information and to direct community involvement needs. The trends around the world show recognition by governments that social media content may constitute records and should be managed accordingly. The literature shows that governments and organisations in other countries, particularly in Europe, have social media policies and strategies to guide the management of social media content, but there is less evidence among African countries. Thus the purpose of this paper is to examine the extent of usage of social media by the Botswana government in order to determine the necessity for the governance of liquid communication. Liquid communication here refers to the type of communication that goes easily back and forth between participants involved through social media. The ARMA principle of availability requires that where there is information governance, an organisation shall maintain its information assets in a manner that ensures their timely, efficient and accurate retrieval. The study adopted a qualitative case study approach where data were collected through documentary reviews and interviews among purposively selected employees of the Botswana government. This study revealed that the Botswana government has been actively using social media platforms to interact with its citizens since 2011 for increased access, usage and awareness of services offered by the government. Nonetheless, the study revealed that the government had no official documentation on the use of social media, and policies and strategies that dealt with the governance of liquid communication. This study recommends the governance of liquid communication to ensure timely, efficient and accurate retrieval when needed for business purposes.


Author(s):  
Michael C. Dorf ◽  
Michael S. Chu

Lawyers played a key role in challenging the Trump administration’s Travel Ban on entry into the United States of nationals from various majority-Muslim nations. Responding to calls from nongovernmental organizations (NGOs), which were amplified by social media, lawyers responded to the Travel Ban’s chaotic rollout by providing assistance to foreign travelers at airports. Their efforts led to initial court victories, which in turn led the government to soften the Ban somewhat in two superseding executive actions. The lawyers’ work also contributed to the broader resistance to the Trump administration by dramatizing its bigotry, callousness, cruelty, and lawlessness. The efficacy of the lawyers’ resistance to the Travel Ban shows that, contrary to strong claims about the limits of court action, litigation can promote social change. General lessons about lawyer activism in ordinary times are difficult to draw, however, because of the extraordinary threat Trump poses to civil rights and the rule of law.


Sign in / Sign up

Export Citation Format

Share Document