Abstract
In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing operating environment.” We will construct an information structure architecture model to support the strategy implementation process. The purpose is to provide a platform to take account of the relevant selection of various functions and their junctions to evaluate the balance of strategy implementation compared to the defined operating environment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Agile Data (2017) Agile enterprise architecture. http://www.agiledata.org/essays/enterpriseArchitecture.html, Accessed 29 Jan 2017
Atkinson S, Moffat J (2005) The agile organization, from information networks to complex effects and agility, Information age transformation series. DoD Command and Control Research Program
Ball P (2004) Critical mass: how one thing leads to another. Arrow Books, London, UK, Sydney, Australia, Auckland, New Zeland
Checkland P, Scholes J (2000) Soft systems methodology in action. Wiley, Chichester, New York, Weuinheim, Brisbane, Singapore, Toronto
The Federation of Enterprise Architecture Professional Organizations (2017) A common perspective on enterprise architecture. http://feapo.org/wp-content/uploads/2013/11/Common-Perspectives-on-Enterprise-Architecture-v15.pdf. Accessed 29 Jan 2017
Hatch M, Cunliffe A (2006) Organization theory, modern, symbolic, and postmodern perspectives, 2nd edn. Oxford University Press
Habermas J (1984) The theory of communicative action, volume 1: reason and the rationalization of society. Beacon Press, Boston, USA
Habermas J (1989) The theory of communicative action, volume 2: lifeworld and system: a critique of functionalist reason. Beacon Press, Boston, MA, USA
Hofstede G (1984) Culture’s consequences: international differences in work-related values. Sage Publications Inc, USA
Holland JH (1996a) Hidden order: how adaptation builds complexity. Perseus Books, USA, Canada
Holland JH (1996b) Hidden order: how adaptation builds complexity. Perseus Books MA, Cambridge
Kaplan R, Norton D (2006) Alignment: using the balanced scorecard to create corporate synergies. Harvard Business School Publishing
Kaplan R, Norton D (2008) The execution premium, linking strategy to operations for competitive advantage. Harvard Business School Publishing, Boston
Krippendorff K (2013) Content analysis: an introduction to its methodology, 3rd edn. Sage, Newbury Park, CA, USA
Kuusisto R (2004) Aspects on availability. Edita Prima Oy, Helsinki, Finland
Kuusisto R (2008) Analyzing the command and control maturity levels of collaborating organizations. In: Proceedings of 13th international command and control research and technology symposium (13th ICCRTS), Bellevue, WA, USA, 17–19 June 2008
Kuusisto R, Kuusisto T (2009) Information Security Culture as a Social System. In: Gupta M, Sharman R (eds) Social and human elements of information security. Information Science Reference, IGI Global, Hershey, New York, pp 77–97
Kuusisto R (2012) Information sharing framework for agile command and control in complex inter-domain collaboration environment. In: Proceedings of the 17th international command & control research & technology symposium, 19 pp, VA, USA, 19–21 June 2012
Kuusisto R, Kuusisto T (2013) Strategic communication for cyber-security leadership. J Inform Warf 12(3):41–48
Parsons T (1951) The social system. The Free Press of Glencoe, Collier-MacMillan Limited, London, UK
The Security Committee (2017) The implementation programme of the Cyber Security Strategy 2017–202. http://www.turvallisuuskomitea.fi
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Kuusisto, R., Kuusisto, T. (2018). Cyber Security Strategy Implementation Architecture in a Value System. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Power and Technology. Intelligent Systems, Control and Automation: Science and Engineering, vol 93. Springer, Cham. https://doi.org/10.1007/978-3-319-75307-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-75307-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75306-5
Online ISBN: 978-3-319-75307-2
eBook Packages: EngineeringEngineering (R0)