Skip to main content

Cyber Security Strategy Implementation Architecture in a Value System

  • Chapter
  • First Online:
  • 1974 Accesses

Part of the book series: Intelligent Systems, Control and Automation: Science and Engineering ((ISCA,volume 93))

Abstract

In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing operating environment.” We will construct an information structure architecture model to support the strategy implementation process. The purpose is to provide a platform to take account of the relevant selection of various functions and their junctions to evaluate the balance of strategy implementation compared to the defined operating environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Agile Data (2017) Agile enterprise architecture. http://www.agiledata.org/essays/enterpriseArchitecture.html, Accessed 29 Jan 2017

  • Atkinson S, Moffat J (2005) The agile organization, from information networks to complex effects and agility, Information age transformation series. DoD Command and Control Research Program

    Google Scholar 

  • Ball P (2004) Critical mass: how one thing leads to another. Arrow Books, London, UK, Sydney, Australia, Auckland, New Zeland

    Google Scholar 

  • Checkland P, Scholes J (2000) Soft systems methodology in action. Wiley, Chichester, New York, Weuinheim, Brisbane, Singapore, Toronto

    Google Scholar 

  • The Federation of Enterprise Architecture Professional Organizations (2017) A common perspective on enterprise architecture. http://feapo.org/wp-content/uploads/2013/11/Common-Perspectives-on-Enterprise-Architecture-v15.pdf. Accessed 29 Jan 2017

  • Hatch M, Cunliffe A (2006) Organization theory, modern, symbolic, and postmodern perspectives, 2nd edn. Oxford University Press

    Google Scholar 

  • Habermas J (1984) The theory of communicative action, volume 1: reason and the rationalization of society. Beacon Press, Boston, USA

    Google Scholar 

  • Habermas J (1989) The theory of communicative action, volume 2: lifeworld and system: a critique of functionalist reason. Beacon Press, Boston, MA, USA

    Google Scholar 

  • Hofstede G (1984) Culture’s consequences: international differences in work-related values. Sage Publications Inc, USA

    Google Scholar 

  • Holland JH (1996a) Hidden order: how adaptation builds complexity. Perseus Books, USA, Canada

    Google Scholar 

  • Holland JH (1996b) Hidden order: how adaptation builds complexity. Perseus Books MA, Cambridge

    Google Scholar 

  • Kaplan R, Norton D (2006) Alignment: using the balanced scorecard to create corporate synergies. Harvard Business School Publishing

    Google Scholar 

  • Kaplan R, Norton D (2008) The execution premium, linking strategy to operations for competitive advantage. Harvard Business School Publishing, Boston

    Google Scholar 

  • Krippendorff K (2013) Content analysis: an introduction to its methodology, 3rd edn. Sage, Newbury Park, CA, USA

    Google Scholar 

  • Kuusisto R (2004) Aspects on availability. Edita Prima Oy, Helsinki, Finland

    Google Scholar 

  • Kuusisto R (2008) Analyzing the command and control maturity levels of collaborating organizations. In: Proceedings of 13th international command and control research and technology symposium (13th ICCRTS), Bellevue, WA, USA, 17–19 June 2008

    Google Scholar 

  • Kuusisto R, Kuusisto T (2009) Information Security Culture as a Social System. In: Gupta M, Sharman R (eds) Social and human elements of information security. Information Science Reference, IGI Global, Hershey, New York, pp 77–97

    Chapter  Google Scholar 

  • Kuusisto R (2012) Information sharing framework for agile command and control in complex inter-domain collaboration environment. In: Proceedings of the 17th international command & control research & technology symposium, 19 pp, VA, USA, 19–21 June 2012

    Google Scholar 

  • Kuusisto R, Kuusisto T (2013) Strategic communication for cyber-security leadership. J Inform Warf 12(3):41–48

    Google Scholar 

  • Parsons T (1951) The social system. The Free Press of Glencoe, Collier-MacMillan Limited, London, UK

    Google Scholar 

  • The Security Committee (2017) The implementation programme of the Cyber Security Strategy 2017–202. http://www.turvallisuuskomitea.fi

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rauno Kuusisto .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kuusisto, R., Kuusisto, T. (2018). Cyber Security Strategy Implementation Architecture in a Value System. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Power and Technology. Intelligent Systems, Control and Automation: Science and Engineering, vol 93. Springer, Cham. https://doi.org/10.1007/978-3-319-75307-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75307-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75306-5

  • Online ISBN: 978-3-319-75307-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics