Soft-power requirements in information-security management
This article presents the requirements on using soft power in information-security management that are due to the inefficiency of soft power when applied to corporate employees as specific informationsecurity subjects. The substantiated requirements include the capital technological and the cognitiv...
Saved in:
Published in | Scientific and technical information processing Vol. 43; no. 3; pp. 162 - 165 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
New York
Allerton Press
01.07.2016
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
ISSN | 0147-6882 1934-8118 |
DOI | 10.3103/S0147688216030060 |
Cover
Loading…
Summary: | This article presents the requirements on using soft power in information-security management that are due to the inefficiency of soft power when applied to corporate employees as specific informationsecurity subjects. The substantiated requirements include the capital technological and the cognitive-communicative approach to soft power, priority use of narrative technologies in employee relations, and the need for developing the narrative expertise of security engineers in the process of training. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ISSN: | 0147-6882 1934-8118 |
DOI: | 10.3103/S0147688216030060 |