Soft-power requirements in information-security management

This article presents the requirements on using soft power in information-security management that are due to the inefficiency of soft power when applied to corporate employees as specific informationsecurity subjects. The substantiated requirements include the capital technological and the cognitiv...

Full description

Saved in:
Bibliographic Details
Published inScientific and technical information processing Vol. 43; no. 3; pp. 162 - 165
Main Author Astakhova, L. V.
Format Journal Article
LanguageEnglish
Published New York Allerton Press 01.07.2016
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0147-6882
1934-8118
DOI10.3103/S0147688216030060

Cover

Loading…
More Information
Summary:This article presents the requirements on using soft power in information-security management that are due to the inefficiency of soft power when applied to corporate employees as specific informationsecurity subjects. The substantiated requirements include the capital technological and the cognitive-communicative approach to soft power, priority use of narrative technologies in employee relations, and the need for developing the narrative expertise of security engineers in the process of training.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:0147-6882
1934-8118
DOI:10.3103/S0147688216030060