Soft-power requirements in information-security management


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

This article presents the requirements on using soft power in information-security management that are due to the inefficiency of soft power when applied to corporate employees as specific informationsecurity subjects. The substantiated requirements include the capital technological and the cognitive-communicative approach to soft power, priority use of narrative technologies in employee relations, and the need for developing the narrative expertise of security engineers in the process of training.

About the authors

L. V. Astakhova

South Ural State University (National Research University)

Author for correspondence.
Email: lvastachova@mail.ru
Russian Federation, Chelyabinsk

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2016 Allerton Press, Inc.