Soft-power requirements in information-security management
- Authors: Astakhova L.V.1
- 
							Affiliations: 
							- South Ural State University (National Research University)
 
- Issue: Vol 43, No 3 (2016)
- Pages: 162-165
- Section: Article
- URL: https://journals.rcsi.science/0147-6882/article/view/175088
- DOI: https://doi.org/10.3103/S0147688216030060
- ID: 175088
Cite item
Abstract
This article presents the requirements on using soft power in information-security management that are due to the inefficiency of soft power when applied to corporate employees as specific informationsecurity subjects. The substantiated requirements include the capital technological and the cognitive-communicative approach to soft power, priority use of narrative technologies in employee relations, and the need for developing the narrative expertise of security engineers in the process of training.
About the authors
L. V. Astakhova
South Ural State University (National Research University)
							Author for correspondence.
							Email: lvastachova@mail.ru
				                					                																			                												                	Russian Federation, 							Chelyabinsk						
Supplementary files
 
				
			 
					 
						 
						 
						 
						 
				 
  
  
  
  
  Email this article
			Email this article  Open Access
		                                Open Access Access granted
						Access granted Subscription Access
		                                		                                        Subscription Access
		                                					