Soft-power requirements in information-security management


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

This article presents the requirements on using soft power in information-security management that are due to the inefficiency of soft power when applied to corporate employees as specific informationsecurity subjects. The substantiated requirements include the capital technological and the cognitive-communicative approach to soft power, priority use of narrative technologies in employee relations, and the need for developing the narrative expertise of security engineers in the process of training.

作者简介

L. Astakhova

South Ural State University (National Research University)

编辑信件的主要联系方式.
Email: lvastachova@mail.ru
俄罗斯联邦, Chelyabinsk

补充文件

附件文件
动作
1. JATS XML

版权所有 © Allerton Press, Inc., 2016