Soft-power requirements in information-security management
- 作者: Astakhova L.V.1
-
隶属关系:
- South Ural State University (National Research University)
- 期: 卷 43, 编号 3 (2016)
- 页面: 162-165
- 栏目: Article
- URL: https://journals.rcsi.science/0147-6882/article/view/175088
- DOI: https://doi.org/10.3103/S0147688216030060
- ID: 175088
如何引用文章
详细
This article presents the requirements on using soft power in information-security management that are due to the inefficiency of soft power when applied to corporate employees as specific informationsecurity subjects. The substantiated requirements include the capital technological and the cognitive-communicative approach to soft power, priority use of narrative technologies in employee relations, and the need for developing the narrative expertise of security engineers in the process of training.
作者简介
L. Astakhova
South Ural State University (National Research University)
编辑信件的主要联系方式.
Email: lvastachova@mail.ru
俄罗斯联邦, Chelyabinsk
补充文件
