Soft-power requirements in information-security management
- Authors: Astakhova L.V.1
-
Affiliations:
- South Ural State University (National Research University)
- Issue: Vol 43, No 3 (2016)
- Pages: 162-165
- Section: Article
- URL: https://journals.rcsi.science/0147-6882/article/view/175088
- DOI: https://doi.org/10.3103/S0147688216030060
- ID: 175088
Cite item
Abstract
This article presents the requirements on using soft power in information-security management that are due to the inefficiency of soft power when applied to corporate employees as specific informationsecurity subjects. The substantiated requirements include the capital technological and the cognitive-communicative approach to soft power, priority use of narrative technologies in employee relations, and the need for developing the narrative expertise of security engineers in the process of training.
About the authors
L. V. Astakhova
South Ural State University (National Research University)
Author for correspondence.
Email: lvastachova@mail.ru
Russian Federation, Chelyabinsk
Supplementary files
