Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension
Objective: This study aims to clarify the components and indicators of cyber power within the defensive-security dimension. Methodology: The research is applied and developmental in terms of its objective, descriptive-case study in terms of its nature, and uses a mixed (qualitative and quantitative)...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
AJA Command and Staff University
2024-12-01
|
| Series: | علوم و فنون نظامی |
| Subjects: | |
| Online Access: | https://www.qjmst.ir/article_720082_261bd387ea244ed1af0310bdb98ea0c5.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849434623155634176 |
|---|---|
| author | Khodadad Halili Seyyed Alireza Motahari |
| author_facet | Khodadad Halili Seyyed Alireza Motahari |
| author_sort | Khodadad Halili |
| collection | DOAJ |
| description | Objective: This study aims to clarify the components and indicators of cyber power within the defensive-security dimension.
Methodology: The research is applied and developmental in terms of its objective, descriptive-case study in terms of its nature, and uses a mixed (qualitative and quantitative) approach for data analysis. The statistical population of this study consists of 50 experts and specialists in the field of cyberspace. For the statistical analysis of quantitative data, the data collected from a researcher-designed questionnaire were examined using Smart PLS software.
Findings: The results of the study led to the identification of four components within the defensive-security dimension of cyber power: the development of cyber defense and passive defense, strengthening the cybersecurity of critical and sensitive infrastructures, equipping with cyber technologies and weapons for deterrence, and organizing and structuring specialized cyber forces. Additionally, 41 indicators were identified.
Conclusion: Overall, the study showed that efforts to achieve indigenous knowledge, establish a cyber command and control center, enhance cybersecurity indicators, and acquire the necessary readiness to counter cyber threats in the defensive-security dimension are of significant importance. A thorough understanding and recognition of this issue by elites and policymakers will lead to the development of policies and plans for securing cyber resources, equipping with advanced technologies, and strengthening cyber power in this field. |
| format | Article |
| id | doaj-art-7373c1fb44a44acf8fc1144f7b0e8a75 |
| institution | Kabale University |
| issn | 2008-191X 2676-4520 |
| language | English |
| publishDate | 2024-12-01 |
| publisher | AJA Command and Staff University |
| record_format | Article |
| series | علوم و فنون نظامی |
| spelling | doaj-art-7373c1fb44a44acf8fc1144f7b0e8a752025-08-20T03:26:35ZengAJA Command and Staff Universityعلوم و فنون نظامی2008-191X2676-45202024-12-01206928131410.22034/qjmst.2024.2024589.2039720082Obtaining and ranking of components and indicators of cyber power in the defense and of security dimensionKhodadad Halili0Seyyed Alireza Motahari1Faculty member, School of Computer Engineering, Shahid Sattari University, Tehran, Iran.PhD student in Defense Management, AJA Command and Staff University, Tehran, Iran.Objective: This study aims to clarify the components and indicators of cyber power within the defensive-security dimension. Methodology: The research is applied and developmental in terms of its objective, descriptive-case study in terms of its nature, and uses a mixed (qualitative and quantitative) approach for data analysis. The statistical population of this study consists of 50 experts and specialists in the field of cyberspace. For the statistical analysis of quantitative data, the data collected from a researcher-designed questionnaire were examined using Smart PLS software. Findings: The results of the study led to the identification of four components within the defensive-security dimension of cyber power: the development of cyber defense and passive defense, strengthening the cybersecurity of critical and sensitive infrastructures, equipping with cyber technologies and weapons for deterrence, and organizing and structuring specialized cyber forces. Additionally, 41 indicators were identified. Conclusion: Overall, the study showed that efforts to achieve indigenous knowledge, establish a cyber command and control center, enhance cybersecurity indicators, and acquire the necessary readiness to counter cyber threats in the defensive-security dimension are of significant importance. A thorough understanding and recognition of this issue by elites and policymakers will lead to the development of policies and plans for securing cyber resources, equipping with advanced technologies, and strengthening cyber power in this field.https://www.qjmst.ir/article_720082_261bd387ea244ed1af0310bdb98ea0c5.pdfcyber powernational powercyber defense |
| spellingShingle | Khodadad Halili Seyyed Alireza Motahari Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension علوم و فنون نظامی cyber power national power cyber defense |
| title | Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension |
| title_full | Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension |
| title_fullStr | Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension |
| title_full_unstemmed | Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension |
| title_short | Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension |
| title_sort | obtaining and ranking of components and indicators of cyber power in the defense and of security dimension |
| topic | cyber power national power cyber defense |
| url | https://www.qjmst.ir/article_720082_261bd387ea244ed1af0310bdb98ea0c5.pdf |
| work_keys_str_mv | AT khodadadhalili obtainingandrankingofcomponentsandindicatorsofcyberpowerinthedefenseandofsecuritydimension AT seyyedalirezamotahari obtainingandrankingofcomponentsandindicatorsofcyberpowerinthedefenseandofsecuritydimension |