Skip to main content

The Cyber-Ecosystem Enabling Resilience Through the Comprehensive Approach

  • Chapter
  • First Online:
  • 2138 Accesses

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

According to Helbing (Nature 497:51–59, 2013) [14] we are increasingly living in a world which creates ‘hyper-risks’ because of numerous networks and interdependencies. In this ‘hyper-connected world’ with interconnected social/technical/political/economic domains, shocks to regional, national and global systems can have significant security implications. This ‘hyper-connectivity’ characterized by the global pervasiveness of internet and cyber usage has also provided a conduit for threats to national security as described in the United Nations Office on Drugs and Crime (UNODC in Comprehensive study on cybercrime, 2013) [34]. Robinson et al. (Cyber-security threat characterization A rapid comparative analysis, 2013: 5) [28] of RAND defines Cyber threats as ‘…those actors or adversaries exhibiting the strategic behaviour and capability to exploit cyberspace in order to harm life, information, operations, the environment and/or property’. The pervasiveness and impact of cyber-security threats has made it a top tier security issue in national risk assessments in the last five years (Robinson et al. in Cyber-security threat characterization A rapid comparative analysis, 2013: viii) [28]. Resilience thereby becomes a key property in the face of such threats. Resilience does not reside purely in cyber security patches and technical solutions but requires a more comprehensive and collaborative approach that embraces the social, organizational, economic, political and technical domains.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Barabasi A-L (2003) Linked. Plume, Penguin Group, New York

    Google Scholar 

  2. CNN (2014) Heartbleed bug affects gadgets everywhere. http://money.cnn.com/2014/04/11/technology/security/heartbleed-gear/

  3. Coakes E (2003) Socio-technical thinking—an holistic viewpoint. In: Clarke S, Coakes E, Hunter MG, Wenn A (eds) Socio-technical and human cognition elements of information systems. Information Science Publishing, Hershey, pp 1–4

    Google Scholar 

  4. Collier ZA, Linkov I, Lambert JH (2013) Four domains of cybersecurity: a risk-based systems approach to cyber decisions. Environ Syst Decisions 33:469–470

    Article  Google Scholar 

  5. Comfort LK (2006) Cities at risk: hurricane Katrina and the drowning of New Orleans. Urban Aff Rev 41:501–516

    Article  Google Scholar 

  6. Corman SR (2006) Using activity focus networks to pressure terrorist organizations. Comput Math Organ Theor 12:35–49

    Article  Google Scholar 

  7. De Coning C, Friis K (2008) Introduction: how to conceptualise ‘comprehensive approach’? In: Friis K, Jarmyr P (eds) Comprehensive approach challenges and opportunities in complex crisis management. NUPI report

    Google Scholar 

  8. De Coning C, Lurås N, Schia NN, Ulriksen S (2009) Norway’s whole-of-government approach and its engagement with Afghanistan. NUPI report security in practice-8. Available at http://www.oecd.org/development/evaluation/dcdndep/47107380.pdf. Accessed 1 Nov 2013

  9. Deibert R (2012) Distributed cyber security as cyber strategy: outlining a comprehensive approach for Canada in cyberspace. Canadian Defence and Foreign Affairs Institute. https://citizenlab.org/wp-content/uploads/2012/08/CDFAI-Distributed-Security-as-Cyber-Strategy_-outlining-a-comprehensive-approach-for-Canada-in-Cyber.pdf

  10. Edson R (2008) Systems thinking. Applied: A primer. ASysT Institute. http://www.anser.org/docs/systems_thinking_applied.pdf

  11. EU (2013) Joint communication to the European parliament and the council: the EU’s comprehensive approach to external conflict and crises. Brussels, 11 Dec 2013 Join (2013) 30 final. http://www.eeas.europa.eu/statements/docs/2013/131211_03_en.pdf

  12. Flood RL (1999) Rethinking the fifth discipline: learning within the unknowable. Routledge Publishing, London

    Google Scholar 

  13. Guardian (2014) Cyber-attack on Pennsylvania company possibly linked to target data breach, 7 Feb 2014. http://www.theguardian.com/business/2014/feb/07/target-data-breach-pennsylvania-cyberattack

  14. Helbing D (2013) Globally networked risks and how to respond. Nature 497:51–59

    Article  CAS  Google Scholar 

  15. Kelic A, Collier ZA, Brown C, Beyeler WE, Outkin AV, Vargas VN, Ehlen MA, Judson C, Zaidi A, Leung B, Linkov I (2013) Decision framework for evaluating the macroeconomic risks and policy impacts of cyber attacks. Environ Syst Decisions 33:544–560

    Article  Google Scholar 

  16. Koslowski TG, Longstaff PH (2014) Resilience Undefined: A framework for interdisciplinary communication and application to real-world problems. In Masys AJ (ed) Disaster management- enabling resilience. Springer Publishing

    Google Scholar 

  17. Kraemer-Mbula E, Tang P, Rush H (2013) The cybercrime ecosystem: online innovation in the shadows? Technol Forecast Soc Change 80:541–555

    Article  Google Scholar 

  18. Linkov I, Eisenberg DA, Plourde K, Seager TP, Allen J, Kott A (2013) Resilience metrics for cyber systems. Environ Syst Decisions 33:471–476

    Article  Google Scholar 

  19. Major C, Schondorf E (2011) Comprehensive approaches to crisis management. SWP comments, 23 Sept 2011

    Google Scholar 

  20. Masys AJ (2012) The emergent nature of risk as a product of ‘heterogeneous engineering’: a relational analysis of oil and gas industry safety culture. In: Bennett S (ed) Innovative thinking in risk, crisis, and disaster management. Gower Publishing Limited, England, pp 59–85

    Google Scholar 

  21. Masys AJ (2012) Black swans to Grey swans—revealing the uncertainty. Int J Disaster Prev Manag 21(3):320–335

    Article  Google Scholar 

  22. Masys AJ (2014) Critical infrastructure and vulnerability: a relational analysis through actor network theory. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer Publishing, Berlin

    Chapter  Google Scholar 

  23. Masys AJ (2014) Dealing with complexity: thinking about networks and the comprehensive approach. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer Publishing, Berlin

    Chapter  Google Scholar 

  24. Menon S, Siew TG (2012) Key challenges in tackling economic and cyber crimes Creating a multilateral platform for international co-operation. J Money Laundering Control 15(3):243–256

    Article  Google Scholar 

  25. NATO (2012) A comprehensive approach to crisis management. Available at http://www.nato.int/cps/en/natolive/topics_51633.htm. Accessed 14 Nov 2013

  26. Ottino J (2003) Complex systems. AIChE J 49(2):292–299

    Article  CAS  Google Scholar 

  27. Pawlak P, Wendling C (2013) Trends in cyberspace: can governments keep up? Environ Syst Decisions 33:536–543

    Article  Google Scholar 

  28. Robinson N, Gribbon L, Horvath V, Robertson K (2013) Cyber-security threat characterization A rapid comparative analysis. RAND report. http://www.rand.org/content/dam/rand/pubs/research_reports/RR200/RR235/RAND_RR235.pdf

  29. Rudner M (2013) Cyber-threats to critical national infrastructure: an intelligence challenge. Int J Intell Counter Intell 26:453–481

    Article  Google Scholar 

  30. Senge P (1990) The fifth discipline: the art and practice of the learning organization. Doubleday Currency, New York

    Google Scholar 

  31. Senge P (2006) The fifth discipline: the art and practice of the learning organization. Doubleday Currency, New York

    Google Scholar 

  32. Sterman JD (2000) Business dynamics: systems thinking and modeling for a complex world. McGraw-Hill Publishing, Boston

    Google Scholar 

  33. UK Cyber Security Strategy (2012) https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf

  34. UNODC (2013) Comprehensive study on cybercrime draft, Feb 2013 http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf

  35. Vespignani A (2009) Predicting the behavior of techno-social systems. Science 325:425–428

    Article  CAS  Google Scholar 

  36. Weick KE, Sutcliffe KM (2007) Managing the unexpected: resilient performance in an age of uncertainty, 2nd edn. Wiley, San Francisco, CA

    Google Scholar 

  37. Williams AP (2010) Implications of operationalizing a comprehensive approach: defining what interagency interoperability really means. Int C2 J 4(1):1–30

    Google Scholar 

  38. World Economic Forum (2014) Risk and responsibility in a hyper-connected world. http://www3.weforum.org/docs/WEF_RiskResponsibility_HyperconnectedWorld_Report_2014.pdf

  39. Worldwide Threat Assessment of the US Intelligence Community (2013) Statement for the record—senate select committee on intelligence James R. Clapper. Available at www.intelligence.senate.gov/130312/clapper.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anthony J. Masys .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Masys, A.J. (2015). The Cyber-Ecosystem Enabling Resilience Through the Comprehensive Approach. In: Masys, A. (eds) Disaster Management: Enabling Resilience. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-08819-8_8

Download citation

Publish with us

Policies and ethics