Abstract
According to Helbing (Nature 497:51–59, 2013) [14] we are increasingly living in a world which creates ‘hyper-risks’ because of numerous networks and interdependencies. In this ‘hyper-connected world’ with interconnected social/technical/political/economic domains, shocks to regional, national and global systems can have significant security implications. This ‘hyper-connectivity’ characterized by the global pervasiveness of internet and cyber usage has also provided a conduit for threats to national security as described in the United Nations Office on Drugs and Crime (UNODC in Comprehensive study on cybercrime, 2013) [34]. Robinson et al. (Cyber-security threat characterization A rapid comparative analysis, 2013: 5) [28] of RAND defines Cyber threats as ‘…those actors or adversaries exhibiting the strategic behaviour and capability to exploit cyberspace in order to harm life, information, operations, the environment and/or property’. The pervasiveness and impact of cyber-security threats has made it a top tier security issue in national risk assessments in the last five years (Robinson et al. in Cyber-security threat characterization A rapid comparative analysis, 2013: viii) [28]. Resilience thereby becomes a key property in the face of such threats. Resilience does not reside purely in cyber security patches and technical solutions but requires a more comprehensive and collaborative approach that embraces the social, organizational, economic, political and technical domains.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Barabasi A-L (2003) Linked. Plume, Penguin Group, New York
CNN (2014) Heartbleed bug affects gadgets everywhere. http://money.cnn.com/2014/04/11/technology/security/heartbleed-gear/
Coakes E (2003) Socio-technical thinking—an holistic viewpoint. In: Clarke S, Coakes E, Hunter MG, Wenn A (eds) Socio-technical and human cognition elements of information systems. Information Science Publishing, Hershey, pp 1–4
Collier ZA, Linkov I, Lambert JH (2013) Four domains of cybersecurity: a risk-based systems approach to cyber decisions. Environ Syst Decisions 33:469–470
Comfort LK (2006) Cities at risk: hurricane Katrina and the drowning of New Orleans. Urban Aff Rev 41:501–516
Corman SR (2006) Using activity focus networks to pressure terrorist organizations. Comput Math Organ Theor 12:35–49
De Coning C, Friis K (2008) Introduction: how to conceptualise ‘comprehensive approach’? In: Friis K, Jarmyr P (eds) Comprehensive approach challenges and opportunities in complex crisis management. NUPI report
De Coning C, Lurås N, Schia NN, Ulriksen S (2009) Norway’s whole-of-government approach and its engagement with Afghanistan. NUPI report security in practice-8. Available at http://www.oecd.org/development/evaluation/dcdndep/47107380.pdf. Accessed 1 Nov 2013
Deibert R (2012) Distributed cyber security as cyber strategy: outlining a comprehensive approach for Canada in cyberspace. Canadian Defence and Foreign Affairs Institute. https://citizenlab.org/wp-content/uploads/2012/08/CDFAI-Distributed-Security-as-Cyber-Strategy_-outlining-a-comprehensive-approach-for-Canada-in-Cyber.pdf
Edson R (2008) Systems thinking. Applied: A primer. ASysT Institute. http://www.anser.org/docs/systems_thinking_applied.pdf
EU (2013) Joint communication to the European parliament and the council: the EU’s comprehensive approach to external conflict and crises. Brussels, 11 Dec 2013 Join (2013) 30 final. http://www.eeas.europa.eu/statements/docs/2013/131211_03_en.pdf
Flood RL (1999) Rethinking the fifth discipline: learning within the unknowable. Routledge Publishing, London
Guardian (2014) Cyber-attack on Pennsylvania company possibly linked to target data breach, 7 Feb 2014. http://www.theguardian.com/business/2014/feb/07/target-data-breach-pennsylvania-cyberattack
Helbing D (2013) Globally networked risks and how to respond. Nature 497:51–59
Kelic A, Collier ZA, Brown C, Beyeler WE, Outkin AV, Vargas VN, Ehlen MA, Judson C, Zaidi A, Leung B, Linkov I (2013) Decision framework for evaluating the macroeconomic risks and policy impacts of cyber attacks. Environ Syst Decisions 33:544–560
Koslowski TG, Longstaff PH (2014) Resilience Undefined: A framework for interdisciplinary communication and application to real-world problems. In Masys AJ (ed) Disaster management- enabling resilience. Springer Publishing
Kraemer-Mbula E, Tang P, Rush H (2013) The cybercrime ecosystem: online innovation in the shadows? Technol Forecast Soc Change 80:541–555
Linkov I, Eisenberg DA, Plourde K, Seager TP, Allen J, Kott A (2013) Resilience metrics for cyber systems. Environ Syst Decisions 33:471–476
Major C, Schondorf E (2011) Comprehensive approaches to crisis management. SWP comments, 23 Sept 2011
Masys AJ (2012) The emergent nature of risk as a product of ‘heterogeneous engineering’: a relational analysis of oil and gas industry safety culture. In: Bennett S (ed) Innovative thinking in risk, crisis, and disaster management. Gower Publishing Limited, England, pp 59–85
Masys AJ (2012) Black swans to Grey swans—revealing the uncertainty. Int J Disaster Prev Manag 21(3):320–335
Masys AJ (2014) Critical infrastructure and vulnerability: a relational analysis through actor network theory. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer Publishing, Berlin
Masys AJ (2014) Dealing with complexity: thinking about networks and the comprehensive approach. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer Publishing, Berlin
Menon S, Siew TG (2012) Key challenges in tackling economic and cyber crimes Creating a multilateral platform for international co-operation. J Money Laundering Control 15(3):243–256
NATO (2012) A comprehensive approach to crisis management. Available at http://www.nato.int/cps/en/natolive/topics_51633.htm. Accessed 14 Nov 2013
Ottino J (2003) Complex systems. AIChE J 49(2):292–299
Pawlak P, Wendling C (2013) Trends in cyberspace: can governments keep up? Environ Syst Decisions 33:536–543
Robinson N, Gribbon L, Horvath V, Robertson K (2013) Cyber-security threat characterization A rapid comparative analysis. RAND report. http://www.rand.org/content/dam/rand/pubs/research_reports/RR200/RR235/RAND_RR235.pdf
Rudner M (2013) Cyber-threats to critical national infrastructure: an intelligence challenge. Int J Intell Counter Intell 26:453–481
Senge P (1990) The fifth discipline: the art and practice of the learning organization. Doubleday Currency, New York
Senge P (2006) The fifth discipline: the art and practice of the learning organization. Doubleday Currency, New York
Sterman JD (2000) Business dynamics: systems thinking and modeling for a complex world. McGraw-Hill Publishing, Boston
UK Cyber Security Strategy (2012) https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf
UNODC (2013) Comprehensive study on cybercrime draft, Feb 2013 http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
Vespignani A (2009) Predicting the behavior of techno-social systems. Science 325:425–428
Weick KE, Sutcliffe KM (2007) Managing the unexpected: resilient performance in an age of uncertainty, 2nd edn. Wiley, San Francisco, CA
Williams AP (2010) Implications of operationalizing a comprehensive approach: defining what interagency interoperability really means. Int C2 J 4(1):1–30
World Economic Forum (2014) Risk and responsibility in a hyper-connected world. http://www3.weforum.org/docs/WEF_RiskResponsibility_HyperconnectedWorld_Report_2014.pdf
Worldwide Threat Assessment of the US Intelligence Community (2013) Statement for the record—senate select committee on intelligence James R. Clapper. Available at www.intelligence.senate.gov/130312/clapper.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Masys, A.J. (2015). The Cyber-Ecosystem Enabling Resilience Through the Comprehensive Approach. In: Masys, A. (eds) Disaster Management: Enabling Resilience. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-08819-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-08819-8_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08818-1
Online ISBN: 978-3-319-08819-8
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)