Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 2

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  OPSEC
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
When virtual social relations and online interactions have increased in our age media also had a transformation. Social media is a phenomenon which came with wide usage of internet by modern society and individuals. On the one hand it has created opportunities for a more democratic way of communication, participation and dialogue between members of different socio-cultural groups, communities, friends and family members, colleagues, Etc.; on the other hand this new version of media has caused criminal risks, security gaps and vulnerabilities to contemporary threats varied from fraud to cyber-attacks, terrorism, identity theft, ransomwares and so on. Even “old types” of crimes in real life can begin from social media and virtual reality. All these problems are related to several subdisciplines of sociology: sociology of communication, sociology of crime, sociology of security are among them. In this paper we will analyze the topic though sociology of security’s prism. Also, we will discuss what can be the functionality of OPSEC as a measure, which has military background and widely used later on by civilian sectors including corporate security as well.
2
Publication available in full text mode
Content available

OPSEC Model and Applications

86%
EN
OPSEC (Operations Security) model was developed during the Vietnam War era as a part of military strategies to protect critical information, analyzing vulnerabilities and threats, assessing risks and applying proper countermeasures. 5 steps OPSEC model have been functional for US Army’s operational security and used by other NATO members as well. When threats have spread widely in 21 st Century OPSEC began to be used and applied in a more general context of security world. Today even in cyber security this model serves practically for protection of critical data and information. In this paper we are going to proceed in two levels: on the one hand we will explain the OPSEC principles, steps and conceptual aspects through the main sources of this field; on the other hand we will discuss applications of the model in real world (military, politics, industry, etc.) via some explanatory examples and its potential usages for securing modern life and societies. Our approach will be based on an interdisciplinary view with references to sociology, security studies and management.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.