Högskolan i Skövde

his.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
How the Civilian Sector in Sweden Perceive Threats from Offensive Cyberspace Operations
University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment. (Informationssystem, Information Systems)ORCID iD: 0000-0003-2084-9119
University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment. Department of Military Studies, Swedish Defence University, Stockholm, Sweden ; Center for Asymmetric Threat and Terrorism Studies, Swedish Defence University, Stockholm, Sweden. (Informationssystem, Information Systems)ORCID iD: 0000-0002-7552-9465
2021 (English)In: Proceedings of the 20th European Conference on Cyber Warfare and Security / [ed] Thaddeus Eze; Lee Speakman; Cyril Onwubiko, Reading: ACI Academic Conferences International, 2021, p. 499-506Conference paper, Published paper (Refereed)
Abstract [en]

The presence of state-sponsored actors executing offensive cyberspace operations (OCO) has been made evident in recent years. The term offensive cyberspace operations encompass a range of different actions, including cyberespionage, disinformation campaigns, spread of malware and more. Based on an analysis of past events, it is evident that state-sponsored actors are causing harm to the civilian sector using OCO. However, the degree to which civilian organizations understand the threat from state-sponsored actors is currently unknown. This research seeks to provide new a better understanding of OCO and their impact on civilian organizations. To highlight this domain, the case of the threat actor Advanced Persistent Threat 1 (APT1) is presented, and its impact on three civilian organizations discussed. Semi-structured interviews were used to research how the threats from OCO and state-sponsored actors are perceived by civilian organizations. First, a computational literature review was used to get an overview of related work and establish question themes. Next, the question themes were used to develop questions for the interview guide, followed by separate interviews with five security professionals working in civilian organizations. The interviews were analysed using thematic coding and the identified themes summarized as the result of this research. The results show that all respondents are aware of the threat from OCO, but they perceive it in different ways. While all respondents acknowledge state-sponsored actors at a threat agent executing OCO, some respondent’s argue that state-sponsored actors are actively seeking footholds in systems for future use while others state that the main goal of state-sponsored actors is to steal information. This suggests that the understanding of the threat imposed by OCO is limited, or at least inconsistent, among civilian security experts. As an interview study, the generalisability of this research is limited. However, it does demonstrate that the civilian society does not share a common view of the threat from state-sponsored actors and OCO. As such, it demonstrates a need for future research in this domain and can serve as a starting point for such projects.

Place, publisher, year, edition, pages
Reading: ACI Academic Conferences International, 2021. p. 499-506
Series
Proceedings of the ... European conference on information warfare and security (ECCWS), ISSN 2048-8602, E-ISSN 2048-8610
Keywords [en]
cybersecurity, state-sponsored, advanced persistent threat, civilian, offensive cyberspace operations
National Category
Information Systems
Research subject
INF303 Information Security; Information Systems
Identifiers
URN: urn:nbn:se:his:diva-20493ISBN: 978-1-912764-43-3 (electronic)ISBN: 978-1-912764-99-0 (print)OAI: oai:DiVA.org:his-20493DiVA, id: diva2:1586474
Conference
20th European Conference on Cyber Warfare and Security, Reading, 24-25 June 2021
Note

10.34190/EWS.21.106

Available from: 2021-08-20 Created: 2021-08-20 Last updated: 2022-12-21Bibliographically approved

Open Access in DiVA

fulltext(279 kB)356 downloads
File information
File name FULLTEXT02.pdfFile size 279 kBChecksum SHA-512
18ef43650051d9dd14d1067de265fa8ff443f0e7a7cac2d208e188493a2f78b8b92ea5026d6b6ca6c7a39a37b0b4dcf04c53e5e9fba1cd49b1f2483a8544c86c
Type fulltextMimetype application/pdf

Other links

https://www.proquest.com/docview/2555180198?pq-origsite=gscholar&fromopenview=true

Authority records

Kävrestad, JoakimHuskaj, Gazmend

Search in DiVA

By author/editor
Kävrestad, JoakimHuskaj, Gazmend
By organisation
School of InformaticsInformatics Research Environment
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 358 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 461 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf