{"title":"如何应对混合威胁","authors":"L. Monov, M. Karev","doi":"10.11610/isij.3909","DOIUrl":null,"url":null,"abstract":"This article introduces the network context and reveals some aspects of the hybrid threats, the decision-making process to counter hybrid threats and three possible options to handle that issue. In order to discover possible hybrid actions, we need a methodology that considers national interests along with major trends and threats as well as weaknesses and impacts. The implementation of such methodology will provide sufficient data and information to support decisions, accounting for all instruments of power in an integrated strategic approach.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"How to Counter Hybrid Threats\",\"authors\":\"L. Monov, M. Karev\",\"doi\":\"10.11610/isij.3909\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article introduces the network context and reveals some aspects of the hybrid threats, the decision-making process to counter hybrid threats and three possible options to handle that issue. In order to discover possible hybrid actions, we need a methodology that considers national interests along with major trends and threats as well as weaknesses and impacts. The implementation of such methodology will provide sufficient data and information to support decisions, accounting for all instruments of power in an integrated strategic approach.\",\"PeriodicalId\":159156,\"journal\":{\"name\":\"Information & Security: An International Journal\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information & Security: An International Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.11610/isij.3909\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information & Security: An International Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11610/isij.3909","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This article introduces the network context and reveals some aspects of the hybrid threats, the decision-making process to counter hybrid threats and three possible options to handle that issue. In order to discover possible hybrid actions, we need a methodology that considers national interests along with major trends and threats as well as weaknesses and impacts. The implementation of such methodology will provide sufficient data and information to support decisions, accounting for all instruments of power in an integrated strategic approach.