Reference Hub2
Cyber Counterintelligence: An Exploratory Proposition on a Conceptual Framework

Cyber Counterintelligence: An Exploratory Proposition on a Conceptual Framework

Petrus Duvenage, Thenjiwe Sithole, Basie von Solms
Copyright: © 2019 |Volume: 9 |Issue: 4 |Pages: 19
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781522566915|DOI: 10.4018/IJCWT.2019100103
Cite Article Cite Article

MLA

Duvenage, Petrus, et al. "Cyber Counterintelligence: An Exploratory Proposition on a Conceptual Framework." IJCWT vol.9, no.4 2019: pp.44-62. http://doi.org/10.4018/IJCWT.2019100103

APA

Duvenage, P., Sithole, T., & von Solms, B. (2019). Cyber Counterintelligence: An Exploratory Proposition on a Conceptual Framework. International Journal of Cyber Warfare and Terrorism (IJCWT), 9(4), 44-62. http://doi.org/10.4018/IJCWT.2019100103

Chicago

Duvenage, Petrus, Thenjiwe Sithole, and Basie von Solms. "Cyber Counterintelligence: An Exploratory Proposition on a Conceptual Framework," International Journal of Cyber Warfare and Terrorism (IJCWT) 9, no.4: 44-62. http://doi.org/10.4018/IJCWT.2019100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article advances a conceptual framework for cyber counterintelligence (FCCI) as a theoretical construct, hopefully useful not only to this field's academic development, but also to sound practice. It is submitted within the context of the sharp increasing targeting of state and non-state actors by adversarial intelligence actors (such other nation states, crime syndicates and competitors). The signature role of cyber counterintelligence (CCI) is precisely the engagement, exploitation and neutralisation of such adversarial actors. CCI has been practised by nation states for well over a decade and has recently also been gaining traction in corporate board rooms and as an academic field. Sound theory is critical to not only CCI's academic evolvement but also to sound practice. The proposed FCCI comprises of eight notional building blocks essential to explaining what CCI is and how it works.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.