Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Operations Research, Systems Engineering and Industrial Engineering (7)
- Computer Sciences (4)
- Other Operations Research, Systems Engineering and Industrial Engineering (4)
- Physical Sciences and Mathematics (4)
- Computer Engineering (2)
-
- Defense and Security Studies (2)
- Operational Research (2)
- Public Affairs, Public Policy and Public Administration (2)
- Social and Behavioral Sciences (2)
- Computer and Systems Architecture (1)
- Databases and Information Systems (1)
- Digital Communications and Networking (1)
- Electrical and Computer Engineering (1)
- Information Security (1)
- Other Electrical and Computer Engineering (1)
- Systems Engineering (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Engineering
Mission Assurance: A Review Of Continuity Of Operations Guidance For Application To Cyber Incident Mission Impact Assessment (Cimia), Brian L. Hale
Mission Assurance: A Review Of Continuity Of Operations Guidance For Application To Cyber Incident Mission Impact Assessment (Cimia), Brian L. Hale
Theses and Dissertations
Military organizations have embedded information technology (IT) into their core mission processes as a means to increase operational efficiency, improve decision-making quality, and shorten the sensor-to-shooter cycle. This IT-to-mission dependence can place the organizational mission at risk when an information incident (e.g., the loss or manipulation of a critical information resource) occurs. Non-military organizations typically address this type of IT risk through an introspective, enterprise-wide focused risk management program that continuously identifies, prioritizes, and documents risks so an economical set of control measures (e.g., people, processes, technology) can be selected to mitigate the risks to an acceptable level. The explicit …
Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr.
Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr.
Theses and Dissertations
The purpose of this research is to establish a conceptual methodological framework that will facilitate effective cyber damage and mission impact assessment and reporting following a cyber-based information incidents. Joint and service guidance requires mission impact reporting, but current efforts to implement such reporting have proven ineffective. This research seeks to understand the impediments existing in the current implementation and to propose an improved methodology. The research employed a hybrid historical analysis and case study methodology for data collection through extensive literature review, examination of existing case study research and interviews with Air Force members and civilian personnel employed as …
Modeling Network Centric Warfare (Ncw) With The System Effectiveness Analysis Simulation (Seas), Jason B. Honabarger
Modeling Network Centric Warfare (Ncw) With The System Effectiveness Analysis Simulation (Seas), Jason B. Honabarger
Theses and Dissertations
Significant technological advances over the past few decades have fueled the continual and rapid development of an information-based world. Network Centric Warfare (NCW) has become the buzzword of the young millennium within the Department of Defense (DoD) and is quickly becoming a popularly shared vision and rallying cry for force transformation among United States military leaders. An essential element in fully implementing this network-centric way of thinking is to develop useful measures to help gauge the effectiveness and efficiency of both our military networks and our strategic NCW doctrine. The goal of this research is first to provide a comprehensive …
Establishing A Cyber Warrior Force, Scott D. Tobin
Establishing A Cyber Warrior Force, Scott D. Tobin
Theses and Dissertations
Cyber Warfare is widely touted to be the next generation of warfare. As America's reliance on automated systems and information technology increases, so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare. Historically, the Air Force and DoD have concentrated their efforts toward defensive network operations. However, a shift in doctrine has shown both the Air Force and DoD acknowledging the potential for Information Warfare. What appears to be lacking is the trained and educated cyber warrior force that will carry out the information operations if needed. This research …
Task Load And Automation Use In An Uncertain Environment, Mark A. Daly
Task Load And Automation Use In An Uncertain Environment, Mark A. Daly
Theses and Dissertations
The purpose of this research was to investigate the effects that user task load level has on the relationship between an individual's trust in and subsequent use of a system's automation. Automation research has demonstrated a positive correlation between an individual's trust in and subsequent use of the automation. Military decision-makers trust and use information system automation to make many tactical judgments and decisions. In situations of information uncertainty (information warfare environments), decision-makers must remain aware of information reliability issues and temperate their use of system automation if necessary. An individual's task load may have an effect on his use …
The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait
Theses and Dissertations
Information warfare (IW) has developed into a significant threat to the national security of the United States. Our critical infrastructures, linked together by information systems, are increasingly vulnerable to information attack. This study seeks to understand some of those factors which affect the ability of an individual to make accurate decisions in an IW environment. The study used game theory to analyze the behavior of decision-makers within an IW simulation. The IW game model is based on a set of games known as infinitely repeated games of incomplete information. It uses the Bayesian Nash equilibrium concept to determine the strategy …
The Effect Of External Safeguards On Human-Information System Trust In An Information Warfare Environment, Gregory S. Fields
The Effect Of External Safeguards On Human-Information System Trust In An Information Warfare Environment, Gregory S. Fields
Theses and Dissertations
This research looks at how human trust in an information system is influenced by external safeguards in an Information Warfare (1W) domain. Information systems are relied upon in command and control environments to provide fast and reliable information to the decision-makers. The degree of reliance placed in these systems by the decision-makers suggests a significant level of trust. Understanding this trust relationship and what effects it is the focus of this study. A model is proposed that predicts behavior associated with human trust in information systems. It is hypothesized that a decision-maker's belief in the effectiveness of external safeguards will …
A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett
A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett
Theses and Dissertations
Consistently and comprehensively using Information Operations (IO) capabilities as primary weapon option within the Air Force is the next step to operationalizing IO within the Air Force. Doctrine and official guidance has set the variables of mission and concepts of operations, organizational structure, and IW players in place. The missing variable to operationalizing IO and probably the most difficult is the 'how' or process of the equation. This research will introduce a useable process that can be incorporated within the Air Force for integrating offensive IW activities into the current and given environment. The process is the basis for further …
A Modeling And Simulation Approach To Characterize Network Layer Internet Survivability, Leif S. King
A Modeling And Simulation Approach To Characterize Network Layer Internet Survivability, Leif S. King
Theses and Dissertations
The Air Force Core Competency of Information Superiority will be achieved in an age of decreasing AF manpower and corporate expertise. Increased AF reliance on COTS solutions, coupled with nearly ubiquitous points of entry to communication networks, create unique challenges in maintaining the Information Superiority edge. The protection of the internet is part of this equation. The internet supports the daily business traffic of the Air Force. Personnel, finance, and supply data flow through its routers. Controlling an adversary's access to our information systems, either the data, or the hardware and software that control the data and transform it into …
A Value Function Approach To Information Operations Moe's: A Preliminary Study, Michael P. Doyle, Richard F. Deckro, Jack M. Kloeber Jr., Jack A. Jackson Jr., Center For Modeling, Simulation, And Analysis, Air Force Institute Of Technology
A Value Function Approach To Information Operations Moe's: A Preliminary Study, Michael P. Doyle, Richard F. Deckro, Jack M. Kloeber Jr., Jack A. Jackson Jr., Center For Modeling, Simulation, And Analysis, Air Force Institute Of Technology
AFIT Documents
A value focused thinking approach is applied to information operations. A preliminary value hierarchy for information operations is constructed by extracting the values of senior military leadership from existing doctrine. To identify these key values for information operations, applicable existing doctrine was reviewed and summarized. Additionally, hierarchical representations of the values represented within each reviewed doctrine are developed. A value hierarchy requires that supporting objectives be mutually exclusive and collectively exhaustive. Within this analysis, these requirements are enforced, in part, by developed definitions which serve as tests to maintain mutual exclusivity. An exhaustive set of supporting values is also guaranteed …