Skip to:Content
|
Bottom
Cover image for Information warfare and organizational decision-making
Title:
Information warfare and organizational decision-making
Series:
Artech House information warfare library
Publication Information:
Boston, MA : Artech House Publishers, 2007
ISBN:
9781596930797
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010163813 U163 I53 2006 Open Access Book Book
Searching...
Searching...
30000010178929 U163 I53 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

The contributors to this book offer practical solutions for organising and executing organisational warfare, gathering intelligence, deploying anti-terrorism measures and securing information.


Table of Contents

Introductionp. ix
Chapter 1 Know Thy Enemy: Acquisition, Representation, and Management of Knowledge About Adversary Organizationsp. 1
Introduction to Organization Warfarep. 2
Organizational Intelligencep. 6
Leadership Analysisp. 12
Social Network Modeling and Analysisp. 14
Representative Analytic Process and Toolsp. 19
Application Considerationsp. 23
Endnotesp. 25
Chapter 2 Learning from the Enemy: Approaches to Identifying and Modeling the Hidden Enemy Organizationp. 29
An Elusive Enemyp. 29
Domain of Organization Identificationp. 31
Adversary Identification Researchp. 33
Identification Focus: Definition of Command and Control Organizationp. 36
From Structure to Strategy: Characterizing Behavior of a C2 Organizationp. 38
Looking Beyond the Smoke Screen: Definition of Observationsp. 42
Discovering the Dots: Finding Identities of Actorsp. 45
Connecting the Dots: Discovering Patterns of Interactions and Activitiesp. 48
Behavior Learning and Simulating Enemy Activitiesp. 53
The Overall Process of Identifying Enemy Command and Controlp. 55
Experimental Validation of the Organization Identification Processp. 57
Referencesp. 59
Chapter 3 Who's Calling? Deriving Organization Structure from Communication Recordsp. 63
The Tasksp. 64
CCR Structures and Their Graphical Representationp. 64
The Ali Baba Scenariosp. 66
Social Network Analysisp. 67
Previous Work Exploiting Time in Social Networksp. 71
The Windowing Down the Lines (WDL): The Algorithmp. 73
The Scenariop. 74
The Datap. 74
Formatting the Datap. 74
Time Windowingp. 75
Time Overlappingp. 77
The Algorithmp. 79
Simple Simulation Testsp. 81
Evaluation of WDL with the Ali Baba Datasetp. 82
Without Topicsp. 82
With Topicsp. 84
The RSF Algorithmp. 86
Referencesp. 88
Chapter 4 Means and Ways: Practical Approaches to Impact Adversary Decision-Making Processesp. 89
Planning Operations for Organization Impactp. 90
Targeting Decision-Makingp. 93
Targeting the Entire Organizationp. 94
Effects-Based Targetingp. 95
Inducing Effects for Defeatp. 100
Denial or Destructionp. 101
Disruptionp. 103
Deceptionp. 104
Direction and Reflexionp. 103
Targeting for Effectsp. 107
Vulnerability Assessmentp. 108
Plan Developmentp. 108
Strategic Analysisp. 109
Organization Behavior Analysisp. 109
Application Considerationsp. 110
Endnotesp. 111
Chapter 5 Breakdown of Control: Common Malfunctions of Organizational Decision-Makingp. 115
Tardy Decisionp. 117
Low and High Thresholdp. 120
Excess of Timidity or Aggressivenessp. 121
Self-Reinforcing Errorp. 122
Overloadp. 124
Cascading Collapsep. 125
Misallocation of Authorityp. 127
Lack of Synchronization and Coordinationp. 128
Deadlockp. 131
Thrashing and Livelockp. 132
Acknowledgmentsp. 133
Referencesp. 134
Chapter 6 Propagation of Defeat: Inducing and Mitigating a Self-Reinforcing Degradationp. 135
A Simple Model for Self-Reinforcing Decision Overloadp. 136
Propagation of Disruptions in Organizationsp. 141
Active Compensationp. 144
Dynamic Reorganization to Mitigate Malfunctionsp. 146
Modeling Team Decision-Making: Decision Responsibility and Information Structurep. 147
Measuring Decision-Making Performancep. 150
Forecasting Decision Requirementsp. 151
A Simulation of the Firefighting Examplep. 151
Mitigating and Inducing Malfunctionsp. 153
Acknowledgmentsp. 156
Referencesp. 156
Chapter 7 Gossip Matters: Destabilization of an Organization by Injecting Suspicionp. 159
Is Gossip Good or Bad?p. 160
What Is Gossip?p. 162
Anonymous Information Exchange Networksp. 163
Hypothetical Organization, Part I It's All Bitsp. 164
Hypothetical Organization, Part II Miscreant Marketsp. 165
TAG Model Overviewp. 167
The Mechanisms of Trustp. 169
Trust Modelp. 169
Honesty Modelsp. 171
Gossip Modelp. 171
Gossip and Disruptionp. 172
Setting the Baselinesp. 172
A Virtual Experiment in Disruptionp. 173
Results of TAG Experimentsp. 174
Interpretationp. 175
Giving and Takingp. 177
Acknowledgmentsp. 181
Endnotesp. 181
Chapter 8 Crystal Ball: Quantitatively Estimating Impacts of Probes and Interventions on an Enemy Organizationp. 191
Organizational Analysis Approachp. 192
Organization's Options for Dealing with Mission Complexityp. 192
Enemy Organization Dynamics and Counteraction Strategiesp. 193
Actionable Implicationsp. 194
Main Methodsp. 195
Developing Strategies Against Enemy Organizationsp. 195
Probe Identificationp. 196
Intervention Planningp. 196
Test-Case Scenario: A Human-Guided Torpedo Attack on a U.S. Military Vessel in a Foreign Portp. 197
Enemy Organization Modelp. 199
Enemy Mission Complexity Characteristicsp. 200
Estimating Impacts of an Example Probep. 203
Estimating Impacts of Example Interventionsp. 205
Analytical and Numerical Methods Underlying VDT and Related Approachesp. 207
Organization Modeling and Strategy Development with Sim Visionp. 208
Implications for Detecting and Defeating Enemy Organizationsp. 211
Referencesp. 211
Chapter 9 Organizational Armor: Design of Attack-Resistant Organizationsp. 213
How Organizations Cope with Disruptionsp. 214
Attack-Resistant Design Solutionsp. 218
Organizational Design Formalismp. 221
Precursors for Superior Organizational Performancep. 222
A Computational Approach for Predicting Organizational Performancep. 225
Normative Design of Robust and Adaptive Organizationsp. 228
Empirical Validation of Normative Design Methodologyp. 230
Reverse-Engineering Organizational Vulnerabilitiesp. 233
Robust and Adaptive Designs of Attack-Resistant Organizationsp. 236
Illustrative Example-Redesigning an Organization to Enhance Attack Resistancep. 242
Example Scenariop. 242
Enemy Attacksp. 245
Redesign Principlesp. 246
Attack-Specific Courses of Actionp. 247
Engineering for Congruence with Mission in the Face of Attacksp. 248
Adaptationp. 250
Analyze Organizational Designp. 251
Referencesp. 252
About the Authorsp. 257
Indexp. 265
Go to:Top of Page