Information warfare and organizational decision-making:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Boston, MA [u.a.]
Artech House
2007
|
Schriftenreihe: | Artech House information warfare library
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XVII, 273 S. graph. Darst. |
ISBN: | 9781596930797 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022393169 | ||
003 | DE-604 | ||
005 | 20070601 | ||
007 | t | ||
008 | 070419s2007 xxud||| |||| 00||| eng d | ||
010 | |a 2006052655 | ||
020 | |a 9781596930797 |c alk. paper |9 978-1-59693-079-7 | ||
035 | |a (OCoLC)77522493 | ||
035 | |a (DE-599)BVBBV022393169 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 658.4/03 | |
084 | |a 8 |2 ssgn | ||
245 | 1 | 0 | |a Information warfare and organizational decision-making |c Alexander Kott, ed. |
264 | 1 | |a Boston, MA [u.a.] |b Artech House |c 2007 | |
300 | |a XVII, 273 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Artech House information warfare library | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Information warfare | |
650 | 4 | |a Decision making | |
650 | 4 | |a Associations, institutions, etc |x Decision making | |
650 | 0 | 7 | |a Entscheidungsfindung |0 (DE-588)4113446-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Entscheidungsfindung |0 (DE-588)4113446-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kott, Alexander |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung BSBMuenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015601961&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015601961 |
Datensatz im Suchindex
_version_ | 1804136452250927104 |
---|---|
adam_text | Contents
Introduction
CHAPTER
Know Thy Enemy: Acquisition, Representation, and Management of
Knowledge About Adversary Organizations
Introduction to Organization Warfare
Organizational Intelligence
Leadership Analysis
Social Network Modeling and Analysis
Representative Analytic Process and Tools
Application Considerations
Endnotes 25
CHAPTER
Learning from the Enemy: Approaches to Identifying and Modeling
the Hidden Enemy Organization
An Elusive Enemy
Domain of Organization Identification
Adversary Identification Research
Identification Focus: Definition of Command and Control Organization
From Structure to Strategy: Characterizing Behavior of a C2 Organization
Looking Beyond the Smoke Screen: Definition of Observations
Discovering the Dots: Finding Identities of Actors
Connecting the Dots: Discovering Patterns of Interactions and Activities
Behavior Learning and Simulating Enemy Activities
The Overall Process of Identifying Enemy Command and Control
Experimental Validation of the Organization Identification Process
References
CHAPTER
Who s Calling? Deriving Organization Structure from
Communication Records
The Tasks
CCR Structures and Their Graphical Representation
The
Social Network Analysis
Previous Work Exploiting Time in Social Networks
The Windowing Down the Lines (WDL): The Algorithm
The Scenario
VI
Contents
The Data
74
Formatting the Data
74
Time Windowing
75
Time Overlapping
77
The Algorithm
79
Simple Simulation Tests
81
Evaluation of WDL with the
82
Without Topics
82
With Topics
84
The RSF Algorithm
86
References
88
^H
Means and Ways: Practical Approaches to Impact Adversary
Decision-Making Processes
89
Planning Operations for Organization Impact
90
Targeting Decision-Making
93
Targeting the Entire Organization
94
Effects-Based Targeting
95
Inducing Effects for Defeat
100
Denial or Destruction
101
Disruption
103
Deception
104
Direction and Reflexion
105
Targeting for Effects
107
Vulnerability Assessment
108
Plan Development
108
Strategic Analysis
109
Organization Behavior Analysis
109
Application Considerations
110
Endnotes
111
CHAPTER
Breakdown of Control: Common Malfunctions of Organizational
Decision-Making
Tardy Decision
Low and High Threshold
Excess of Timidity or Aggressiveness
Self-Reinforcing Error
Overload
Cascading Collapse
Misallocation of Authority
Lack of Synchronization and Coordination
Deadlock
Thrashing and
Acknowledgments
References
Contents
CHAPTER
Propagation of Defeat: Inducing and Mitigating a Self-Reinforcing
Degradation
A Simple Model for Self-Reinforcing Decision Overload
Propagation of Disruptions in Organizations
Active Compensation
Dynamic Reorganization to Mitigate Malfunctions
Modeling Team Decision-Making: Decision Responsibility and
Information Structure
Measuring Decision-Making Performance
Forecasting Decision Requirements
A Simulation of the Firefighting Example
Mitigating and Inducing Malfunctions
Acknowledgments
References
CHAPTER
Gossip Matters: Destabilization of an Organization by Injecting Suspicion
Is Gossip Good or Bad?
What Is Gossip?
Anonymous Information Exchange Networks
Hypothetical Organization, Part I: It s All Bits
Hypothetical Organization, Part II: Miscreant Markets
TAG Model Overview
The Mechanisms of Trust
Trust Model
Honesty Models
Gossip Model
Gossip and Disruption
Setting the Baselines
A Virtual Experiment in Disruption
Results of TAG Experiments
Interpretation
Giving and Taking
Acknowledgments
Endnotes 181
CHAPTER
Crystal Ball: Quantitatively Estimating Impacts of Probes and Interventions
on an Enemy Organization
Organizational Analysis Approach
Organization s Options for Dealing with Mission Complexity
Enemy Organization Dynamics and Counteraction Strategies
Actionable Implications
Main Methods
Developing Strategies Against Enemy Organizations
Probe Identification
viii
Intervention
Test-Case Scenario: A Human-Guided Torpedo Attack on
a U.S. Military Vessel in a Foreign Port
Enemy Organization Model
Enemy Mission Complexity Characteristics
Estimating Impacts of an Example Probe
Estimating Impacts of Example Interventions
Analytical and Numerical Methods Underlying VDT and
Related Approaches
Organization Modeling and Strategy Development with Sim Vision
Implications for Detecting and Defeating Enemy Organizations
References
CHAPTER
Organizational Armor: Design of Attack-Resistant Organizations
How Organizations Cope with Disruptions
Attack-Resistant Design Solutions
Organizational Design Formalism
Precursors for Superior Organizational Performance
A Computational Approach for Predicting Organizational Performance
Normative Design of Robust and Adaptive Organizations
Empirical Validation of Normative Design Methodology
Reverse-Engineering Organizational Vulnerabilities
Robust and Adaptive Designs of Attack-Resistant Organizations
Illustrative Example
Attack Resistance
Example Scenario
Enemy Attacks
Redesign Principles
Attack-Specific Courses of Action
Engineering for Congruence with Mission in the Face of Attacks
Adaptation
Analyze Organizational Design
References
About the Authors
Index
|
adam_txt |
Contents
Introduction
CHAPTER
Know Thy Enemy: Acquisition, Representation, and Management of
Knowledge About Adversary Organizations
Introduction to Organization Warfare
Organizational Intelligence
Leadership Analysis
Social Network Modeling and Analysis
Representative Analytic Process and Tools
Application Considerations
Endnotes 25
CHAPTER
Learning from the Enemy: Approaches to Identifying and Modeling
the Hidden Enemy Organization
An Elusive Enemy
Domain of Organization Identification
Adversary Identification Research
Identification Focus: Definition of Command and Control Organization
From Structure to Strategy: Characterizing Behavior of a C2 Organization
Looking Beyond the Smoke Screen: Definition of Observations
Discovering the Dots: Finding Identities of Actors
Connecting the Dots: Discovering Patterns of Interactions and Activities
Behavior Learning and Simulating Enemy Activities
The Overall Process of Identifying Enemy Command and Control
Experimental Validation of the Organization Identification Process
References
CHAPTER
Who's Calling? Deriving Organization Structure from
Communication Records
The Tasks
CCR Structures and Their Graphical Representation
The
Social Network Analysis
Previous Work Exploiting Time in Social Networks
The Windowing Down the Lines (WDL): The Algorithm
The Scenario
VI
Contents
The Data
74
Formatting the Data
74
Time Windowing
75
Time Overlapping
77
The Algorithm
79
Simple Simulation Tests
81
Evaluation of WDL with the
82
Without Topics
82
With Topics
84
The RSF Algorithm
86
References
88
^H
Means and Ways: Practical Approaches to Impact Adversary
Decision-Making Processes
89
Planning Operations for Organization Impact
90
Targeting Decision-Making
93
Targeting the Entire Organization
94
Effects-Based Targeting
95
Inducing Effects for Defeat
100
Denial or Destruction
101
Disruption
103
Deception
104
Direction and Reflexion
105
Targeting for Effects
107
Vulnerability Assessment
108
Plan Development
108
Strategic Analysis
109
Organization Behavior Analysis
109
Application Considerations
110
Endnotes
111
CHAPTER
Breakdown of Control: Common Malfunctions of Organizational
Decision-Making
Tardy Decision
Low and High Threshold
Excess of Timidity or Aggressiveness
Self-Reinforcing Error
Overload
Cascading Collapse
Misallocation of Authority
Lack of Synchronization and Coordination
Deadlock
Thrashing and
Acknowledgments
References
Contents
CHAPTER
Propagation of Defeat: Inducing and Mitigating a Self-Reinforcing
Degradation
A Simple Model for Self-Reinforcing Decision Overload
Propagation of Disruptions in Organizations
Active Compensation
Dynamic Reorganization to Mitigate Malfunctions
Modeling Team Decision-Making: Decision Responsibility and
Information Structure
Measuring Decision-Making Performance
Forecasting Decision Requirements
A Simulation of the Firefighting Example
Mitigating and Inducing Malfunctions
Acknowledgments
References
CHAPTER
Gossip Matters: Destabilization of an Organization by Injecting Suspicion
Is Gossip Good or Bad?
What Is Gossip?
Anonymous Information Exchange Networks
Hypothetical Organization, Part I: It's All Bits
Hypothetical Organization, Part II: Miscreant Markets
TAG Model Overview
The Mechanisms of Trust
Trust Model
Honesty Models
Gossip Model
Gossip and Disruption
Setting the Baselines
A Virtual Experiment in Disruption
Results of TAG Experiments
Interpretation
Giving and Taking
Acknowledgments
Endnotes 181
CHAPTER
Crystal Ball: Quantitatively Estimating Impacts of Probes and Interventions
on an Enemy Organization
Organizational Analysis Approach
Organization's Options for Dealing with Mission Complexity
Enemy Organization Dynamics and Counteraction Strategies
Actionable Implications
Main Methods
Developing Strategies Against Enemy Organizations
Probe Identification
viii
Intervention
Test-Case Scenario: A Human-Guided Torpedo Attack on
a U.S. Military Vessel in a Foreign Port
Enemy Organization Model
Enemy Mission Complexity Characteristics
Estimating Impacts of an Example Probe
Estimating Impacts of Example Interventions
Analytical and Numerical Methods Underlying VDT and
Related Approaches
Organization Modeling and Strategy Development with Sim Vision
Implications for Detecting and Defeating Enemy Organizations
References
CHAPTER
Organizational Armor: Design of Attack-Resistant Organizations
How Organizations Cope with Disruptions
Attack-Resistant Design Solutions
Organizational Design Formalism
Precursors for Superior Organizational Performance
A Computational Approach for Predicting Organizational Performance
Normative Design of Robust and Adaptive Organizations
Empirical Validation of Normative Design Methodology
Reverse-Engineering Organizational Vulnerabilities
Robust and Adaptive Designs of Attack-Resistant Organizations
Illustrative Example
Attack Resistance
Example Scenario
Enemy Attacks
Redesign Principles
Attack-Specific Courses of Action
Engineering for Congruence with Mission in the Face of Attacks
Adaptation
Analyze Organizational Design
References
About the Authors
Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV022393169 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
ctrlnum | (OCoLC)77522493 (DE-599)BVBBV022393169 |
dewey-full | 658.4/03 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/03 |
dewey-search | 658.4/03 |
dewey-sort | 3658.4 13 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01662nam a2200445zc 4500</leader><controlfield tag="001">BV022393169</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070601 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070419s2007 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2006052655</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596930797</subfield><subfield code="c">alk. paper</subfield><subfield code="9">978-1-59693-079-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)77522493</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022393169</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/03</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information warfare and organizational decision-making</subfield><subfield code="c">Alexander Kott, ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA [u.a.]</subfield><subfield code="b">Artech House</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 273 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House information warfare library</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Decision making</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Associations, institutions, etc</subfield><subfield code="x">Decision making</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Entscheidungsfindung</subfield><subfield code="0">(DE-588)4113446-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Entscheidungsfindung</subfield><subfield code="0">(DE-588)4113446-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kott, Alexander</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSBMuenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015601961&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015601961</subfield></datafield></record></collection> |
id | DE-604.BV022393169 |
illustrated | Illustrated |
index_date | 2024-07-02T17:15:34Z |
indexdate | 2024-07-09T20:56:37Z |
institution | BVB |
isbn | 9781596930797 |
language | English |
lccn | 2006052655 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015601961 |
oclc_num | 77522493 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XVII, 273 S. graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Artech House |
record_format | marc |
series2 | Artech House information warfare library |
spelling | Information warfare and organizational decision-making Alexander Kott, ed. Boston, MA [u.a.] Artech House 2007 XVII, 273 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Artech House information warfare library Includes bibliographical references and index Information warfare Decision making Associations, institutions, etc Decision making Entscheidungsfindung (DE-588)4113446-1 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Information warfare (DE-588)4461975-3 s Entscheidungsfindung (DE-588)4113446-1 s DE-604 Kott, Alexander Sonstige oth Digitalisierung BSBMuenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015601961&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information warfare and organizational decision-making Information warfare Decision making Associations, institutions, etc Decision making Entscheidungsfindung (DE-588)4113446-1 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4113446-1 (DE-588)4461975-3 |
title | Information warfare and organizational decision-making |
title_auth | Information warfare and organizational decision-making |
title_exact_search | Information warfare and organizational decision-making |
title_exact_search_txtP | Information warfare and organizational decision-making |
title_full | Information warfare and organizational decision-making Alexander Kott, ed. |
title_fullStr | Information warfare and organizational decision-making Alexander Kott, ed. |
title_full_unstemmed | Information warfare and organizational decision-making Alexander Kott, ed. |
title_short | Information warfare and organizational decision-making |
title_sort | information warfare and organizational decision making |
topic | Information warfare Decision making Associations, institutions, etc Decision making Entscheidungsfindung (DE-588)4113446-1 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Information warfare Decision making Associations, institutions, etc Decision making Entscheidungsfindung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015601961&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kottalexander informationwarfareandorganizationaldecisionmaking |