Cover image for Information Warfare and Organizational Decision-Making.
Information Warfare and Organizational Decision-Making.
Title:
Information Warfare and Organizational Decision-Making.
Author:
Kott, Alexander.
ISBN:
9781596930803
Personal Author:
Physical Description:
1 online resource (293 pages)
Series:
Artech House Information Warfare Library
Contents:
Information Warfare and Organizational Decision-Making -- Contents -- Introduction -- An Organization's Vulnerability to Attacks -- The Road Map of the Book -- References -- Chapter 1 Know Thy Enemy: Acquisition, Representation, and Management of Knowledge About Adversary Organizations -- Introduction to Organization Warfare -- Organizational Intelligence -- Leadership Analysis -- Social Network Modeling and Analysis -- Representative Analytic Process and Tools -- Application Considerations -- Endnotes -- Chapter 2 Learning from the Enemy: Approaches to Identifying and Modeling the Hidden Enemy Organization -- An Elusive Enemy -- Domain of Organization Identification -- Adversary Identification Research -- Identification Focus: Definition of Command and Control Organization -- From Structure to Strategy: Characterizing Behavior of a C2 Organization -- Looking Beyond the Smoke Screen: Definition of Observations -- Discovering the Dots: Finding Identities of Actors -- Connecting the Dots: Discovering Patterns of Interactions and Activities -- Behavior Learning and Simulating Enemy Activities -- The Overall Process of Identifying Enemy Command and Control -- Experimental Validation of the Organization Identification Process -- References -- Chapter 3 Who's Calling? Deriving Organization Structure from Communication Records -- The Tasks -- CCR Structures and Their Graphical Representation -- The Ali Baba Scenarios -- Social Network Analysis -- Previous Work Exploiting Time in Social Networks -- The Windowing Down the Lines (WDL): The Algorithm -- Simple Simulation Tests -- Evaluation of WDL with the Ali Baba Datasets -- The RSF Algorithm -- References -- Chapter 4 Means and Ways: Practical Approaches to Impact Adversary Decision-Making Processes -- Planning Operations for Organization Impact -- Inducing Effects for Defeat -- Targeting for Effects.

Application Considerations -- Endnotes -- Chapter 5 Breakdown of Control: Common Malfunctions of Organizational Decision-Making -- Tardy Decision -- Low and High Threshold -- Excess of Timidity or Aggressiveness -- Self-Reinforcing Error -- Overload -- Cascading Collapse -- Misallocation of Authority -- Lack of Synchronization and Coordination -- Deadlock -- Thrashing and Livelock -- Acknowledgments -- References -- Chapter 6 Propagation of Defeat: Inducing and Mitigating a Self-Reinforcing Degradation -- A Simple Model for Self-Reinforcing Decision Overload -- Propagation of Disruptions in Organizations -- Active Compensation -- Dynamic Reorganization to Mitigate Malfunctions -- Modeling Team Decision-Making: Decision Responsibility and Information Structure -- Measuring Decision-Making Performance -- Forecasting Decision Requirements -- A Simulation of the Firefighting Example -- Mitigating and Inducing Malfunctions -- Acknowledgments -- References -- Chapter 7 Gossip Matters: Destabilization of an Organization by Injecting Suspicion -- Is Gossip Good or Bad? -- What Is Gossip? -- Anonymous Information Exchange Networks -- Hypothetical Organization, Part I: It's All Bits -- Hypothetical Organization, Part II: Miscreant Markets -- TAG Model Overview -- The Mechanisms of Trust -- Gossip and Disruption -- Giving and Taking -- Acknowledgments -- Endnotes -- Chapter 8 Crystal Ball: Quantitatively Estimating Impacts of Probes and Interventions on an Enemy Organization -- Organizational Analysis Approach -- Actionable Implications -- Main Methods -- Developing Strategies Against Enemy Organizations -- Test-Case Scenario: A Human-Guided Torpedo Attack on a U.S. Military Vessel in a Foreign Port -- Analytical and Numerical Methods Underlying VDT and Related Approaches -- Organization Modeling and Strategy Development with SimVision.

Implications for Detecting and Defeating Enemy Organizations -- References -- Chapter 9 Organizational Armor: Design of Attack-Resistant Organizations -- How Organizations Cope with Disruptions -- Attack-Resistant Design Solutions -- Organizational Design Formalism -- Precursors for Superior Organizational Performance -- A Computational Approach for Predicting Organizational Performance -- Normative Design of Robust and Adaptive Organizations -- Empirical Validation of Normative Design Methodology -- Reverse-Engineering Organizational Vulnerabilities -- Robust and Adaptive Designs of Attack-Resistant Organizations -- Illustrative Example-Redesigning an Organization to Enhance Attack Resistance -- References -- About the Authors -- Index.
Abstract:
Unconventional warfare is now conventional, requiring the military to organize in new ways that can rapidly respond to unprecedented battlefield challenges. Cutting-edge computing is helping military planners create original organizational structures able to adapt to ever-changing strategies and tactics. The computational techniques in this book provide practical solutions for organizing and commanding military operations, gathering intelligence, deploying antiterrorism measures, and securing information. The book covers artificial intelligence, game and control theory, and cognitive modeling, offering new insight into military psychology and training. Strategists can develop robust organizations that withstand and mitigate attack. They also learn how to neutralize enemy command and control to gain tactical advantage.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: