Abstract

The influence operations domain would benefit from a strategic adoption of automation, technological adaptability, and agile processes. The focus of this article is on the technical aspects of determining the required technologies to fully support conducting an influence operation rather than cognitive aspects of an operation. A unified approach to the application of these technologies does not appear to have occurred in this domain. A conceptual information theoretic framework for identifying appropriate technologies to support influence and other cyber operations is presented. It provides a holistic framework for making planning decisions about the development and employment of technology capabilities independent of specific detailed operational requirements, while allowing assessments of risk, cost, and effectiveness to be considered in the process. The framework defines the data, information needs, and acquisition process in the context of specific technology insertion point data, information, or knowledge requirements and services to facilitate execution of an operation. The framework allows for identification, down-selection, and prioritization of specific shared technologies that support multiple phases of the decision process and stages of an operation. This allows for concentration of limited engineering, programmatic, and financial resources on technologies with the widest applicability irrespective of the specific operation.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.