Abstract

Biological metaphors abound in computational modeling and simulation, inspiring creative and novel approaches to conceptualizing, representing, simulating and analyzing a wide range of phenomena. Proponents of this research suggest that biologically-inspired informatics have practical national security importance, because they represent a new way to analyze sociopolitical dynamics and trends, from terrorist recruitment to cyber warfare. However, translating innovative basic research into useful, usable, adoptable, and trustworthy tools that benefit the daily work of national security experts is challenging. Drawing on several years’ worth of ethnographic fieldwork among national security experts, this paper suggests that information ecology, activity theory, and participatory modeling provide theoretical frameworks and practical suggestions to support design and development of useful, usable, and adoptable modeling and simulation approaches for complex national security challenges.

Highlights

  • Making analytic software useful, usable, and adoptable in the context of the United States’ national security community is a difficult challenge

  • In relation to the national security community, proponents of biologically-inspired informatics believe these approaches might shed light on trends and threats that are not welladdressed by traditional social science theory and methods

  • If nothing else, coupling participatory modeling approaches with the activity theoretic approach described above can help technology developers appreciate the goals, constraints, outcomes, and impacts associated with national security analysis and decision-making

Read more

Summary

Introduction

Usable, and adoptable in the context of the United States’ national security community is a difficult challenge. Approaching contexts of use from an ecological perspective can help developers appreciate the design challenges associated with introducing new technologies into existing organizational cultures.

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.