The Orientation step of the OODA loop and Information Warfare
نویسندگان
چکیده
This paper develops a theoretical model of the internal processes of the Orientation step of Boyd's OODA loop model. The Orientation step is important from an Information Warfare perspective as it is where the decision-maker combines their existing knowledge with new information. Any new information is a potential target for manipulation by Information Warfare attacks. The operation of the two Information Warfare attacks that target the Orientation step, deception and self-deception, are examined with the proposed model.
منابع مشابه
Manipulating the Ooda Loop: the Overlooked Role of Information Resource Management in Information Warfare
A ground–swell of interest in information as a weapon of warfare is growing within the U.S. armed services. Military strategists are looking at information as a tool to leverage our forces and make them irresistible in battle. Yet, there is little agreement as to what information warfare (IW) is, let alone how it is best fought. This fundamental disagreement is serving as an impediment to unifi...
متن کاملMisperception, Self-Deception and Information Warfare
Deception techniques are Information Warfare strategies commonly used by biological organisms and organisations to gain an advantage during competition. In this paper we examine two related techniques, misperception and self-deception, which we relate to the four canonical Information Warfare strategies and Boyd's OODA loop model.
متن کاملModelling Information Warfare as a Game
Game theory is one of the possible ways to study information warfare with mathematical models. This paper presents four example games which illustrate the different requirements for an effective playing strategy in information warfare. These games study, how a bold playing strategy can lead to domination, how a mixed playing strategy can reduce domination, how it can be useful to play a dominat...
متن کاملThe Dynamic OODA Loop: Amalgamating Boyd’s OODA Loop and the Cybernetic Approach to Command and Control ASSESSMENT, TOOLS AND METRICS
This paper presents the Dynamic OODA loop, or DOODA loop for short, a generic model of Command and Control (C2) stemming from Boyd’s OODA loop and cybernetic models of C2. The DOODA loop is formulated in terms of functions that must be accomplished for effective C2, and these functions are then studied in terms of (partially overlapping) processes. The DOODA loop preserves the prescriptive rich...
متن کاملManaging Software Development Risk with the OODA Loop
Page Managing Software Development Risk with the OODA Loop Nathaniel D. Amsden, Narasimha K. Shashidhar Doi : 10.7321/jscse.v2.n7.1 Abstract . Software development projects are subject to risks like any other project. These risks must be managed in order for the project to succeed. Current frameworks and models for risk identification, assessment and management are static and unchanging. They l...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006