Richard Craig
Soft systems methodology in net-centric cyber defence system development
Craig, Richard; Spyridopoulos, Theodoros; Tryfonas, Theo; May, John
Authors
Theo Spyridopoulos Theo.Spyridopoulos@uwe.ac.uk
Occasional Associate Lecturer - CSCT FET
Theo Tryfonas
John May
Abstract
© 2014 IEEE. Complexity is ever increasing within our information environment and organisations, as interdependent dynamic relationships within sociotechnical systems result in high variety and uncertainty from a lack of information or control. A netcentric approach is a strategy to improve information value, to enable stakeholders to extend their reach to additional data sources, share Situational Awareness (SA), synchronise effort and optimise resource use to deliver maximum (or proportionate) effect in support of goals. This paper takes a systems perspective to understand the dynamics within a net-centric information system. This paper presents the first stages of the Soft Systems Methodology (SSM), to develop a conceptual model of the human activity system and develop a system dynamics model to represent system behaviour, that will inform future research into a net-centric approach with information security. Our model supports the net-centric hypothesis that participation within a information sharing community extends information reach, improves organisation SA allowing proactive action to mitigate vulnerabilities and reduce overall risk within the community. The system dynamics model provides organisations with tools to better understand the value of a net-centric approach, a framework to determine their own maturity and evaluate strategic relationships with collaborative communities.
Citation
Craig, R., Spyridopoulos, T., Tryfonas, T., & May, J. (2014). Soft systems methodology in net-centric cyber defence system development. IEEE International Conference on Systems Man and Cybernetics, 2014-January(January), 672-677. https://doi.org/10.1109/SMC.2014.6973986
Journal Article Type | Conference Paper |
---|---|
Conference Name | IEEE International Conference on Systems, Man and Cybernetics (SMC), 2014 |
Conference Location | San Diego, California, USA |
Start Date | Oct 5, 2014 |
End Date | Oct 8, 2014 |
Acceptance Date | Jun 4, 2014 |
Publication Date | Jan 1, 2014 |
Deposit Date | Mar 16, 2016 |
Publicly Available Date | Mar 29, 2024 |
Journal | Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics |
Print ISSN | 1062-922X |
Peer Reviewed | Peer Reviewed |
Volume | 2014-January |
Issue | January |
Pages | 672-677 |
Book Title | 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC) |
DOI | https://doi.org/10.1109/SMC.2014.6973986 |
Keywords | information systems, collaborative communities, information sharing, situational awareness, system dynamics, information security, net-centric approach |
Public URL | https://uwe-repository.worktribe.com/output/823831 |
Publisher URL | http://dx.doi.org/10.1109/SMC.2014.6973986 |
Additional Information | Additional Information : © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Title of Conference or Conference Proceedings : IEEE International Conference on Systems, Man and Cybernetics (SMC), 2014 |
Files
Soft Systems Methodology in Net-Centric Cyber Defence System Development.pdf
(406 Kb)
PDF
You might also like
Efficient and interpretable real-time malware detection using random-forest
(2019)
Conference Proceeding
Critical infrastructure cyber-security risk management
(2017)
Book Chapter
System dynamics approach to malicious insider cyber-threat modelling and analysis
(2017)
Journal Article
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention
(2015)
Journal Article
Real-time monitoring of privacy abuses and intrusion detection in android system
(2015)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search