The Application of Non-quantitative Modelling in the Analysis of a Network Warfare Environment

Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy of the various interacting components, a model to better understand the complexity in a network warfare environment would be beneficial. Non-quantitative modeling is a useful method to better characterize the field due to the rich ideas that can be generated based on the use of secular associations, chronological origins, linked concepts, categorizations and context specifications. This paper proposes the use of non-quantitative methods through a morphological analysis to better explore and define the influential conditions in a network warfare environment.





References:
[1] Zwicky, F. Discovery, "Invention, Research - Through the
Morphological Approach", Toronto: The Macmillan Company, New
York, 1969.
[2] Arquilla J & Rondfeldt D, "The Advent of Netwar", RAND, 1996.
[3] Harris, S," CISSP All-in-One Certification Guide", Mcgraw-
Hill/Osborne, 2002.
[4] Zwicky, F. & Wilson A. (eds.), "New Methods of Thought and
Procedure: Contributions to the Symposium on Methodologies", Berlin:
Springer, 1967.
[5] Ritchey T, "Modelling Complex Socio-Technical Systems Using
Morphological Analysis", Adapted from an address to the Swedish
Parliamentary IT Commission, Stockholm, December 2002.
[6] The Free Dictionary, "Ontology", Available online from
http://www.thefreedictionary.com/ontology, Accessed 14 march 2008.
[7] G J Stein, "Information Warfare", Airpower Journal, No 1, pp 30-39,
Spring 1995.
[8] Ritchy T, "General Morphological Analysis", Adapted from the paper
"Fritz Zwicky, Morphologie and Policy Analysis", presented at the 16th
EURO Conference on Operational Analysis, Brussels, 1998.
[9] Wik MW, "Revolution in Information Affair", Available online from:
http://www.kkrva.se/Links/Infokrig/Wik1.html, Accessed 13 February
2008.
[10] Elbirt AJ, "Information Warfare: Are you at risk? ", IEEE Technology
and Society Magazine, 2003/2004.
[11] Bhalla N, "Is the Mouse Click Mighty Enough to Bring Society to its
Knees", Computers & Security, vol. 22, issue 4, pp 322-336, May 2003.
[12] Sensepost Training Providers, "Hacking by Numbers: Cadet Edition",
Adapted from the Cadet Training Edition course slides, November 2007.
[13] Panda B & Giordano J, "Defensive Information Warfare",
Communications of the ACM, vol. 42 no. 7, pp 31-32, July 1999.