ResearchSpace

High-level mapping of cyberterrorism to the OODA Loop

Show simple item record

dc.contributor.author Veerasamy, Namosha
dc.date.accessioned 2010-11-15T12:11:18Z
dc.date.available 2010-11-15T12:11:18Z
dc.date.issued 2010-04
dc.identifier.citation Veerasamy, N. 2010. High-level mapping of cyberterrorism to the OODA Loop. 5th International Conference on Information Warfare and Security. Ohio, United States of America, 8-9 April 2010, pp 352-360 en
dc.identifier.isbn 97-1-906638-60-3
dc.identifier.uri http://hdl.handle.net/10204/4555
dc.description 5th International Conference on Information Warfare and Security. Ohio, United States of America, 8-9 April 2010 en
dc.description.abstract The aim of this paper is to describe how various observations made by sections of the world population direct people into making decisions and committing acts of cyberterror. The paper will thus look at issues like the environmental factors, social standing, culture, religion, tribal relations, loyalties, and the drive for power and self-fulfilment. In addition, the mapping will also consider how information is received, transformed and utilised by cyberterrorists, by considering the evolution of information in the Information Hierarchy. The proposed model will thus map various aspects pertinent to the field of cyberterrorism to capture a more dynamic representation of the interacting forces. The mapping will try to show the main relationships between the OODA loop, Information Hierarchy and various factors like characteristics, social factors, terrorist types, capabilities, goals, targets, attack levels, support functions, practices and modes of operation. Overall, the goal of this paper is to succinctly represent some of the psychological and technical issues relating to cyberterrorism. The OODA loop will be utilised to convey these ideas as well mapping to other relevant fields like the Information Hierarchy. Overall, various components that impact the field of cyberterrorism will be integrated to show a more holistic representation of various operating forces en
dc.language.iso en en
dc.relation.ispartofseries Conference Paper en
dc.subject Cyberterrorism en
dc.subject Information warfare en
dc.subject Information hierarchy en
dc.subject OODA loop en
dc.subject Information security en
dc.title High-level mapping of cyberterrorism to the OODA Loop en
dc.type Conference Presentation en
dc.identifier.apacitation Veerasamy, N. (2010). High-level mapping of cyberterrorism to the OODA Loop. http://hdl.handle.net/10204/4555 en_ZA
dc.identifier.chicagocitation Veerasamy, Namosha. "High-level mapping of cyberterrorism to the OODA Loop." (2010): http://hdl.handle.net/10204/4555 en_ZA
dc.identifier.vancouvercitation Veerasamy N, High-level mapping of cyberterrorism to the OODA Loop; 2010. http://hdl.handle.net/10204/4555 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Veerasamy, Namosha AB - The aim of this paper is to describe how various observations made by sections of the world population direct people into making decisions and committing acts of cyberterror. The paper will thus look at issues like the environmental factors, social standing, culture, religion, tribal relations, loyalties, and the drive for power and self-fulfilment. In addition, the mapping will also consider how information is received, transformed and utilised by cyberterrorists, by considering the evolution of information in the Information Hierarchy. The proposed model will thus map various aspects pertinent to the field of cyberterrorism to capture a more dynamic representation of the interacting forces. The mapping will try to show the main relationships between the OODA loop, Information Hierarchy and various factors like characteristics, social factors, terrorist types, capabilities, goals, targets, attack levels, support functions, practices and modes of operation. Overall, the goal of this paper is to succinctly represent some of the psychological and technical issues relating to cyberterrorism. The OODA loop will be utilised to convey these ideas as well mapping to other relevant fields like the Information Hierarchy. Overall, various components that impact the field of cyberterrorism will be integrated to show a more holistic representation of various operating forces DA - 2010-04 DB - ResearchSpace DP - CSIR KW - Cyberterrorism KW - Information warfare KW - Information hierarchy KW - OODA loop KW - Information security LK - https://researchspace.csir.co.za PY - 2010 SM - 97-1-906638-60-3 T1 - High-level mapping of cyberterrorism to the OODA Loop TI - High-level mapping of cyberterrorism to the OODA Loop UR - http://hdl.handle.net/10204/4555 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record