dc.contributor.author |
Veerasamy, Namosha
|
|
dc.date.accessioned |
2010-11-15T12:11:18Z |
|
dc.date.available |
2010-11-15T12:11:18Z |
|
dc.date.issued |
2010-04 |
|
dc.identifier.citation |
Veerasamy, N. 2010. High-level mapping of cyberterrorism to the OODA Loop. 5th International Conference on Information Warfare and Security. Ohio, United States of America, 8-9 April 2010, pp 352-360 |
en |
dc.identifier.isbn |
97-1-906638-60-3 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/4555
|
|
dc.description |
5th International Conference on Information Warfare and Security. Ohio, United States of America, 8-9 April 2010 |
en |
dc.description.abstract |
The aim of this paper is to describe how various observations made by sections of the world population direct people into making decisions and committing acts of cyberterror. The paper will thus look at issues like the environmental factors, social standing, culture, religion, tribal relations, loyalties, and the drive for power and self-fulfilment. In addition, the mapping will also consider how information is received, transformed and utilised by cyberterrorists, by considering the evolution of information in the Information Hierarchy. The proposed model will thus map various aspects pertinent to the field of cyberterrorism to capture a more dynamic representation of the interacting forces. The mapping will try to show the main relationships between the OODA loop, Information Hierarchy and various factors like characteristics, social factors, terrorist types, capabilities, goals, targets, attack levels, support functions, practices and modes of operation. Overall, the goal of this paper is to succinctly represent some of the psychological and technical issues relating to cyberterrorism. The OODA loop will be utilised to convey these ideas as well mapping to other relevant fields like the Information Hierarchy. Overall, various components that impact the field of cyberterrorism will be integrated to show a more holistic representation of various operating forces |
en |
dc.language.iso |
en |
en |
dc.relation.ispartofseries |
Conference Paper |
en |
dc.subject |
Cyberterrorism |
en |
dc.subject |
Information warfare |
en |
dc.subject |
Information hierarchy |
en |
dc.subject |
OODA loop |
en |
dc.subject |
Information security |
en |
dc.title |
High-level mapping of cyberterrorism to the OODA Loop |
en |
dc.type |
Conference Presentation |
en |
dc.identifier.apacitation |
Veerasamy, N. (2010). High-level mapping of cyberterrorism to the OODA Loop. http://hdl.handle.net/10204/4555 |
en_ZA |
dc.identifier.chicagocitation |
Veerasamy, Namosha. "High-level mapping of cyberterrorism to the OODA Loop." (2010): http://hdl.handle.net/10204/4555 |
en_ZA |
dc.identifier.vancouvercitation |
Veerasamy N, High-level mapping of cyberterrorism to the OODA Loop; 2010. http://hdl.handle.net/10204/4555 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Veerasamy, Namosha
AB - The aim of this paper is to describe how various observations made by sections of the world population direct people into making decisions and committing acts of cyberterror. The paper will thus look at issues like the environmental factors, social standing, culture, religion, tribal relations, loyalties, and the drive for power and self-fulfilment. In addition, the mapping will also consider how information is received, transformed and utilised by cyberterrorists, by considering the evolution of information in the Information Hierarchy. The proposed model will thus map various aspects pertinent to the field of cyberterrorism to capture a more dynamic representation of the interacting forces. The mapping will try to show the main relationships between the OODA loop, Information Hierarchy and various factors like characteristics, social factors, terrorist types, capabilities, goals, targets, attack levels, support functions, practices and modes of operation. Overall, the goal of this paper is to succinctly represent some of the psychological and technical issues relating to cyberterrorism. The OODA loop will be utilised to convey these ideas as well mapping to other relevant fields like the Information Hierarchy. Overall, various components that impact the field of cyberterrorism will be integrated to show a more holistic representation of various operating forces
DA - 2010-04
DB - ResearchSpace
DP - CSIR
KW - Cyberterrorism
KW - Information warfare
KW - Information hierarchy
KW - OODA loop
KW - Information security
LK - https://researchspace.csir.co.za
PY - 2010
SM - 97-1-906638-60-3
T1 - High-level mapping of cyberterrorism to the OODA Loop
TI - High-level mapping of cyberterrorism to the OODA Loop
UR - http://hdl.handle.net/10204/4555
ER -
|
en_ZA |