Reliability

How to Measure Strategic Influence: A New Science for National Security

Abstract:

The United States’ national security strategy is an influence strategy—the effectiveness of which cannot be measured. The strategy’s effectiveness is unmeasurable because influence operations still have not solved the assessment problem. The Department of Defense influence doctrine relies on unreliable practices from advertising and has never taken up a program of research to apply the very advanced psychological science of influence to the national security domain. Robust methods of operational design, variable control, and measurement are absent from national security influence, and there is no organization or mechanism to coordinate and deconflict operations across the whole of government.

Illustrative Examples of How to Measure Influence Operations: Experimental and Statistical Methods for Causal Inference

Abstract:

National security influence professionals have always struggled with influence measures of effectiveness and operational assessments. This paper includes fictional examples that illustrate how experimental methods from psychological science can address this problem. Three fictional use cases are examined. A scientific approach to national security influence is essential to accumulating knowledge in this domain. Without it, the information operations community will continue to struggle to identify what works and why.

Energy-Conscious Adaptive-Security Scheme: A Reliability-Based Stochastic Approach

Abstract:

The increasing importance of information and communication, which plays a big role in a number of different fields in the modern era, brings with it the need for security. At the same time, encryption, which is an indispensable part of security architecture, is computationally intensive and may require a significant amount of energy consumption. Thus, it is of great importance to provide a sufficient level of security while properly utilising the available resources. This research suggests a security framework based on the Reliability Function, along with the added ability to dynamically adjust the security level with respect to energy consumption, either according to the severity of the requested service or according to a specified energy threshold.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com