Abstract
Although a fairly new topic in the context of cyber security, situation awareness (SA) has a far longer history of study and applications in such areas as control of complex enterprises and in conventional warfare. Far more is known about the SA in conventional military conflicts, or adversarial engagements, than in cyber ones. By exploring what is known about SA in conventional—also commonly referred to as kinetic—battles, we may gain insights and research directions relevant to cyber conflicts. For this reason, having outlined the foundations and challenges on CSA in the previous chapter, we proceed to discuss the nature of SA in conventional (often called kinetic) conflict, review what is known about this kinetic SA (KSA), and then offer a comparison with what is currently understood regarding the cyber SA (CSA). We find that challenges and opportunities of KSA and CSA are similar or at least parallel in several important ways. With respect to similarities, in both kinetic and cyber worlds, SA strongly impacts the outcome of the mission. Also similarly, cognitive biases are found in both KSA and CSA. As an example of differences, KSA often relies on commonly accepted, widely used organizing representation—map of the physical terrain of the battlefield. No such common representation has emerged in CSA, yet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alberts, D.S., (2002), Information Age Transformation: Getting to a 21st Century Military, Washington, D.C., Command and Control Research Program (CCRP) Publications.
Alberts, D.S., Garstka, J.J., & Stein, F.P. (1999). Network Centric Warfare. Washington, D.C., Command and Control Research Program (CCRP) Publications.
Alberts, D. S., & Hayes, R. E. (2003). Power to the Edge: Command and Control in the Information Age. Washington D.C., Command and Control Research Program (CCRP) Publications.
Albrechtsen, Eirik, and Jan Hovden. “The information security digital divide between information security managers and users.” Computers & Security 28.6 (2009): 476-490.
Bowen, K.C. & McNaught, K.R, Mathematics in warfare: Lanchester theory, The Lanchester Legacy, Volume 3—A Celebration of Genious (N. Fletcher, ed.), Coventry University Press, Coventry, 1996.
Cho, Hichang, Jae-Shin Lee, and Siyoung Chung. “Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience.” Computers in Human Behavior 26.5 (2010): 987-995.
Dostal, B.C. (2007). Enhancing situational understanding through the employment of unmanned aerial vehicles. Interim Brigade Combat Team Newsletter, No. 01–18.
Endsley, M. R. (1988). Design and evaluation for situation awareness enhancement. In Proceedings of the Human Factors Society, 32 (pp. 97-101). Santa Monica, CA: Human Factors Society.
Endsley, M. R. (1995). Toward a theory of situation awareness in dynamic systems. Human Factors: The Journal of the Human Factors and Ergonomics Society, 37(1), 32-64.
Gantz, J., & Rochester, J. B. (2005). Pirates of the Digital Millennium. Upper Saddle River, NJ: Prentice Hall. ISBN 0-13-146315-2.
Greitzer, Frank L., Thomas E. Carroll, and Adam D. Roberts. “Cyber Friendly Fire.” Pacific Northwest National Laboratory, Tech. Rep. PNNL-20821 (2011).
Jain, A. (2005). Cyber Crime: Cyber crime: issues and threats (Vol. 2). Gyan Publishing House.
Jajodia, Sushil, et al. “Cauldron mission-centric cyber situational awareness with defense in depth.” MILITARY COMMUNICATIONS CONFERENCE, 2011-MILCOM 2011. IEEE, 2011.
Jakobson, G. (2011). Mission cyber security situation assessment using impact dependency graphs. Proceedings of the 14 th International Conference on Information Fusion (pp. 1-8).
Julisch, Klaus. “Understanding and overcoming cyber security anti-patterns.” Computer Networks 57.10 (2013): 2206-2211.
Klein, Gabriel, et al. “Towards a Model-Based Cyber Defense Situational Awareness Visualization Environment.” Proceedings of the RTO Workshop “Visualising Networks: Coping with Chance and Uncertainty”. Rome, NY, USA. 2010.
A. Kott, Raiding the Enemy’s Mind, Military Information Technology, Dec 29, 2007, Vol 11, Issue 11
Kott, Alexander, ed. Battle of cognition: the future information-rich warfare and the mind of the commander. Greenwood Publishing Group, 2008.
Kott, Alexander, et al. “Hypothesis-driven information fusion in adversarial, deceptive environments.” Information Fusion 12.2 (2011): 131-144.
Kott, Alexander, and Curtis Arnold. “The promises and challenges of continuous monitoring and risk scoring.” Security & Privacy, IEEE 11.1 (2013): 90-93.
Moffat, J. “Mathematical Modeling of Information Age Conflict” Journal of Applied Mathematics and Decision Sciences (2006): 1-15.
National Research Council. Network Science. Washington, DC: The National Academies Press, 2005.
Nurse, Jason RC, et al. “Trustworthy and effective communication of cybersecurity risks: A review.” Socio-Technical Aspects in Security and Trust (STAST), 2011 1st Workshop on. IEEE, 2011.
M. Ownby, and A. Kott, Reading the Mind of the Enemy: Predictive Analysis and Command Effectiveness, Command and Control Research and Technology Symposium, San Diego, CA, June 2006
Rajivan, Prashanth, et al. “Effects of Teamwork versus Group Work on Signal Detection in Cyber Defense Teams.” Foundations of Augmented Cognition. Springer Berlin Heidelberg, 2013. 172-180.
Rhee, Hyeun-Suk, Young U. Ryu, and Cheong-Tag Kim. “Unrealistic optimism on information security management.” Computers & Security 31.2 (2012): 221-2
Swan, J. and Hennig, J., From Data to Decisions. Army Acquisition, Logistics & Technology, January-March 2012.
Tyworth, Michael, Nicklaus A. Giacobe, and Vincent Mancuso. “Cyber situation awareness as distributed socio-cognitive work.” SPIE Defense, Security, and Sensing. International Society for Optics and Photonics, 2012.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Kott, A., Buchler, N., Schaefer, K.E. (2014). Kinetic and Cyber. In: Kott, A., Wang, C., Erbacher, R. (eds) Cyber Defense and Situational Awareness. Advances in Information Security, vol 62. Springer, Cham. https://doi.org/10.1007/978-3-319-11391-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-11391-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11390-6
Online ISBN: 978-3-319-11391-3
eBook Packages: Computer ScienceComputer Science (R0)