<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Command and Control in Crisis Management</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">10</style></volume><pages><style face="normal" font="default" size="100%">15-23</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the light of the recent terrorism and the beginnings of what will likely be a long war involving many attacks on this country, it is time that we think of command and control systems that are capable of being extended to the civilian components which will ultimately be working with and alongside military forces. Command and control systems gather information from increasingly smaller sized units, and also from a wider variety of types of organizations and systems. This is reflected in new data elements which themselves reflect new types and capabilities of military and civilian units and equipment.
All that is required is the will to extend and unify command and control. Perhaps the new office of Homeland Defense can define the framework in which military command and control can be extended to civil agencies and organizations and help define the nature and extent of data standardization that will allow for independent yet coordinated development. The Global Command and Control System (GCCS) is an example of one command and control system that could be of value. An unclassified version of this system could be set up with special attention to unclassified data exchange which would allow senior military commanders to view civil response units and at the same time release similar information to appropriate civil authority thereby aiding in planning.
The paper also provide a glimpse on the challenges of bio-terrorism.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Dialectics of Information – A Framework</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2000</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">33-40</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The Shannon-Hartley Theorem for the information-carrying capacity of a noisy communication channel is an elegant way to unify Attack and Protect concepts in Electronic Warfare (EW). Using this principle, all EW measures can be seen as attempts to increase (reduce) bandwidth or Signal to Noise Ratio. Shannon’s Formula for Mutual Information is an extension of this principle to the Information Dialectic in which all Attack and Protect measures are attempts to increase (reduce) Information Bandwidth or Entropy (ambiguity). This characterization of Information Warfare is domain independent and very widely applicable.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Linda Elliott</style></author><author><style face="normal" font="default" size="100%">Andrew Borden</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Human Intuition and Decision-making Systems (II)</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp;Security : An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><volume><style face="normal" font="default" size="100%">2</style></volume><pages><style face="normal" font="default" size="100%">50-54.</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A canonical design method was applied to the task of building a system to classify airborne targets according to their threat status and the appropriate response from an Integrated Air Defense System. The nature of the data base made the classification task (understandably) difficult. However, partial disclosure of the deterministic algorithm used to classify targets made the classification task even more difficult, contrary to intuition. The inadequacy of intuition is a compelling reason for using canonical methods to design for decision making systems.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Human Intuition and Decision-making Systems (II)</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year><pub-dates><date><style  face="normal" font="default" size="100%">1999</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">2</style></volume><pages><style face="normal" font="default" size="100%">50-54</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article discusses how a canonical design method was used to build a system to classify airborne targets according to their threat status, and to specify the appropriate response from an integrated air defense system. The paper argues that the inadequacy of human intuition is a strong reason to use canonical methods for designing decision making systems.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Design And Evaluation of Situation Assessment Strategies</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year><pub-dates><date><style  face="normal" font="default" size="100%">1998</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">63-74</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper is based on the idea that, if Information Warfare is important, it must be exercised. If we conduct an IW exercise, we need to perform a quantitative evaluation to learn how to do things better. We can hardly do this if we have no operational (quantifiable) definition of Information, itself. The meaning of &amp;ldquo;Information&amp;rdquo; presented in this paper is based on the Shannon definitions of the 1940&amp;rsquo;s which were the basis for what has become the mathematical theory of information. Situation Assessment is defined as &amp;ldquo;Systematic generation and use of Information to reduce uncertainty about the composition, readiness, location and status of adversary forces and systems.&amp;rdquo; The paper contains an explanation of the meanings of, and relationships between messages from an environment; uncertainty; knowledge; information; and situation assessment. It further explains how Information is generated from Messages in the presence of Knowledge, how it is measured and how it is used efficiently to perform Situation Assessment. A working tool for the measurement of information and the design and/or evaluation of situation assessment strategies is described and its use is illustrated with a numerical example. The tool guarantees a very efficient situation assessment strategy and provides performance numbers in the form of throughput, response time and amount of information required to complete the assessment with high confidence.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Andrew Borden</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Design And Evaluation of Situation Assessment Strategies</style></title><secondary-title><style face="normal" font="default" size="100%">Information Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">63 - 74.</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Human Intuition and Decision-making Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year><pub-dates><date><style  face="normal" font="default" size="100%">1998</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">67-72</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Machine-aided decision-making in complicated situations is demonstrably superior to unaided, human decision-making. In addition to being consistent and unbiased, computers can perform the very complex calculations needed to design formal, self-validating decision-making systems. An important advantage to self-validating systems is that they provide statistics which allow the user to diagnose and compensate for difficulties associated with complexity. This paper contains examples of problem domains which seem similar, but for which the difficulty varies greatly. The absence of intuition would have made the design of decision-making algorithms risky, if not impossible, in these cases.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Andrew Borden</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Information Warfare Roadmap</style></title><secondary-title><style face="normal" font="default" size="100%">Information Aspects of Security and Development of Modern Societies,AFCEA Europe Seminar</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>