Preview

Methodology to Map Information Environment

Powerful Essays
Open Document
Open Document
2459 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Methodology to Map Information Environment
Mapping the Information Environment By Robert Cordray III
Marc J. Romanych, Major, USA (Retired) Editorial Abstract: A follow-on discussion from last issue’s article, “A Theory Based View of IO,” authors Robert Cordray and Marc Romanych present a methodology to “map” the information environment, much like a commander’s J2 maps the physical characteristics of the area of operations. Giving clarity to the information environment, in turn, allows the commander to gain an understanding of its impact and importance, ultimately leading to a more effective information operation.

I

f information operations (IO) are to be fully integrated and is needed to organize our view of the environment. For this executed by the Joint Force, then the commander and staff’s purpose, a model – the three domains of conflict – developed visualization of the area of operations must be expanded to by the Department of Defense Command and Control Research include the information environment. However, graphic Program (DoD CCRP) is particularly appropriate.3 The CCRP representation of the information environment remains a model describes three distinct, but closely interconnected challenge for IO staffs. The problem confronting the staff is domains – physical, information, and cognitive – that, in how to analyze and succinctly describe the character and effects sum, explain the importance of information to military of an operating environment that is largely non-physical and operations and, for the purposes of analysis, the character of abstract. the information environment. The three domains can be very This article presents a methodology that, as part of Joint briefly described as follows (see Figure 1).4 Intelligence Preparation of the The physical domain is the Battlespace (JIPB), can be used to “For the practitioner of IO, the most real world environments of land, “map” the information environment intangible element of the information sea, air, and space. It is where in a manner

You May Also Find These Documents Helpful

  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    An InfoSec program is sometimes at odds with the goals and objectives of the IT department as a whole…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Consists of three vantage points: business objectives – info must conform to seven categories of criteria that map into the objectives established by the COSO to satisfy business objectives. IT resources – includes people, application systems, technology, facilities, and data. IT Processes – broken into 4 domains: planning and organizing, acquisition and implementation, delivery and support, and monitoring and…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Operation Husky Essay

    • 1350 Words
    • 6 Pages

    The Commander is the central figure in mission command and must blend the art of command and the science of control to integrate all joint warfighting functions. The Command and Control demonstrated during Operation Husky by Allied Forces failed to successfully meet the three key attributes of mission command and demonstrated numerous weaknesses integrating the joint force. Although Operation Husky was a victory for Allied forces, supporting paragraphs will provide examples of miscues that could have been detrimental to success; with subsequent paragraphs highlighting the integration of additional joint functions; fires and intelligence, during the operational level of Operation Husky.…

    • 1350 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Assignment 1

    • 1252 Words
    • 6 Pages

    Companies use information as a weapon in the battle to increase productivity, deliver quality products and services, maintain customer loyalty, and make sound decisions. Information technology can mean the difference between success and failure…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    Information Technology (IT) is a set of tools, processes and methodologies (such as coding, programming, data communications, data conversion, storage and retrieval, system analysis and design, systems control) and associated equipment employed to collect, process, and present information. In broad terms, IT also includes office automation, multimedia and telecommunications. It is defined as the technology used involving the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data. IT is a broad subject concerned with all aspects of managing and processing information, especially within a large organization or company. Because computers are central to information management,…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The United States Marine Corps Intelligence featured and updated their doctrine and strategic intent. These are Marine Corps Vision and Strategy 2025, Marine Corps Operating Concepts, and the MCISR-E Roadmap. These documents, along with the organizational literature form the basis for assessment the organization’s objectives. These sources reveal the essence of prevailing obstructions and offer a means to evaluate the costs of various organizational courses of action to diminish intelligence issues. In detail, the Vision and Strategy 2025 details the concept for the future and a strategy for its operationalization, while the Marine Corps Operating Concepts presents primary operating concepts, including the USMC’s role in national security…

    • 196 Words
    • 1 Page
    Good Essays
  • Good Essays

    While serving as G-2 for General Patton, Brigadier General Oscar Koch developed and employed early Intelligence Preparation of the Battlefield (IPB) practices, laying the groundwork for the modern intelligence cycle. Koch’s disciplined approach fused traditional and non-traditional intelligence sources and established the forward-leaning, product-driven intelligence process used today (Confidence, n.d.). Throughout campaigns in North Africa and Europe during World War II, Koch honed the intelligence mission into a dynamic, flexible, and effective process; directly contributing to Patton’s successes (Hays, 2013). Koch’s most enduring contribution to the intelligence discipline includes the stewardship of all-source intelligence in the face of…

    • 792 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Army Design Methodology

    • 1404 Words
    • 6 Pages

    At first glance, the Army Design Methodology (ADM) seems to be a convoluted and typically optional pre-stage of Mission Analysis within the Military Decision Making Process (MDMP). But the ADM is distinctly separate in goals, detail, and scope. At its heart, the ADM allows a commander and his staff to view a problem via three lenses: Operational Environment (which includes the Current and Desired End State), Problem Framing, and Operational Approach. To help our organization grasp these concepts, this paper uses two main historical examples. First, to break out of a military paradigm mindset, it provides an analogous story of the space race to explain what the ADM is and is not. Second, this paper uses the ADM to analyze two key portions…

    • 1404 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    outline

    • 2553 Words
    • 11 Pages

    an information system for an organisation are covered, including the impact of the system on its intended…

    • 2553 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    The future Army information network contributes to this characteristic through robust network capacity, dynamic network management, and access, availability, and protection of data and information. The Army information network is configured and reconfigured easily, secured, operated, maintained, and sustained to enable freedom of action and the exercise of disciplined initiative on land and through cyberspace. The Army information network facilitates the visualization, and agile, responsive, and informed management of its voice and data transport resources to scale and align with the commander’s changing intent and priorities, modifications to task organization and scheme of maneuver,…

    • 932 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    information system (IS) strategic drivers. These techniques can be vital contributors in the IS strategy…

    • 7202 Words
    • 29 Pages
    Powerful Essays
  • Satisfactory Essays

    From a business perspective, an information system provides a solution to a problem or challenge facing a firm and represents a combination of management, organisation, and technology elements. The management dimension of information systems involves issues such as leadership, strategy and management behaviour. The technology dimension consists of computer hardware, software, data management technology, and networking/telecommunications technology (including the Internet). The organisation dimension of information systems involves issues such as the organisation’s hierarchy, functional specialties, business processes, culture, and political interest groups.…

    • 310 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Use

    • 777 Words
    • 4 Pages

    In today’s business environment information is the most important asset a business has, this information helps to support, maintain, develop and track its daily activities. The next logical step is implementing a system that is conducive and geared towards this goal. With the help of its information system, and its information technology department, managers, sales people, the operations department and others with access to this information have a handy tool to help them do their work on a daily basis. The structure of the information system is paramount on how accessible this information is to the people that depend upon it to complete their normal workday. The managers and IT department work closely together to agree upon and decide on an information system that will be feasible to the business itself, thus setting up a system that will be beneficial to the business itself.…

    • 777 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    References: An artillerization of the military decision making process (MDMP). (n.d.). Retrieved August 31, 2006, from http://www.globalsecurity.org/military/library/report/call/…

    • 1230 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Y2K Bug

    • 2724 Words
    • 11 Pages

    References: 1. Computer Design and Architecture, L. Howard Pollard, 1990, Prentice-Hall, Inc. 2. Software engineering, Roger S. Pressman, 1987, McGraw-Hill, Inc. 3. Assembly Language, Jeff Duntemann, 1992, John Wiley and Sons, Inc. 4. Assembly Language for the PC, John Socha and Peter Norton, 1992, Brady Publishing 5. Advanced Assembly Language, Allen L. Wyatt, Sr., 1992, Que Corporation 6. 8-Bit microprocessor and Peripheral Data, Motorola, Inc., 1983, Motorola, Inc. 7. Organizational Behavior Human Behavior at Work, John W. Newstrom and Keith Davis, 1997, McGraw-Hill 8. Management Information Systems, Kenneth C. Laudon and Jane P. Laudon, 1998, Prentice Hall, Inc. 9. Understanding Business, Nickels * McHugh * McHugh, 1987, Times Mirror/Mosby College Publishing 10. Project Plan Document developed by the Best Practices Subcommittee of the Interagency Committee, Unknown authors and date of publication. 11. Year 2000 Management Plan, March 1997, Office of the Assistant Secretary of Defense, (C3I) 12. Year 2000, Biting the Silver Bullet, Peter de Jager, 1/13/97, Internet paper. 13. Agencies Year 2000 Repair Pace Criticized, Rajiv Chandrasekaran and Stephen Barr, Washington Post, 3 May 1998. 14. DoD to Share Early Warning Data to Stem Y2K Failures in Russia, China, Pamela Hess, 5 May 1998, Defense Information and Electronics Report. 15 Year 2000 Bug could Spook Russians, Author Unknown, Washington Times, 5 May 1998. Glossary 1. DoD - Department of Defense 2. Y2K - Year 2000 3. C3I - Command, Control, Communications, and Intelligence…

    • 2724 Words
    • 11 Pages
    Powerful Essays