Evolution of military information security

Juha Mattila, Simon Parkinson

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Abstract

This paper studies the evolution of military information security mainly within force support and generation areas of military affairs from enterprise architecture viewpoint. The study provides a tool for enterprise architects to analyse the current state of the military enterprise and seek possibilities to re-engineer the Command, Control, Communications, Computers, and Information (C4I) related capabilities. The paper is a part of writers' research in finding why so many C4I related development programs have faced challenges. The research follows the lines of the hypothetico-deductive model. The paper assumes that there exists a trust mechanism of physical, system, application, and container (Chen and Gong, 2012) and that there exist paths of development linking these trust mechanisms together that an enterprise will follow when selecting one trust mechanism to replace an another. When the hypothesis is studied with an evolutionary model based on the work of Mokyr (1998), Andriani and Carigani (2012), and Choo (1998), different paths of transformation emerge. These paths are illustrated on a roadmap that reflects different evolutionary powers and approaches for military information security. The roadmap is tested with several empirical cases captured from military organizations past 20 years. Changes in commercial information security also validate the roadmap. Together these cases demonstrate the validity of the hypothesis. The resulting roadmap for information security illustrates both stages, paths, and forces of evolution for enterprise architects to analyse complex transformational situations. For many enterprise architects, it is hard to define how the business and cultural natures of the organisation will react to renewed technology. The roadmap for information security helps the architect to assess the status of information security of the enterprise by focusing on the trust mechanism. The architect can then use the roadmap to consider different development paths, optimizing technical solutions with business structures and cultures.

Original languageEnglish
Title of host publicationProceedings of the 16th European Conference on Cyber Warfare and Security, ECCWS 2017
PublisherCurran Associates, Inc.
Pages610-618
Number of pages9
ISBN (Electronic)9781911218432
Publication statusPublished - 2017
MoE publication typeA4 Article in a conference publication
EventEuropean Conference on Cyber Warfare and Security - Dublin, Ireland
Duration: 29 Jun 201730 Jun 2017
Conference number: 16

Conference

ConferenceEuropean Conference on Cyber Warfare and Security
Abbreviated titleECCWS
CountryIreland
CityDublin
Period29/06/201730/06/2017

Keywords

  • Availability
  • Command
  • Communications
  • Computers and information
  • Confidentiality
  • Control
  • Enterprise architecture
  • Evolutionary theory
  • Information security
  • Integrity

Fingerprint Dive into the research topics of 'Evolution of military information security'. Together they form a unique fingerprint.

Cite this