Developing a Cyber Operations Computational Ontology

Abstract: 

Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted, and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors. To tackle these issues, this article proposes a knowledge model for cyber operations implemented as a computational ontology following a design science approach grounded on extensive technical-military research.  This model classifies the essential entities of cyber operations and is exemplified in three case studies. Validation results show that this model can be used to describe cyber operations clearly and concisely.


AUTHORS

Photo of Dr. Clara Maathuis

Delft University of Technology, TNO, Netherlands Defense Academy
Delft, Netherlands

Dr. Clara Maathuis is a PhD Researcher in cyber operations at Delft University of Technology, TNO, and Netherlands Defense Academy, in the Netherlands.   Her research focuses on cyber warfare, artificial intelligence, and military/defense studies. She is a former software engineer and has worked in the telecommunications and control systems industries.

Photo of Dr. Wolter Pieters

Delft University of Technology
Delft, Netherlands

Dr. Wolter Pieters is an Associate Professor in Cyber Risk at Delft University of Technology, in the Netherlands. His research focuses on cyber risk management, human factors in cyber security, and the philosophy and ethics of information security.

Photo of Dr. Ir. Jan van den Berg

Delft University of Technology
Delft, Netherlands

Leiden University,
Netherlands

Dr. Ir. Jan van den Berg is a full Professor in Cyber Security at Delft University of Technology and Leiden University, in the Netherlands. His research focuses on Data Analytics (theory and applications) and Cyber Security (cyber risk management, among other topics).

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Media Parner to JIW.

Media Partner

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com