Design

Operational Design, Taming Wicked Problems, and Lawfare

Abstract:

This paper examines operational design as one aspect of a larger design-thinking domain. Design and designing are firmly established within the literature and describe those actions and endeavours associated with creating form and/or function—the object at the centre of the writers’ attention has a purpose and its purposefulness can be measured objectively. Operational design, on the other hand, is a relatively new term and is used within a military context to describe a form of operational planning that is more attentive to the inner subtleties of an area of interest and necessarily postpones the development of courses of action until after the subject has been thoroughly and comprehensively appreciated. It acknowledges the key characteristics of wickedness and messiness that also frustrate efforts to achieve outcomes in heavily contested social contexts—conflict. In these contexts, there is a rich presence of those who oppose, those who are neutral, and those who support—all must be attended to. Ultimately, all conflict is a clash of wills and a search for asymmetry; operational design and growing the practise of lawfare, therefore, aids the development, sequencing, and execution of least effort activities to achieve specified outcomes. The method presented does not seek to replace current military planning process; it does, however, offer a valuable companion method for situations of great complexity and ambiguity, where imaginative thinking, including the use of lawfare, may be appropriate.

The Importance of Human Factors when Assessing Outsourcing Security Risks

ABSTRACT

The word is becoming increasingly interconnected and ways of doing business are evolving rapidly. Communications technology is ubiquitous and reliable and businesses are continuously seeking ways in which systems can be exploited to improve resilience, become more efficient and reduce costs. One way in which organisations seek to achieve this is by concentrating their efforts on core business processes and outsourcing non-core functions. However, outsourcing - and particularly off-shoring - presents many security issues that must be considered throughout the lifetime of contracts. The scale of outsourcing and increasing technological and security complexity is making this task more difficult. Often neglected, or given low priority, are factors relating to the people who will be working on the contract. These factors will be driven by regional and cultural differences and will manifest themselves in differing security threat and risk profiles and risk management frameworks must be designed to recognise and cater for these variations.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    21 North Broad Street
    Suite 2-H
    Luray, VA 
    22835 
  • 757.581.9550
  • JIW@ArmisteadTec.com