Decision support model for effects estimation and proportionality assessment for targeting in cyber operations

Journal Article (2020)
Author(s)

C. Maathuis (Open University of the Netherlands, Netherlands Defence Academy, TNO, TU Delft - Information and Communication Technology)

W Pieters (TU Delft - Organisation & Governance)

Jan van den Berg (TU Delft - Information and Communication Technology)

Research Group
Information and Communication Technology
Copyright
© 2020 E.C. Maathuis, W. Pieters, Jan van den Berg
DOI related publication
https://doi.org/10.1016/j.dt.2020.04.007
More Info
expand_more
Publication Year
2020
Language
English
Copyright
© 2020 E.C. Maathuis, W. Pieters, Jan van den Berg
Research Group
Information and Communication Technology
Issue number
2
Volume number
17
Pages (from-to)
352-374
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Cyber operations are relatively a new phenomenon of the last two decades. During that period, they have increased in number, complexity, and agility, while their design and development have been processes well kept under secrecy. As a consequence, limited data(sets) regarding these incidents are available. Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations (such as attack, target identification and selection, and collateral damage), still methodologies and models are needed in order to plan, execute, and assess them in a responsibly and legally compliant way. Based on these facts, it is the aim of this article to propose a model that i)) estimates and classifies the effects of cyber operations, and ii) assesses proportionality in order to support targeting decisions in cyber operations. In order to do that, a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical – military experts. The proposed model was evaluated on two cyber operations use cases in a focus group with four technical – military experts. Both the design and the results of the evaluation are revealed in this article.