Cyber Defence Technologies and Architectures

Richard Craig

Research output: Contribution to conferenceConference Abstract


The aim of information security is to ensure business continuity by mitigating interruptions to infrastructure. To understand how the cyber domain supports activity and decision making requires an understanding of the infrastructure and process requirements, use and function, system dynamics of each domain and the inter-relationship with the cyber domain. To address the problem of cyber security capability, the core aspect of a systems thinking approach is to view a bigger picture (up a level of abstraction) to appreciate other perspectives and understand system intention. Understanding requirements for usability, visualisation and information integration requires the engagement of stakeholders, the alignment of need and workflow, impact on process and the C2 command structure, and a change management process.
To build a collaborative environment, with shared situational awareness, visualised across domain perspectives, the capabilities and expectations of such a system must be known and value conveyed to engage stakeholders. Through and understanding of the system, the elements and interactions, a common information system can be developed to allow collaborative real time interaction with information to aid decision making and knowledge discovery across domains and perspectives. To limit bias and perspective as the 'expert
model builder', a multi methodology approach to understanding stakeholder requirements and perspectives will ensure the model is aligned and fit for purpose with the decision making culture, provides robust analytical insight against business case requirements, and is flexible to capture adaptive behaviour.
Original languageEnglish
Publication statusPublished - 22 May 2012
Event3rd Annual IDC in Systems Research Conference - Bath, United Kingdom
Duration: 22 May 2012 → …


Conference3rd Annual IDC in Systems Research Conference
Country/TerritoryUnited Kingdom
Period22/05/12 → …


Dive into the research topics of 'Cyber Defence Technologies and Architectures'. Together they form a unique fingerprint.

Cite this