IDEAS home Printed from https://ideas.repec.org/a/inm/ordeca/v12y2015i2p81-95.html
   My bibliography  Save this article

Air Force Cyberspace Investment Analysis

Author

Listed:
  • Gregory S. Parnell

    (Department of Industrial Engineering, University of Arkansas, Fayetteville, Arkansas 70701)

  • Rudolph E. Butler

    (Air Force Space Command, Peterson Air Force Base, Colorado 80914)

  • Stephen J. Wichmann

    (Air Force Space Command, Peterson Air Force Base, Colorado 80914)

  • Mike Tedeschi

    (United States Northern Command, Peterson Air Force Base, Colorado 80914)

  • David Merritt

    (Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, Michigan 48109)

Abstract

Space and cyberspace operations are primary missions within the U.S. Armed Forces. Air Force Space Command performs investment planning for Air Force space and cyberspace missions. The command has performed space investment planning for more than 15 years using multiobjective decision analysis to assess the value of space programs for military operations and an optimization model to maximize space capabilities subject to performance, budget, schedule, and programmatic constraints. Air Force cyberspace operations and investment planning were assigned to Air Force Space Command in 2009. We developed an improved cyberspace investment analysis method using decision analysis techniques to support investment planning for the Air Force’s approximately $3.5 billion annual cyberspace investment. We developed four models to assess the value of Air Force cyberspace programs: a multiobjective decision analysis model for information technology infrastructure, a probability model to assess the capability to defend Air Force networks, a probability model to assess the capability to command and control cyberspace assets, and a probability model to assess the capability to perform cyberspace attacks when directed by national command authorities. The models were incorporated into the Air Force Space Command Integrated Planning Process and have been used for three years.

Suggested Citation

  • Gregory S. Parnell & Rudolph E. Butler & Stephen J. Wichmann & Mike Tedeschi & David Merritt, 2015. "Air Force Cyberspace Investment Analysis," Decision Analysis, INFORMS, vol. 12(2), pages 81-95, June.
  • Handle: RePEc:inm:ordeca:v:12:y:2015:i:2:p:81-95
    DOI: 10.1287/deca.2014.0311
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/deca.2014.0311
    Download Restriction: no

    File URL: https://libkey.io/10.1287/deca.2014.0311?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
    2. Gerald G. Brown & Robert F. Dell & Heath Holtz & Alexandra M. Newman, 2003. "How US Air Force Space Command Optimizes Long-Term Investment in Space Systems," Interfaces, INFORMS, vol. 33(4), pages 1-14, August.
    3. Roger Chapman Burk & Gregory S. Parnell, 2011. "Portfolio Decision Analysis: Lessons from Military Applications," International Series in Operations Research & Management Science, in: Ahti Salo & Jeffrey Keisler & Alec Morton (ed.), Portfolio Decision Analysis, chapter 0, pages 333-357, Springer.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. M.‐Elisabeth Paté‐Cornell & Marshall Kuypers & Matthew Smith & Philip Keller, 2018. "Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 226-241, February.
    2. Theodore T. Allen & Zhenhuan Sui & Nathan L. Parker, 2017. "Timely Decision Analysis Enabled by Efficient Social Media Modeling," Decision Analysis, INFORMS, vol. 14(4), pages 250-260, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kangaspunta, Jussi & Liesiö, Juuso & Salo, Ahti, 2012. "Cost-efficiency analysis of weapon system portfolios," European Journal of Operational Research, Elsevier, vol. 223(1), pages 264-275.
    2. ÇakanyIldIrIm, Metin & Yue, Wei T. & Ryu, Young U., 2009. "The management of intrusion detection: Configuration, inspection, and investment," European Journal of Operational Research, Elsevier, vol. 195(1), pages 186-204, May.
    3. A. Elfes & C. R. Weisbin & R. Manvi & V. Adumitroaie & W. P. Lincoln & K. Shelton, 2006. "Extending the START framework: Computation of optimal capability development portfolios using a decision theory approach," Systems Engineering, John Wiley & Sons, vol. 9(4), pages 331-357, December.
    4. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    5. Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
    6. Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
    7. Kurth, Margaret & Keisler, Jeffrey M. & Bates, Matthew E. & Bridges, Todd S. & Summers, Jeffrey & Linkov, Igor, 2017. "A portfolio decision analysis approach to support energy research and development resource allocation," Energy Policy, Elsevier, vol. 105(C), pages 128-135.
    8. Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
    9. Bin Srinidhi & Jia Yan & Giri Kumar Tayi, 2008. "Firm-level Resource Allocation to Information Security in the Presence of Financial Distress," Working Papers 2008-17, School of Economic Sciences, Washington State University.
    10. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    11. Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
    12. Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
    13. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    14. Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
    15. Min Chen & Varghese S. Jacob & Suresh Radhakrishnan & Young U. Ryu, 2015. "Can Payment-per-Click Induce Improvements in Click Fraud Identification Technologies?," Information Systems Research, INFORMS, vol. 26(4), pages 754-772, December.
    16. Ahmed Abbasi & David Dobolyi & Anthony Vance & Fatemeh Mariam Zahedi, 2021. "The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites," Information Systems Research, INFORMS, vol. 32(2), pages 410-436, June.
    17. Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
    18. Liesiö, Juuso & Salo, Ahti, 2012. "Scenario-based portfolio selection of investment projects with incomplete probability and utility information," European Journal of Operational Research, Elsevier, vol. 217(1), pages 162-172.
    19. Young U. Ryu & Hyeun-Suk Rhee, 2008. "Improving Intrusion Prevention Models: Dual-Threshold and Dual-Filter Approaches," INFORMS Journal on Computing, INFORMS, vol. 20(3), pages 356-367, August.
    20. Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:12:y:2015:i:2:p:81-95. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.