Logo: to the web site of the Swedish Defence University

fhs.se
Change search
Refine search result
1 - 13 of 13
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Andersson, Kent
    et al.
    Swedish Defence University, Department of Systems Science for Defence and Security.
    Lundberg, Jan
    Swedish Defence University, Department of Systems Science for Defence and Security. Department of Computer and Systems Sciences, Stockholm University, Stockholm, Sweden.
    Stirna, Janis
    Department of Computer and Systems Sciences, Stockholm University, Stockholm, (SWE).
    Emerging technology calls for a systemic view on military capability2023In: 1st International Workshop on the Foundations and Applications of Capabilities in Enterprises, Transformations, and ESG Initiatives (FACETE 2023), Aachen, 2023 / [ed] Geert Poels; Jonas Van Riel; Rodrigo Fernandes Calhau, Aachen, 2023, Vol. 3645, article id facete2Conference paper (Refereed)
    Abstract [sv]

    Many nations are developing their military towards so-called Multi-Domain Operations with artificialintelligence (AI) as a pivotal component, despite identified challenges. Modern-day military operationsunderscore the need for updated battle management and cross-domain communication, central to theprinciples of Joint All-Domain Command and Control (JADC2). AI's potential is obvious, and whileautonomous platforms revolutionize warfare, they introduce complexities in command and control (C2),which is also reflected in capability development. This study identifies suitable concepts for systemicanalysis of military capability and is the starting point in forming a framework for C2 capability developmentin the context depicted. A number of concepts are identified; Combat Power, Fighting Power, Joint functions,Warfighting functions, Elements of combat power, Warfighting Capability, DOTMLPF(I), TEPIDOIL,Fundamental inputs to capability, Defence lines of Development, and Military Power. The study alsohighlights their systemic character and guides the reader briefly in matching issues with suitable concepts.

  • 2.
    Anwar, Adan
    Swedish Defence University.
    Public Diplomacy and Disinformation Campaigns In A Digital Age: A Study of How the Swedish Social Services Disinformation Campaigns and NATO Membership Application Impacted the Public Diplomacy of Sweden2023Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis highlighted how disinformation campaigns on social media platforms and news outlets were used as tools to influence Swedish public diplomacy. To accomplish this, it aimed to answer the following research question “How are disinformation campaigns, through social media platforms and news outlets, impacting Sweden’s public diplomacy?”. The thesis applied two case studies, the first being a domestic context consisting of the Swedish Social Services (SSS) and the Swedish Care of Young Persons (Special Provisions) Act (LVU), and the second an international context being Sweden applying for a NATO membership. The analysis utilized a sociotechnical approach interpreting newspaper article, social media posts, and reports that made up the empirical material. In addition, an analytical framework, divided into three thematic sections, was used for the analysis. The thematic sections consisted of 1) background of the case; 2) the disinformation campaigns that were conducted including the actors involved; 3) the Swedish public diplomatic response based on Joseph Nye’s theory about political power and public diplomacy. The thesis discovered that both the domestic and international context impacted Sweden’s public diplomacy, where the government and governmental agencies took measures that they previously had not. Furthermore, it discovered that news outlets and social platforms could not be viewed as two separate entities when conducting disinformation campaigns, but instead as an additional third entity. Lastly, the thesis found the two cases to be similar, despite their different contexts, as disinformation campaigns often build on previous rumors.

    Download full text (pdf)
    fulltext
  • 3.
    Brolin, Filip
    Swedish Defence University.
    The Total Defence Boardgame: Using Game Based Learning to introduce systemic understanding of Swedish total defence2022Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This report examines how games can be used to communicate and teach complex system structures. In collaboration with the total defence research institute, a game is being developed to introduce operational analysts to the Swedish total defence. The target group for the game lacked both experience in systems thinking and total defence, which is why the game was considered a good method to test.

    The study has a design science research approach and used Arnold and Wade's systems thinking matrix as the basis for the game's learning objectives. The development of the game is largely based on methodology taken from serious gaming, war games and game pedagogy.

    The result of the studies was that a number of points of interest for game development linked to complex systems are identified. Among other things, the result strengthened the idea of ​​using games as an educational tool. The study also demonstrated certain difficulties with games and complex systems, where sometimes challenges were connected to creating a game that fairly depicts even the hidden relationships within a system.

    Download full text (pdf)
    fulltext
  • 4.
    Gunneriusson, Håkan
    et al.
    Swedish Defence University, Department of Military Studies, War Studies Division, Sektionen för markoperationer (KV Mark).
    Ottis, Rain
    Tallinn University of Technology.
    Cyberspace from the Hybrid Threat Perspective2013In: Journal of Information Warfare, ISSN 1445-3312, Vol. 12, no 3Article in journal (Refereed)
    Abstract [en]

    Hybrid threats use conventional and unconventional means to achieve their goals. In this paper we explore the cyber threats as one possible aspect of hybrid threats. We describe three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional operations, exploiting non-military systems, and exploring the opportunities provided by this environment. In particular, we highlight the aspects that are or likely will be relevant to the military community.

  • 5.
    Gunneriusson, Håkan
    et al.
    Swedish National Defence College, Department of Military Studies, War Studies Division, Sektionen för markoperationer (KV Mark).
    Ottis, Rain
    University of Jyväskylä & Tallinn University of Technology.
    Cyberspace from the Hybrid Threat Perspective2013In: Papers Presented at the 12th European Conference on Information Warfare and Security / [ed] Kuusisto, Rauno & Kurkinen, Erkki, Reading: Academic Conferences and Publishing International Limited , 2013, p. 98-105Conference paper (Other academic)
    Abstract [en]

    Hybrid threats use conventional and unconventional means to achieve their goals. In this paper we explore the cyber threats as one possible aspect of hybrid threats. We describe three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional operations, exploit-ing non-military systems, and exploring the opportunities provided by this envi-ronment. In particular, we highlight the aspects that are or likely will be relevant to the military community.

  • 6.
    Huskaj, Gazmend
    et al.
    Swedish Defence University, Department of Military Studies, Science of Command and Control and Military Technology Division, Military Technology Systems Section. School of Informatics, University of Skövde, Skövde, Sweden.
    Wilson, Richard L.
    Towson University (USA), Hoffberger Center for Professional Ethics, University of Baltimore (USA).
    An Anticipatory Ethical Analysis of Offensive Cyberspace Operations2020In: 15th International Conference on Cyber Warfare and Security / [ed] Payne, Brian K.; Wu, Hongyi, Reading, UK: Academic Conferences and Publishing International Limited, 2020, p. 512-520Conference paper (Refereed)
    Abstract [en]

    This article presents the ethical issues using offensive cyberspace operations. Previously enshrouded in secrecy, and now becoming the new norm, countries are using them to achieve their strategic interests. Russia has conducted offensive operations targeting Estonia, Georgia and the Ukraine; Hamas was targeting Israeli targets; and Iran has been targeting U.S. targets. The response has varied; Estonia and Georgia struggled with the attacks and were unable to respond while Ukraine tried to respond but it was inefficient. Israel’s response on Hamas offensive operations was an air strike on a building with Hamas Cyber-operatives. Iran shot down a U.S. Drone over the Strait of Hormuz, and the U.S. initially intended to respond with kinetic capabilities in the form of missile strikes. However, in the last minute, the U.S. chose to respond with offensive cyberspace operations targeting the Iranian missile systems. This last-minute change of response choosing between kinetic or cyber capabilities shows a need to further investigate how offensive cyberspace operations can be used against which targets from an ethical perspective. This article applies anticipatory ethical analysis on U.S. offensive operations in the “Global Hawk”-case when Iran shot down a U.S. drone over the Strait of Hormuz. Anticipatory ethical analysis looks at emerging technologies and their potential consequences. Offensive cyberspace operations present a range of possibilities, which include lowering the risk of harm to cyber operatives’ lives belonging to the responding nation. However, a response can also be kinetic. Therefore, the analysis of the “Global Hawk”-case is compared with the Israeli-air strike of the building of Hamas Cyber-operatives. The authors argue that applying anticipatory ethical analysis on offensive operations and kinetic operations assist decision makers in choosing response actions to re-establish deterrence.

    Download full text (pdf)
    An Anticipatory Ethical Analysis of Offensive Cyberspace Operations
  • 7.
    Sigholm, Johan
    et al.
    Swedish Defence University, Department of Military Studies, Military-Technology Division.
    Bang, Martin
    Swedish Defence University, Department of Military Studies, Military-Technology Division.
    Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats2013In: Proceedings of the 2013 European Intelligence and Security Informatics Conference / [ed] Joel Brynielsson & Fredrik Johansson, IEEE Computer Society, 2013, p. 166-171Conference paper (Refereed)
    Abstract [en]

    Although the traditional strategies for cyber defense in use today are necessary to mitigate broad ranges of common threats, they are not well-suited to protect against a persistent antagonist with access to advanced system exploitation techniques and knowledge of existing but yet undiscovered software vulnerabilities. Addressing the threat caused by such antagonists requires a fast and offensive Cyber Counterintelligence (CCI) process, and a more efficient interorganizational information exchange. This paper proposes a framework for offensive CCI based on technical tools and techniques for data mining, anomaly detection, and extensive sharing of cyber threat data. The framework is placed within the distinct context of military intelligence, in order to achieve a holistic, offensive and target-centric view of future CCI. The main contributions offered are (i) a comprehensive process that bridges the gap between the various actors involved in CCI, (ii) an applied technical architecture to support detection and identification of data leaks emanating from cyber espionage, and (iii) deduced intelligence community requirements.

  • 8.
    Spak, Ulrik
    Swedish Defence University, Department of Military Studies, Command & Control Studies Division. Uppsala universitet, Människa-datorinteraktion.
    Change Detection of the Unexpected: Enhancing change detection of the unexpected in a complex and high risk context – guiding visual attention in a digital display environment2015Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Change detection of objects and events in our visual surroundings is sometimes severely difficult, especially if these changes are unexpected. Such failures in change detection may cause huge malicious outcomes in contexts characterized by high levels of complexity and risk. For operators within organizations active in such contexts, effective change detection is a necessary step for functional feedback control in the pursuit of achieving specified goals. This thesis demonstrates examples of change detection failures from aviation, defence, healthcare, and road traffic.

    The purpose of the thesis is to present a support concept for enhanced change detection in complex and high risk contexts. The design requirements are primarily provided by the field of command and control. The main mechanisms behind the problems of change detection are identified as the psychological phenomena of change blindness and inattentional blindness. A theoretical foundation is presented regarding these phenomena, complemented with a review concerning orientation and capture of visual attention. The solution space for enhanced change detection is explored and a gap in the literature is identified; there is a need for a support concept which considers both blindness phenomena simultaneously. The thesis elaborates on a conceptual design; an adaptive attention aware system (A3S), based on cuing of visual attention.

    The thesis includes four experimental studies. The first examines the effects of instruction on change detection performance. The remaining studies evaluate the possibilities to orient visual attention by a non-obtrusive flash cue in a radar-like display, to compensate for inadequate expectations in a situation characterized by high levels of uncertainty. The participants’ performance is measured in accuracy (hit frequencies) and response times.

    The results indicate that; (a) instructions can affect change detection performance, (b) the bottom-up flash cue enhance change detection independent of perceptual load, (c) the flash cue enhance change detection in both static and dynamic environments, and (d) the flash cue is beneficial for change detection even when its position is outside foveal vision in relation to the changed target object. Design propositions for an A3S are presented, derived from the results of the thesis.

  • 9.
    Waldenström, Christofer
    Swedish National Defence College, Department of Military Studies, Command & Control Studies Division.
    A Microworld Study of Task Force Commanders Executing a Maritime Escort Mission2010In: Proceedings of the 15th International Command and Control Research and Technology Symposium, 2010Conference paper (Refereed)
    Abstract [en]

    This paper presents an exploratory microworld study with the aim to identify individual dierences between participants, and relate those dierence to how well the participant solves the task. Six ocers, rank from lieutenant commander to flotilla admiral, were studied when they commanded a maritime escort mission. The experiment was conducted using a microworld where the participant had to control all own units while the computer controlled enemy and neutral units. Data collection consisted of think-aloud protocols, screen captures of the microworld’s tactical screen, questionnaires, and battle outcomes. Performance was determined using a measure of mission success and a general model of the participants’ decision making process was constructed. This model was used to identify individual dierences and relate those to task performance. The results suggest that there is no correlation between how often the participants perform a certain decision making activity, and how well they perform in the microworld. On the other hand, the results suggest a strong correlation between how well the participants perform in the microworld and how many dierent decision making activities they visit during one coherent reasoning chain. The result seems to suggest that it is more important to consider many aspects of a problem at the same time, and that no decision making activity is more important that another.

  • 10.
    Waldenström, Christofer
    Swedish National Defence College, Department of Military Studies, Command & Control Studies Division.
    Constraint Visualization Decreases Search Time for Novices and Navy Officers in a Naval Search Task2011In: Proceedings of the 10th Conference on Naturalistic Decision Making, Orlando, FL, 2011Conference paper (Refereed)
    Abstract [en]

    Investigated a visualization aid to support naval search tasks. 20 officers and 20 students completed 12 trials in an experiment that contrasted with and without the visualization aid and controlled for learning effects. The aid improved performance in both groups, and there were no effects of learning or task difficulty.

  • 11.
    Waldenström, Christofer
    Swedish National Defence College, Department of Military Studies, Command & Control Studies Division.
    Supporting Dynamic Decision Making in Naval Search and Evasion Tasks2011Doctoral thesis, comprehensive summary (Other academic)
  • 12.
    Waldenström, Christofer
    Swedish National Defence College, Department of Military Studies, Command & Control Studies Division.
    Visualizing a time-space constraint increases performance in a dynamic search task2010In: Journal of Cognitive Engineering and Decision Making, ISSN 1555-3434, E-ISSN 2169-5032, Vol. 4, no 4, p. 275-287Article in journal (Refereed)
    Abstract [en]

    This article presents a display manipulation designed to support search tasks in which the location of the target is unknown and changes over time. The problem is analogous to that of a naval search task when there is an initial sighting and then the naval force must guide its search vehicles to reestablish contact with the fleeing target. The display manipulation visualizes a dynamic constraint on the area where a fleeing target can be found and adjusts its shape to the environment and to the search efforts. Forty participants without prior knowledge of search tactics completed 12 trials in an experiment that compared performance with and without the visualization aid and controlled for learning effects. The results suggest that this visualization improves performance in the dynamic search task. They further suggest that the visualization was easy to learn but that the learning effect did not transfer to a condition without visualization. The results have practical utility for both military and civil search tasks, and they are consistent with other research that emphasizes that control interfaces should make constraints in the task environment perceptually available.

  • 13.
    Waldenström, Christofer
    Swedish National Defence College, Department of Military Studies, Command & Control Studies Division.
    Visualizing the Field of Safe Travel Increases Performance in a Naval Movement Task2011In: Proceedings of IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), Miami, FL, 2011, p. 252-256Conference paper (Refereed)
    Abstract [en]

    This paper investigates a display manipulation designed to support movement tasks where the location of a threat is uncertain and dynamic. The problem is analogous to that of a naval transportation task, where a ship has to move from one port to another under threat from several enemies of which only the initial positions are known. The display manipulation visualizes a time-dependent constraint on the area where an enemy can be, given its initial position and maximum speed, and adjusts the shape to the environment. The region outside this area represents a field of safe travel where the transport ship can move safely. Forty participants without prior knowledge of the task completed sixteen trials in an experiment that contrasted with and without visualization, and controlled for learning effects. The results suggest that the visualization significantly improved performance in the movement task and that it had a large effect. The visualization also significantly reduced variance in performance, which suggests that it generated a more consistent behavior among participants. It was also easy for the participants to make effective use of the visualization, and once exposed to the visualization, the learning transferred to a condition without the visualization. This study have practical utility for designers of combat information systems as the results indirectly suggest that people have difficulties in inferring the locations of targets of which they only have fragmentary information. Including similar visualizations in the design may consequently increase overall system performance.

1 - 13 of 13
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf