Introduction of a Model for Measuring and Evaluating the Cyber Power of a Defense Organization in Islamic Republic Of Iran

Document Type : research Artichel

Authors

1 Graduate of Industrial Engineering - Macro Systems Modeling at Imam Hossein University, Tehran, Iran

2 Associate Professor, Faculty of Industrial Engineering, Imam Hossein University, Tehran, Iran

3 Faculty of Industrial Engineering, Imam Hossein University, Tehran, Iran

Abstract

Nowadays, cyber defense power is of prime importance for a military organization in the country. Regarding the fact that four spheres of land, sea, air and space use cyberspace to perform their operations in a better and more efficient way; a model for assessment of cyber power of the defense organization can provide managers and decision makers a correct insight into the variables affecting cyber defense power. The aim of this paper is to identify and model the components of cyber power assessment for a defense organization, which finally leads to introduction of 5 components, 26 indices and 78 items for measurement. The introduced model is extracted by studying the cyber evaluation models and national cyber strategic plans, the components of cyber defense power. It has been discovered and validated using the structural equation modeling method with the least partial squares approach with formative measures. This technique employs empirical data (expert judgment) for modelling. The method of analysis in this kind of modeling is statistical analysis that measures the relationship and significance of the components of the model using various and accurate statistical tests. The results show the significant levels of metrics (research questions) of each main constructs (dimensions) and minor constructs (components) of at least 90% to a maximum of more than 99% (close to 1). These values ​​are also established for the significance of the connection of the main constructs to each other and the connection of the minor constructs to the main ones. Also, the values ​​of R2 for the main constructs indicate the explanation of variance by the predictor variables and the optimal limit obtained for them. Thus, the validity of the selected variables and the pattern drawn for them (relationships and how the variables influence) have been confirmed.

Keywords


  1. الف. منابع فارسی

    1. احمدی، اردشیر، علی­‌یاری، شهرام، ندرتی، رضا (1396)، ارائه یک مدل برای شایستگی‌های پاسداری در سازمان دفاعی، فصلنامه راهبرد دفاعی، سال پانزدهم، شماره 57.
    2. تقی­‌پور، رضا و اسماعیلی، علی (1397)، طراحی مدل مفهومی الگوی دفاع سایبری جمهوری اسلامی ایران، فصلنامه امنیت ملی، سال هشتم، شماره سی­‌ام.
    3. دهقانی پوده، حسین و پاشایی هولاسو، امین (1396)، تحلیل تعامل عوامل موثر بر نوآوری سازمان‌های دفاعی با استفاده از رویکرد مدلسازی ساختاری و تفسیری (ISM)، فصلنامه علمی-پژوهشی مدیریت نظامی، شماره 3.
    4. زرقانی، سید هادی (1387)، تحلیل و ارزیابی متغیرها و شاخص‌­های قدرت نظامی، فصلنامه راهبرد دفاعی، سال ششم، شماره 23.
    5. ساعی، علی و اکبرزاده، علیرضا (1389)، بررسی نقش فرهنگ سلسله مراتبی در اثربخشی سازمان‌های نظامی (مطالعه موردی: دانشگاه افسری امام علی(ع)، فصلنامه علمی- پژوهشی مدیریت نظامی، شماره 39.
    6. شهلائی، ناصر (1395)، ابعاد و شاخص‌های ارزیابی قابلیت‌های علم و فناوری در سازمان‌های نظامی جمهوری اسلامی ایران، فصلنامه راهبرد دفاعی، سال چهاردهم، شماره 54.
    7. رجبی مسرور، حسن، توفیق، علی­‌اصغر، قاضی‌زاده فرد، سیدضیاءالدین (1397)، طراحی الگوی تصمیم‌گیری برون­‌سپاری فعالیت­‌های اجرایی پروژه­‌های تحقیق و توسعه و انتخاب پیمانکار برون­سپاری، فصلنامه راهبرد دفاعی، سال شانزدهم، شماره 63.
    8. نصرت­‌آبادی، جمشید، لشگریان، حمیدرضا، مردانی شهربابک، محمد، موحدی‌صفت، محمدرضا (1397)، ارائه الگوی راهبردی ارزیابی قدرت سایبری نیروهای مسلح جمهوری اسلامی ایران، فصلنامه امنیت ملی، سال نهم، شماره سی‌و‌یکم.
    9. هلیلی، خداداد، ولوی، محمدرضا، موحدی صفت، محمدرضا (1397)، شناسایی عوامل و مولفه­‌های اثرگذار بر تدوین رهنامه قدرت سایبری ج.ا.ایران مبتنی بر سیاست­های ابلاغی و اسناد بالا دستی، فصلنامه راهبرد دفاعی، سال شانزدهم، شماره 63.

     ب. منابع انگلیسی

    1. Bebber, Robert, (2017), Cyber power and cyber effectiveness: An analytic framework, Comparative Strategy, 36:5.
    2. Booz Allen Hamilton, (2011), Cyber power index: finding and methodology, An Economist Intelligence, Unit research program.
    3. Booz Allen Hamilton, (2011), The Road to Cyberpower, Seizing Opportunity While Managing Risk in the Digital Age.
    4. Cheryl Burke Jarvis, Scott B MacKenzie and Philip M Podsakoff, (2003). A Critical Review of Construct Indicators and Measurement Model Specification in Marketing and Consumer Research, Journal of Consumer Research, vol. 30, , No. 2.
    5. Cate, (2015), THE DEPARTMENT OF DEFENSE CYBER        STRATEGY, The secretary of defence,  Washington DC.
    6. Chin, (1998), The partial least squares approach to structural equation modeling, In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295-336).
    7. Christophe, (2014), Cybersecurity Capability Maturity Model (C2M2), White House initiative, the U.S.Department of Energy (DOE) and Department of Homland Security (DHS), Version 1.1.
    8. Diamantopoulos, Adamantios, and Winklhofer, Heidi, (2001), Index Construction with Formative Indicators: An Alternative to Scale Development",  Journal of Marketing Research, vol. 38, no.2.
    9. Drucker, F. Peter, (2006), managing for results, HarperBusiness; Reissue edition.
    10. Feakin, (2016), CYBER MATURITY IN THE ASIA-PACIFIC        REGION, Australia, Australian Strategic Policy Institute.
    11. Freedman, Lawrence, (2015), Strategy: A History, Publisher: Oxford University Press.
    12. Garson, (2016), Partial Least Squares Regression and Structural        Equation Models, Statistical Associates Blue Book Series, Kindle       Edition.
    13. Gehem, Maarten, Artur Usanov, Erik Frinking, Michel Rademaker, (2015), ASSESSING CYBER SECURITY: A META-ANALYSIS OF THREATS, TRENDS, AND RESPONSES TO CYBER ATTACKS, The Hague Centre for Strategic Studies.
    14. Haaster, Jelle, (2016), Assessing Cyber Power, 8th International       Conference on Cyber Con? ict, Faculty of Military Sciences.
    15. Hafeznia, Mohammad Reza, Seyed Hadi Zarghani, Zahra Ahmadipor and Abdelreza Roknoddin Eftekhari (2008), Presentation a new model to measure national power of the countries, J. Appl. Sci. 8, 230–240.
    16. Hair Jr.Joseph F., Mary Wolfinbarger Celsi, Arthur H. Money, Phillip Samouel, (2011), Essentials of Business Research Methods. Pub. Location: New York; second edition.
    17. Hair and others, (2017), A PRIMER ON PARTIAL LEAST        SQUARES STRUCTURAL EQUATION MODELING (PLS-       SEM),  2nd Ed, Thousand Oaks: Sage.
    18. Hathaway, Melissa, Chris Demchak, Jason Kerben, Jennifer McArdle, Francesca Spidalieri, (2015), CYBER READINESS INDEX 2.0, Measuring and Assessing the Cybersecurity  Challenge. Published by Potomac Institute for Policy Studies.
    19. Henseler and Chin, (2010), A Comparison of Approaches for the        Analysis of Interaction Effects Between Latent Variables Using        Partial Least Squares Path Modeling, Taylor & Francis, Structural Equation Modeling, 17.
    20. Hohn, (2014), Geopolitics and the Measurement of National        Power, Ph.D. Thesis, university of Hamburg, Germany.
    21. Hunker, (2010), Cyber War and Cyber Power Issues for NATO        Doctorin, Research Division, NATO Defence College, Rome, 62.
    22. Inkster, Nigel, (2017), Measuring Military Cyber Power,        Survival, 59:4, 27-34, DOI: 10.1080/00396338.2017.1349770
    23. Kadera and Sorokin (2004), Measuring national power, Int.        Interact, 30.
    24. Kramer, Franklin D., Stuart H. Starr, Larry K. Wentz (2009), Cyberpower and National Security, 1st Edition. Published by: University of Nebraska Press, Potomac Books.
    25. Kuehl, D, (2009), From cyberspace to cyberpower: defining the        problem, in: F. Kramer, S. Starr, L. Wentz (Eds.), Cyberpower        and National Security, Potomac Books, Dulles, Virginia.
    26. Liao, Hua, Weihua Dong, Huiping Liu and Yuejing Ge (2015), Towards Measuring and Visualizing Sustainable National Power—A Case Study of China and Neighboring Countries. ISPRS International Journal of Geo-Information,4(3).
    27. Minges, (2017), Global Cybersecurity Index (GCI), the        Internatonal Telecommunication Union (ITU).
    28. Nye, J, (2011), The Future of Power, Public Affairs,        Philadelphia, Pennsylvania.
    29. Oxford Martin School, , (3/31/2016), Cybersecurity Capacity        Maturity Model for Nations (CMM), Revised Edition.
    30. Robinson, Neil, Agnieszka Walczak, Sophie-Charlotte Brune, Alain Esterle, Pablo Rodriguez, (2013), Stocktaking study of military cyber defence capabilities in the European Union (milCyberCAP) Prepared for the European Defence Agency, Published by the     RAND Corporation.
    31. Rowland, Jill, Mason Rice, Sujeet Shenoi, (2014) The anatomy of a cyber power, International Journal of Critical Infrastructure Protection. (7)  3–11.
    32. Sheldon, J.B.. (2012). Toward a theory of cyber power: Strategic purpose in peace and war. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. 207-224. Starr, Stuart, (2011)  Towards an Evolving Theory of Cyberpower, Series Cryptology and Information Security Series, Ebook, Vol 3.        
    33. Tabansky, Lior, (2016), Towards a Theory of Cyber Power: The        Israeli Experience with Innovation and Strategy, 8th International       Conference on Cyber Conflict Cyber Power, Blavatnik        Interdisciplinary Cyber Research Center (ICRC) Tel Aviv Uni.
    34. The NATO Cooperative Cyber Defence Centre of Excellence        (CCDCOE) available at: https://ccdcoe.org/cyber-security-strategy- documents.html.
    35. Treverton and Jones, (2005), Measuring National Power, RAND,       national security research division.
    36. Walden, David D., R. Douglas Hamelin, Michael E. Krueger, (2015), Systems Engineering Handbook A Guide For System Life Cycle Processes and Activities, Wiley, 4th edition. ISBN-13: 978-1118999400
    37. Zhang, Shao Tong, Qin Chuan The, Aliya Abdul Razack, and Ineze Anni, (2014), Global Cybersecurity Index&Cyberwellness Profiles, a cooperative partnership between ABI Research and International Telecommunication Union (ITU), Switzerland.