Date of Award
Master of Science
Department of Systems Engineering and Management
David P. Biros, PhD
Air Force dependence on information technology (IT) creates vulnerabilities that it cannot ignore. With global availability of commercial IT and the Internet, the Air Force does not necessarily have the high technological advantage over potential adversaries that it once had. Furthermore, it is possible to directly and covertly manipulate information within information systems, or artifacts, without notice. This directly affects decision makers since the availability and integrity of information is critical. Air Force physical and network security measures taken to protect its information do not guarantee detection of direct information manipulation. This leaves it to information artifact users to detect such deception.
DTIC Accession Number
Autrey, Elizabeth A., "The Effect of Contextual-Based Training on Artifact-Based Deception Detection" (2001). Theses and Dissertations. 4558.