InterJournal Complex Systems, 2110
Status: Accepted
Manuscript Number: [2110]
Submission Date: 20080226
A Complex Systems Approach to the Design and Evaluation of Holistic Security Ecosystems
Author(s): Mihaela Ulieru ,Stefan Grobbelaar

Subject(s): CX.4

Category: Article

Abstract:

Introduction International and domestic security operations include large numbers of participating partner organizations. According to a Complex Adaptive Systems view [1], the participants may be described as species within a social ecosystem who are specialized to achieve both their own goals and those of the greater organization (e.g. the natural ecosystem of the Little Rock food web [2]). Such organizations are characterized by: - the participantsí ability to negotiate between autonomy and cooperation in a drive (attractor) towards a common goal, - a coordinated workflow process that triggers the formation of high-level organizational structure (patterns of collaborative clusters) through low-level interactions between participants, and - a capacity to organize over spatial and functional scale [3] to maintain resilience against attack. Design and Evaluation of Holistic Security Ecosystems We present a conceptual model of a Holistic Security Ecosystem and a proof of concept test bed for exploring the social, cognitive, and informational dynamics in the emergence of the Security Ecosystem. The model is based on recent developments [4] of the holonic paradigm [5] of cross-organizational workflow coordination and decision making, and rooted in the Emergency Response Holarchy introduced by [6]. The model focuses on the dynamic, on-the-fly creation of targeted, short-lived meta-organizations that work towards achieving a common goal (crisis resolution), and guarantees optimal coordination and decision making at various levels of resolution across the holarchic levels of the organization. The Holistic Security Ecosystem model serves as foundation for agent-based modeling and multi-agent simulations on the Adaptive Risk Management test bed at the University of New Brunswick. The test bed allows for the simulation of several configurations of the model as they relate to specific application contexts. The resulting simulations enable an understanding of the dynamics of criticality occurrence within the Holistic Security Ecosystem for a range of operating scenarios. Our ultimate goal is to develop a template methodology for the deployment of Security Ecosystems enabling harmonious operation of inter-organizational, short-lived, mission critical organizations. Strategic Organization By integrating the simulation results into a strategic thinking process, we envision a change of culture in the design and deployment of Holistic Security Ecosystems that would lead to the seamless reorganization of security operations to ensure unobstructed functioning in the chaos of crisis. When taken to a next level, this could lead to an overall benchmarking of strategic thinking for self-transformation that may assist organizations in adapting their dynamic strengths while overcoming limitations. References [1] J. H. Holland, Hidden order: How adaptation builds complexity. Reading, MA: Addison-Wesley, 1995, pp. 185. [2] N. D. Martinez, "Artifacts or attributes - Effects of resolution on the Little-Rock Lake food web," Ecological Monographs, vol. 61, pp. 367-392, 1991. [3] C. Folke, T. Hahn, P. Olsson, and J. Norberg, "Adaptive governance of social-ecological systems," Annual Review of Environment and Resources, vol. 30, pp. 441-473, 2005. [4] S. Grobbelaar and M. Ulieru, "Holonic Stigmergy as a Mechanism for Engineering Self-Organizing Applications," presented at the 3rd International Conference of Informatics in Control, Automation and Robotics, 2006, pp. 1-5. [5] M. Ulieru, R. W. Brennan, and S. S. Walker, "The holonic enterprise: A model for internet-enabled global manufacturing supply chain and workflow management," Integrated Manufacturing Systems, vol. 13, pp. 538-550, 2002. [6] M. Ulieru and P. Worthington, "Autonomic risk management for critical infrastructure protection," Integrated Computer-Aided Engineering, vol. 13, pp. 63-80, 2006.

Retrieve Manuscript
Submit referee report/comment


Public Comments: