Friday, October 22, 2004
[1] ß Discussion between Peter Stephenson and Paul Prueitt
White Paper on Incident Information Orb Architecture (IIOA) à
Peter
Descriptive Enumeration (DE)
http://www.bcngroup.org/area3/pprueitt/private/KM_files/frame.htm
slide 6 - 7
The problem posed in the previous bead [1] is:
How does one find the set of primitives for the Peterson Cyber Attack Taxonomy.
One answer is the following:
The method of "descriptive enumeration", or DE, was stated in the PowerPoint presentation
e-Gov KM Conference, Washington D.C.
The application of this method requires a number of minds, people, to identify the dimensions of a Object of Investigation and then the facets of each dimension.
Adi and I will be placing a new section in the Part one of the Adi Notational System that states the abstract concept of a framework
(see also enumeration of gFfoundations)
In graduate level "knowledge and innovation management" classroom activities, Dr Art Murray used the DE methodology with the students. A curricular element was developed and can be used as part of the Challenge Problem workshops.