{"id":"https://openalex.org/W2113546861","doi":"https://doi.org/10.1109/discex.2003.1194907","title":"Intelligence Preparation of the Information Battlespace (IPIB)","display_name":"Intelligence Preparation of the Information Battlespace (IPIB)","publication_year":2004,"publication_date":"2004-03-22","ids":{"openalex":"https://openalex.org/W2113546861","doi":"https://doi.org/10.1109/discex.2003.1194907","mag":"2113546861"},"language":"en","primary_location":{"id":"doi:10.1109/discex.2003.1194907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013827109","display_name":"Jannine Williams","orcid":"https://orcid.org/0000-0002-0122-2452"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"J. Williams","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5013827109"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13701862,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"35","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7667999863624573,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7667999863624573,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12888","display_name":"Military Strategy and Technology","score":0.7412999868392944,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.6640999913215637,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/battlespace","display_name":"Battlespace","score":0.9914186000823975},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.8010231256484985},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6947849988937378},{"id":"https://openalex.org/keywords/information-operations","display_name":"Information Operations","score":0.6259084939956665},{"id":"https://openalex.org/keywords/information-warfare","display_name":"Information warfare","score":0.5882284045219421},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5417784452438354},{"id":"https://openalex.org/keywords/network-centric-warfare","display_name":"Network-centric warfare","score":0.5282748341560364},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.47291311621665955},{"id":"https://openalex.org/keywords/business-intelligence","display_name":"Business intelligence","score":0.46635735034942627},{"id":"https://openalex.org/keywords/military-intelligence","display_name":"Military intelligence","score":0.4571317434310913},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.4295784831047058},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34481608867645264},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29294562339782715},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25886261463165283},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.23083290457725525},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1187659204006195},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10815346240997314}],"concepts":[{"id":"https://openalex.org/C2781438671","wikidata":"https://www.wikidata.org/wiki/Q1002407","display_name":"Battlespace","level":2,"score":0.9914186000823975},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.8010231256484985},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6947849988937378},{"id":"https://openalex.org/C121858775","wikidata":"https://www.wikidata.org/wiki/Q18600568","display_name":"Information Operations","level":2,"score":0.6259084939956665},{"id":"https://openalex.org/C2781349506","wikidata":"https://www.wikidata.org/wiki/Q911036","display_name":"Information warfare","level":2,"score":0.5882284045219421},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5417784452438354},{"id":"https://openalex.org/C2781187084","wikidata":"https://www.wikidata.org/wiki/Q1140666","display_name":"Network-centric warfare","level":2,"score":0.5282748341560364},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.47291311621665955},{"id":"https://openalex.org/C2767350","wikidata":"https://www.wikidata.org/wiki/Q6662173","display_name":"Business intelligence","level":2,"score":0.46635735034942627},{"id":"https://openalex.org/C49504249","wikidata":"https://www.wikidata.org/wiki/Q4168000","display_name":"Military intelligence","level":2,"score":0.4571317434310913},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.4295784831047058},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34481608867645264},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29294562339782715},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25886261463165283},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.23083290457725525},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1187659204006195},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10815346240997314},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/discex.2003.1194907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W236671943","https://openalex.org/W1534238426","https://openalex.org/W2082550891","https://openalex.org/W254559832","https://openalex.org/W2578702391","https://openalex.org/W343321498","https://openalex.org/W2164879098","https://openalex.org/W4384788","https://openalex.org/W2104913329","https://openalex.org/W1592974131"],"abstract_inverted_index":{"Working":[0],"in":[1,39,112,123,149],"the":[2,24,30,35,48,53,75,127,143],"DARPA":[3],"Cyber":[4],"Panel":[5],"project":[6],"and":[7,44,66,81,108,125],"with":[8,74],"Air":[9,145],"Force":[10,146],"Research":[11],"Laboratory":[12],"(AFRL/IFGB),":[13],"Zel":[14],"Technologies":[15],"(ZelTech)":[16],"developed":[17,116],"a":[18,57,86,91,96,117,160],"process":[19,50],"called":[20],"Intelligence":[21,32],"Preparation":[22,33],"of":[23,34,62,77,130],"Information":[25,151],"Battlespace":[26,36],"(IPIB).":[27],"Based":[28],"on":[29],"traditional":[31],"(IPB)":[37],"found":[38],"Army":[40],"Field":[41],"Manual":[42],"34-140":[43],"Joint":[45],"Publication":[46],"2-03.1,":[47],"IPIB":[49,72,137],"gives":[51],"analysts":[52,122],"tools":[54],"to":[55,84,100,103,106,110,120,133],"conduct":[56,134],"structured,":[58],"thorough":[59],"intelligence":[60,78],"preparation":[61],"cyberspace":[63],"for":[64,147],"planning":[65,162],"organizing":[67,124],"computer":[68],"network":[69],"defense":[70],"(CND).":[71],"assists":[73],"production":[76],"estimates,":[79],"assessments,":[80],"other":[82],"products":[83],"support":[85],"commander's":[87],"decision-making.":[88],"It":[89],"is":[90],"five-step":[92],"cycle":[93],"that":[94],"helps":[95],"commander":[97],"know":[98],"where":[99],"look,":[101,104],"when":[102],"what":[105,109],"expect,":[107],"defend":[111],"cyberspace.":[113],"ZelTech":[114],"subsequently":[115],"software":[118],"prototype":[119],"assist":[121],"analyzing":[126],"massive":[128],"amounts":[129],"information":[131],"required":[132],"CND.":[135],"Our":[136],"technology":[138],"was":[139],"recently":[140],"selected":[141],"by":[142],"USA":[144],"integration":[148],"their":[150],"Warfare":[152],"Planning":[153],"Capability":[154],"(IWPQ":[155],"integrated":[156],"tool":[157],"set":[158],"as":[159],"CND":[161],"tool.":[163]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
