Geoscience Reference
In-Depth Information
Delivery Time Frame:
1 hour-3 days
Suggested Process
−
Review plans, policies procedures.
−
Develop game and presentation materials.
−
Establish meeting time, date, location, and attendees.
−
Determine equipment and communication needs.
−
Establish gaming teams.
−
Conduct games and measure outcomes.
−
Collect and present findings.
Materials
−
Presentation
−
Gaming materials including databases, equipment, and other resources
−
Activity lists, injects, and scenarios
Goals
−
Explore the processes and consequences of decision-making.
−
Practice procedures and identify alternate methods to improve results
and speed of operations.
−
Test existing and potential strategies.
Conduct Characteristics
−
Requires an experienced facilitator familiar with the subject matter
−
May require assistants to support multiple locations
−
Focuses on the ability of one group to correctly conduct operations or
procedures more accurately or rapidly than another group
−
Time stress and sometimes the uncertainty of not knowing how your
group is performing in relation to other participating groups
Products
−
AAR or exercise summary that provides findings including evaluation
and changes to current systems and operations
−
Identification of new methods and procedures that may improve accu-
racy, capability, and/or speed
Examples
−
Laboratory Operations with two teams to establish rapid testing methods
of unknown materials: identify new testing methods, verify procedures,
and identify the specimen before the other team using a wide variety of
resources.
−
Data compilation: have teams identify trends in stock markets, bank
records, or other databases, and use the information to disable or disrupt
the other team's capabilities or finances.
−
Strategic Operations: Teams compete to identify weaknesses in other teams'
operations and strategies. The goal is to identify weaknesses in operations
and plans, and identify methods to prevent real-world attacks. An example
would be two teams that are established to protect the databases and secu-
rity of an operation while two other teams attempt to breach security.