History exhaustively demonstrates information as critical to the military and has only further increased as information is used to conduct all aspects of modern military decision making and operations. The value of information has increased to the level of being identified as a commodity or asset through organizational activities of information collecting, processing, analyzing, distributing, and aggregating for purposes of tactical, operational and strategic planning, and command decision making. Vital to an organization is the confidentiality, integrity, availability, quality and timeliness of the information as a violation of information can detrimentally affect the success of an organization's military or business activities. It is crucial when an information violation or breach occurs for timely and accurate determination of loss, damage, and impact resulting from the breach to include notification to affected organizational units that are depending upon the information. In this paper, we continue research expanding development of an Information Asset Valuation (IAV) process for a qualitative valuation methodology used for assigning value to information asset (InfoA) within a military context. Valuation of information as an asset relies upon both tangible and intangible valuation measures to create a linkage between the organizational mission and the supporting InfoA. We review existing non-military information valuation methodologies used in the accounting and information technology disciplines to determine their applicability in a military context for understanding the effectiveness of each discipline as adaptable models for IAV. The intention of this work is the development of foundational methodologies supporting the creation of an automated Cyber Incident Mission Impact Assessment (CIMIA) Decision Support Software (DSS) tool to provide near real time cyber environmental awareness. CIMIA addresses the competing functions of mission capability (operations) and the sustaining computer infrastructure (communications) for effective decision making prior to, during, and post cyber incident situations. The objective of this work is to identify potential methodologies for InfoA factor measurements of accessibility, availability, confidentiality, context, essentiality, integrity, non-repudiation, substitutability, temporality which impact information valuation. A standardized taxonomy of information valuation measures would help improve consistency, reduce uncertainty, and promote documentation of information value during the risk assessment process, and enable the aggregation of information asset value in support of higher level decision making processes. [ABSTRACT FROM AUTHOR]