Aligning Transformational Change in Policy and Governance with Net - Centric Operations Technology
نویسنده
چکیده
Implementing transformational change towards the Net-Centric Operations (NCO) vision in support of enhanced command and control presents technical, operational, and cultural challenges. The technical challenges are being addressed by both industry and the Department of Defense pushing the state of the art further ahead. However, in many cases the technology transformation is too far ahead of the DoD policy and management transformational. In fact, technology vendors offering products to help in the management aspects of network enabled systems and services often find their solutions are in search of clearly defined problems. This misalignment exists because a DOD enterprise level NCO " operating model " has not been clearly articulated to demonstrate how consumers and providers of net-centric services will interact. The operating model should be a framework to allow emergent behavior to first grow and then sustain a net-centric environment. Consequently, an NCO operating model must address architectural, policy, governance, performance monitoring, and cultural issues and practices. However, as noted above the operating model is itself a transformational model. It cannot prescribe a " to-be " world to any degree of specificity. Instead, the operating model establishes the tenets of policy and governance that can help align emerging technology to fulfill the vision of NCO. Once defined and set in motion, the operating model presents a way forward to defining emerging NCO capability requirements; selecting and implementing the enabling technologies; and extending the NCO environment to further Defense component and agency domains.
منابع مشابه
The State of the Art and the State of the Practice
The military is in the midst of significant change due to the Department of Defense (DoD) Transformation Planning Guidance, a significant part of which is the implementation of Network-Centric Warfare (NCW) theory. Unfortunately, the existing DoD acquisition process poorly develops the weapons and other systems needed to realize the full potential of transformation in NCW. The current military ...
متن کاملTransformational Change in Environmental and Natural Resource Management
It is widely agreed the Anthropocene has seen an unprecedented decline in the natural resources conditions that have underpinned the economic growth of the last few hundred years. As communities, we have not responded to Boulding’s vision of ‘the coming space ship earth’ although not for want of much official and private effort. As ‘wicked problems’ the impacts have been often ignored or off lo...
متن کاملGovernance: Blending Bureaucratic Rules with Day to Day Operational Realities; Comment on “Governance, Government, and the Search for New Provider Models”
Richard Saltman and Antonio Duran take up the challenging issue of governance in their article “Governance, Government and the Search for New Provider Models,” and use two case studies of health policy changes in Sweden and Spain to shed light on the subject. In this commentary, I seek to link their conceptualization of governance, especially its interrelated roles at the macro, meso, and micro...
متن کاملBusiness as Usual: A Lack of Institutional Innovation in Global Health Governance; Comment on “Global Health Governance Challenges 2016 – Are We Ready?”
There were once again high expectations that a major global health event - the Ebola virus outbreak of 2014-2015 - would trigger meaningfully World Health Organization (WHO) reform and strengthen global health governance (GHG). Rather than a “turning point,” however, the global community has gone back to business as usual. This has occurred against a backdrop of worldwide political turmoil, cha...
متن کاملحاکمیت شبکهای در نهادهای پژوهشی امنیت سایبری
Governments change their governance style according to social, political and economic conditions. Cyber security technology is among today’s most changeable technologies, which is a critical key to the national security. Because of the weaknesses in the interaction among syber security research organizations, introducing a model for utilizing all existing capabilities can be an appro...
متن کامل