18th ICCRTS: C2 in Underdeveloped, Degraded and Denied Operational Environments

نویسندگان

  • François Bernier
  • Kevin Chan
  • David S. Alberts
  • Paul Pearce
چکیده

The NATO Network Enabled Operations (NEC) C2 Maturity Model (N2C2M2) defines a number of command and control (C2) Approaches that correspond to various ways to accomplish C2 functions. These Approaches are defined by organizational the allocation of decision rights, patterns of interaction, and the distribution of information. Recent work in C2 theory has considered the differences in performance relative to the C2 Approach that is adopted. This work has investigated the idea that an optimal operating region of the C2 Approach Space can be identified for particular missions and circumstances, where optimal is a function of effectiveness, efficiency and agility. While circumstances that are characterized by the presence of degraded network conditions or hostile or extreme environments is of great interest, the performance of various c2 Approach options under these conditions have not been well studied. This paper focuses on the relative resilience of organizations as a function of their C2 Approach (a key component of agility). We explore the relationship between C2 Approach and performance under degraded information and communications environments using a set of six unique simulation experiments. 18th ICCRTS: C2 in Underdeveloped, Degraded and Denied Operational Environments

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

8th Iccrts " C2 in Underdeveloped, Degraded and Denied Operational Environments " Title Challenges in the Development and Evolution of Secure Open Architecture Command and Control Systems

We identify challenges that arise during development and evolution of secure Open Architecture (OA) command and control (C2) systems. OA systems are those whose software system components and interconnection mechanisms are either proprietary closed source software offerings with open interfaces (e.g., Application Program Interfaces), open source software, or some architectural configuration of ...

متن کامل

ICCRTS: C2 and Agility Concept of a Portal for the Integration of COP-Objects from Heterogeneous Sources

In this paper we describe a new concept of an integration portal that, firstly, combines entire or partial operational pictures of different heterogeneous C2 services into a single operational view and, secondly, supports user business processes intervolving multiple services. We aim at integrating at the presentation layer, that is: services provide the integration portal with selected parts o...

متن کامل

4 Th Iccrts: C2 and Agility " a Method to Analyze Network-centric Capabilities for Agile C2 for Force Sustainment Soldiers in Southwest Asia " Topic: C2 Assessment Tools and Metrics

The U.S. Army Chief Information Officer (CIO/G6) recognized potential communication and collaboration issues in performing C2 for Force Sustainment Soldiers working at Forward Operating Bases in Southwest Asia. The G6 commissioned a study to determine what network enabled capabilities would improve Logistics tasks in this area of operations. This paper outlines the methodology employed to ident...

متن کامل

16th ICCRTS

Effective Command and Control (C2) is enabled by information technology, but the potential of C2 through virtual environments offers opportunities for radical increases in awareness and performance. To realize such radical increases, we are engaged in a campaign of experimentation to assess C2 in virtual environments through the ELICIT (Experimental Laboratory for Investigating Collaboration, I...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013