Using the War Room process to explore network-centric warfare

被引:0
|
作者
Sinex, CH
Lilly, TC
Harlow, MA
机构
来源
JOHNS HOPKINS APL TECHNICAL DIGEST | 2000年 / 21卷 / 03期
关键词
NCW; Network-Centric Warfare; War Room;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
During the last decade, the commercial world demonstrated that significant gains were possible from network-centric computing, i.e., linking computers together over networks to spaed transactions, monitor sales and inventories, and identify shifts in customer trends. The Navy realized that this approach could also provide significant military gains. When the Network-Centric Warfare (NCW) concept first appeared, its potential capabilities, possible vulnerabilities, and implementation requirements were not fully understood. The Joint Warfare Analysis Department set up an NCW War Room to increase our understanding of NCW and identify its implications and opportunities for APL. This article describes the development of the NCW War Room and illustrates how insights were gained from the War (or Study) Room analysis process. We also highlight many of the questions and issues that were considered, but do not attempt tu present a comprehensive or current discussion of NCW. An innovative procedure adopted in the NCW War Room was the use of a parallel electronic War Room to record the process.
引用
收藏
页码:368 / 377
页数:10
相关论文
共 50 条
  • [21] The US Army and Network-Centric Warfare A thematic analysis of the literature
    Tunnell, Harry D.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 889 - 894
  • [22] Dynamically reconfigurable command and control structure for network-centric warfare
    Pang, Chee Khiang
    Mathew, Josey
    SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2015, 91 (05): : 417 - 431
  • [24] Tactical mission event logic graph construction for Network-Centric Warfare
    Li, Hui
    Yan, Guoyu
    Zhao, Xin
    Zhang, Jie
    Lyu, Ming
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (11) : 9161 - 9173
  • [25] Cyber-security must become a feature a network-centric warfare
    Tether, AJ
    AVIATION WEEK & SPACE TECHNOLOGY, 2003, 158 (26): : 74 - 74
  • [26] Network-centric simulation using NCSOS
    Colvin, K
    Beaumariage, T
    SIMULATION, 1998, 70 (06) : 396 - 409
  • [27] The National Network-Centric System and its components in the age of information warfare
    Piotrowski, Z.
    SAFETY AND SECURITY ENGINEERING III, 2009, 108 : 301 - 309
  • [28] Network-centric warfare part 1: Combat ID - Friendly advice
    Skinner, Tony
    Jane's Defence Weekly, 2006, (MAR.): : 43 - 47
  • [29] In a Network-centric World
    Hsu, John C.
    MOVING INTEGRATED PRODUCT DEVELOPMENT TO SERVICE CLOUDS IN THE GLOBAL ECONOMY, 2014, 1 : 17 - 25
  • [30] We can rebuild him: Mapping the (human) soldier in network-centric warfare
    Fletcher, AL
    International Conference on Politics and Information Systems: Technologies and Applications, Vol 1: INFORMATICS AND SOCIETY, 2004, : 6 - 10