2,009 research outputs found

    What is a Good Plan? Cultural Variations in Expert Planners’ Concepts of Plan Quality

    No full text
    This article presents the results of a field research study examining commonalities and differences between American and British operational planners’ mental models of planning. We conducted Cultural Network Analysis (CNA) interviews with 14 experienced operational planners in the US and UK. Our results demonstrate the existence of fundamental differences between the way American and British expert planners conceive of a high quality plan. Our results revealed that the American planners’ model focused on specification of action to achieve synchronization, providing little autonomy at the level of execution, and included the belief that increasing contingencies reduces risk. The British planners’ model stressed the internal coherence of the plan, to support shared situational awareness and thereby flexibility at the level of execution. The British model also emphasized the belief that reducing the number of assumptions decreases risk. Overall, the American ideal plan serves a controlling function, whereas the British ideal plan supports an enabling function. Interestingly, both the US and UK would view the other’s ideal plan as riskier than their own. The implications of cultural models of plans and planning are described for establishing performance measures and designing systems to support multinational planning teams

    Ethical Control of Unmanned Systems: lifesaving/lethal scenarios for naval operations

    Get PDF
    Prepared for: Raytheon Missiles & Defense under NCRADA-NPS-19-0227This research in Ethical Control of Unmanned Systems applies precepts of Network Optional Warfare (NOW) to develop a three-step Mission Execution Ontology (MEO) methodology for validating, simulating, and implementing mission orders for unmanned systems. First, mission orders are represented in ontologies that are understandable by humans and readable by machines. Next, the MEO is validated and tested for logical coherence using Semantic Web standards. The validated MEO is refined for implementation in simulation and visualization. This process is iterated until the MEO is ready for implementation. This methodology is applied to four Naval scenarios in order of increasing challenges that the operational environment and the adversary impose on the Human-Machine Team. The extent of challenge to Ethical Control in the scenarios is used to refine the MEO for the unmanned system. The research also considers Data-Centric Security and blockchain distributed ledger as enabling technologies for Ethical Control. Data-Centric Security is a combination of structured messaging, efficient compression, digital signature, and document encryption, in correct order, for round-trip messaging. Blockchain distributed ledger has potential to further add integrity measures for aggregated message sets, confirming receipt/response/sequencing without undetected message loss. When implemented, these technologies together form the end-to-end data security that ensures mutual trust and command authority in real-world operational environments—despite the potential presence of interfering network conditions, intermittent gaps, or potential opponent intercept. A coherent Ethical Control approach to command and control of unmanned systems is thus feasible. Therefore, this research concludes that maintaining human control of unmanned systems at long ranges of time-duration and distance, in denied, degraded, and deceptive environments, is possible through well-defined mission orders and data security technologies. Finally, as the human role remains essential in Ethical Control of unmanned systems, this research recommends the development of an unmanned system qualification process for Naval operations, as well as additional research prioritized based on urgency and impact.Raytheon Missiles & DefenseRaytheon Missiles & Defense (RMD).Approved for public release; distribution is unlimited

    Naming and discovery in networks : architecture and economics

    Get PDF
    In less than three decades, the Internet was transformed from a research network available to the academic community into an international communication infrastructure. Despite its tremendous success, there is a growing consensus in the research community that the Internet has architectural limitations that need to be addressed in a effort to design a future Internet. Among the main technical limitations are the lack of mobility support, and the lack of security and trust. The Internet, and particularly TCP/IP, identifies endpoints using a location/routing identifier, the IP address. Coupling the endpoint identifier to the location identifier hinders mobility and poorly identifies the actual endpoint. On the other hand, the lack of security has been attributed to limitations in both the network and the endpoint. Authentication for example is one of the main concerns in the architecture and is hard to implement partly due to lack of identity support. The general problem that this dissertation is concerned with is that of designing a future Internet. Towards this end, we focus on two specific sub-problems. The first problem is the lack of a framework for thinking about architectures and their design implications. It was obvious after surveying the literature that the majority of the architectural work remains idiosyncratic and descriptions of network architectures are mostly idiomatic. This has led to the overloading of architectural terms, and to the emergence of a large body of network architecture proposals with no clear understanding of their cross similarities, compatibility points, their unique properties, and architectural performance and soundness. On the other hand, the second problem concerns the limitations of traditional naming and discovery schemes in terms of service differentiation and economic incentives. One of the recurring themes in the community is the need to separate an entity\u27s identifier from its locator to enhance mobility and security. Separation of identifier and locator is a widely accepted design principle for a future Internet. Separation however requires a process to translate from the identifier to the locator when discovering a network path to some identified entity. We refer to this process as identifier-based discovery, or simply discovery, and we recognize two limitations that are inherent in the design of traditional discovery schemes. The first limitation is the homogeneity of the service where all entities are assumed to have the same discovery performance requirements. The second limitation is the inherent incentive mismatch as it relates to sharing the cost of discovery. This dissertation addresses both subproblems, the architectural framework as well as the naming and discovery limitations

    Coming Full Circle with Boyd\u27s OODA Loop Ideas: An Analysis of Innovation Diffusion and Evolution

    Get PDF
    The Observe-Orient-Decide-Act (OODA) Loop ideas of Air Force Colonel John Boyd have impacted the Department of Defense (DoD), influenced military thought, paved the way for operational change, and helped to shape fighting doctrines. A wide variety of OODA Loop ideas and interpretations exist in the literature, but are unorganized and have not undergone holistic study to determine how Boyd\u27s ideas have spread or changed over time. As such, this research analyzed a quarter century (1976-2003) sample of the OODA Loop literature to examine the diffusion and evolution of OODA Loop ideas since Boyd\u27s original conceptualizations. This research used qualitative data analysis to examine OODA Loop ideas in light of innovation diffusion theory. Ideas from Boyd\u27s original OODA Loop theories were compared and contrasted with subsequent literature instances to assess diffusion and evolution of OODA Loop ideas in the DoD. This research concluded with a proposed conceptual framework for collectively considering OODA Loop ideas

    Discrimination in the Laws of Information Warfare

    Get PDF

    Decoding the Genome Canada Research Network : an institutional analysis

    Get PDF
    The rise of high-technological innovations in the mid- to late- 20th and early 21st centuries has required the establishment of equally innovative agencies and institutions to guide these technological innovations. This thesis examines the emergence and evolution of Genome Canada, which was created to oversee the proliferation and direction of genomic research within Canada. This thesis examines how genomic research developed in Canada throughout the late 1980s to early 2000s, why it became necessary to create Genome Canada, how the networked model chosen was seen as the preferred model, and how Genome Canada has evolved to date. This case study of Genome Canada is important because it reveals how public institutions that guide innovation emerge and how they evolve over time. As well, it is important because it reveals how the model used in the genome policy sector may be used again in the future as a framework for establishing other similar institutions

    Ecological BIM-based Model Checking

    Get PDF

    Analysis domain model for shared virtual environments

    Get PDF
    The field of shared virtual environments, which also encompasses online games and social 3D environments, has a system landscape consisting of multiple solutions that share great functional overlap. However, there is little system interoperability between the different solutions. A shared virtual environment has an associated problem domain that is highly complex raising difficult challenges to the development process, starting with the architectural design of the underlying system. This paper has two main contributions. The first contribution is a broad domain analysis of shared virtual environments, which enables developers to have a better understanding of the whole rather than the part(s). The second contribution is a reference domain model for discussing and describing solutions - the Analysis Domain Model
    • …
    corecore