返回列表 发帖

胡兄可能感兴趣的文章

ENERGY CHANGE DETECTION TO ASSIST IN TACTICAL INTELLIGENCE PRODUCTION

附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

U.S. Army Research Institute for the Behavioral and Social Sciences
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP


Decision Superiority: Putting the Emphasis Back on the Warfighter
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP



Network Centric Warfare (NCW) plays a significant role in modern warfare. The benefits of information superiority and shared situational awareness across the battlefield cannot be disputed. However, analysis of the concept indicates potential for micromanagement comes with these advancing technologies. As a result, NCW has enabled the operational commander to imbue centralized execution at the tactical level of war, minimizing the need for junior commanders to rely on stated guidance and intent to accomplish the mission. Tactical commanders are therefore denied the ability to exercise judgment based on their experience and intuition, hindering development of their innovative and creative decision-making skills at lower command echelons. Continued growth of tomorrow’s operational commander is crucial to the military’s success. This paper will demonstrate that a lack of understanding of how to effectively incorporate NCW has a detrimental impact on the development of future leaders. Although present throughout all of the services at the operational level, micromanagement is most pronounced within the United States Navy. The paper concludes with recommendations for the operational commander to assist in mitigating micromanagement and aiding in the leadership development of subordinates.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

Technological advances in modern weaponry have provided the United States military with unparalleled speed, precision and lethality. However, with these newfound capabilities comes increased responsibility to ensure positive identification of the enemy in order to mitigate the risk to non-combatants and friendly forces. This task, that is extremely difficult to master during training, often proves overwhelming among the stress and uncertainty that defines the modern battlefield. Consequently, Operation DESERT STORM saw a spike in the percentage of coalition casualties caused by fratricide. To counter this trend, the Department of Defense poured time and resources into solving the problem. However, technology alone proved ineffective during OEF/OIF as displayed by another increase in percentage of fratricide casualties. Thus a joint effort combining technological innovation, joint doctrine and training and greater dissemination of lesson learned must be adopted to mitigate this unacceptable risk.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

As the 21st Century emerges, a changing environment, advances in technology and information accessibility, and cultural challenges will make the problems facing our future leaders more complex. This complexity, and the change associated with it, will make the requirement for leadership at the operational level paramount. This paper explores the nature of leadership. It describes the future challenges facing our military at the operational level and provides a basic understanding of the roles that critical thought, decision making, cultural empathy, and leadership development can have in meeting those challenges. Finally, the paper draws conclusions on the role of leadership in the future and provides recommendations for the military aimed at providing future operational leaders with the proper preparation to meet the challenges they will face.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

这个也很有意思
JOINT INTERAGENCY COORDINATION GROUP – CYBER:
EMPOWERING THE COMBATANT COMMANDERS AGAINST THE NO-
BORDERS THREAT


The worldwide proliferation of technology and increased ease of access to the Internet are facilitating cyber threats from a wide range of sources. From recreational hackers to organized terrorist organizations and legitimate nation states, the threats in cyberspace continue to increase and the points of origin are becoming more difficult to pin-point. The cyber attacks on Estonia and Georgia in 2007 and 2008, respectively, prove that cyberspace is a legitimate warfighting domain. Informed by these attacks, the 2009 Quadrennial Roles and Missions Review report identified cyberspace as one of four focus areas for the Department of Defense (DoD), and the armed services are moving quickly to address cyber personnel, training, equipment, and command and control issues. Currently, U.S. Strategic Command (USSTRACOM) is the department’s “cyber command” and is responsible for operating, maintaining, protecting and monitoring the Global Information Grid (GIG) and, through the Defense Information Systems Agency’s (DISA) Joint Task Force – Global Network Operations (JTF-GNO), exercises assured system and network availability, information protection, and information delivery for the DoD. At the operational level, DISA supports the Geographic Combatant Commanders (CCDRs) with remote field offices within each of their headquarters and Theater Network Operations Centers (TNCs) are collocated within most of the COCOM J6 organizations. Despite these support agencies, the CCDR does not have cyber resources at his immediate discretion as USSTRATCOM retains operational control of all units. In order to effectively address threats in the cyber domain, Geographic Combatant Commanders should establish a Joint Interagency Coordination Group – Cyber (JIACG-C) empowered to leverage joint, interagency, and civilian agency resources to support the commander’s objectives. This paper will focus on this recommendation, analyzing the possible JIACG-C composition, staff functions, and command and control arrangements.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

A Study of Alternative Modeling Techniques of Attrition of First-term Navy
Enlisted Sailors

The focus of this research project was to analyze probabilities of first-term
attrition for enlisted Sailors from the U.S. Navy by employing advanced statistical
techniques in the domain of data mining. The research was conducted as an
initial effort for the Taxonomy of Self-Reports (TAXSE, Data Mining) project
under Personnel Integration of Selection, Classification, Evaluations, and Surveys
(PISCES) sponsored by the Office of Naval Research (ONR). The outcome of the
research would then be compared to the analysis performed and results derived
by Dr. Amos Golan, a leading econometrician, who utilized classical econometric
techniques to predict the overall rate attrition for a segment of enlisted Sailors.
The authors would also like to thank ONR for their generous sponsorship.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

多谢,最近专门研究cas "close air support",头大
成天看pdf,得买一个kindleDx了
Justice is the greatest good 正义是最大的善
Injustice is the greatest evil 不公是最大的恶

TOP

Since the inception of an official U.S. Space Program in 1958 by the National Aeronautics and Space Act, efforts to
develop, deploy, and maintain U.S. capabilities and assets in space expanded to include civil, military, intelligence, and
commercial organizations. Consequently, no single agency or department provides oversight and guidance on the billions of
dollars allocated annually for space programs. Although a space policy exists which provides general guidance and direction,
the U.S. lacks a coordinated space strategy to establish a unity of effort among the various departments and agencies
supporting our National Security Space Enterprise (NSSE).
This paper focuses on the NSSE, specifically the people that lead and manage it and the lack of a National Space
Strategy to provide it unity of effort. The paper provides a brief history of U.S. space programs and the national policy that
guides it to help frame the issues. It then elaborates on how the lack of a consolidated and overarching space strategy
negatively impacts the future of the NSSE and discusses concerns regarding the cadre of space professionals required to
meet the challenges of a rapidly changing environment and recommends possible solutions.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

The Army needs to reaffirm Knowledge Management as the means to supporting its Army’s Strategic Strategy for the
21st Century of transforming itself into a network-centric knowledge-based force. The best way to do this is for the Army to
write an Army Knowledge Management Strategy that lays out a vision to shape the entire Army into a knowledge-based force
for the next twenty or thirty years. The strategy would provide a unity of effort for the Army enterprise, which is currently
operating piece meal. With a common Knowledge Management strategy, the Army would direct TRADOC in coordination with
FORSCOM to develop a plan to change the current cultural mindset and Army doctrine to meet its strategic goals. The forces
would affirm these newly developed Knowledge Management processes through daily use, training and exercises. HQDA
G6/CIO, who is responsible for the Information Management strategy, would tailor the Information technology resources
operating the enterprise appropriately to support the Knowledge Management strategy.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

Army transformation and the requirement to support two major combat operations simultaneously has placed a burden on the
Army’s ability to generate equipped, trained, and ready combat power on a reliable non-exhaustive cyclic model. The Army
Force Generation Model (ARFORGEN) has done a great deal to alleviate that stress by dictating timelines for equipping,
training, deploying, and resetting of combat units. However, when dealing with information systems that have an ever evolving
capabilities timeline, the ARFORGEN process results in units deploying with information technology capabilities that may be
several years old. To preclude that from happening, and to provide the best possible solution in a timely manner, Program
Managers of Army Digital Systems have created innovative tools and procedures to augment the ARFORGEN Process and
deliver the best possible information technology system of systems to combat units. These tools include forward presence,
database managers, and an Army wide collaborative process that provides constant upgrade, even through the deployment
timeline.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

Specific goals of the present research were to 1) report lessons learned from instructors in a distributed blended learning environment; 2) report student reactions to this type of learning environment; and 3) compare the training approaches with those reported for traditional classroom environments. Both the dL instructors and students acknowledged substantial value in the blended approach (video teletraining with computer software) for training digital skills remotely. The students offered some good suggestions for improving the training in distributed environments such as having hands-on training with tactical equipment and additional training aids (acronym list, commander’s guide, train-the-trainer materials, etc.). Overall, the findings indicate that the dL instructors were able to adapt to using the technology to teach FBCB2 operations, resulting in training that is very comparable to the traditional courses. The positive student comments and similar training approaches and topical coverage support these findings. Additionally, major advantages and disadvantages of the dL method of instruction are noted. Several specific recommendations for dL instructors were made in the areas of (a) leveraging student strengths, (b) emphasizing problem-centered instruction, and (c) leveraging training aids. The findings contribute to the Army’s efforts to enhance blended learning solutions to meet critical training needs.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

这个文章也挺有意思:MITIGATING INSIDER SABOTAGE AND ESPIONAGE


The security threat from malicious insiders affects all organizations. Mitigating this problem is quite difficult due to the fact that (1) there is no definitive profile for malicious insiders, (2) organizations have placed trust in these individuals, and (3) insiders have a vast knowledge of their organization’s personnel, security policies, and information systems.
The purpose of this research is to analyze to what extent the United States Air Force (USAF) security policies address the insider threat problem. The policies are reviewed in terms of how well they align with best practices published by the Carnegie Mellon University Computer Emergency Readiness Team and additional factors this research deems important, including motivations, organizational priorities, and social networks.
Based on the findings of the policy review, this research offers actionable recommendations that the USAF could implement in order to better prevent, detect, and respond to malicious insider attacks. The most important course of action is to better utilize its workforce. All personnel should be trained on observable behaviors that can be precursors to malicious activity. Additionally, supervisors need to be empowered as the first line of defense, monitoring for stress, unmet expectations, and disgruntlement. In addition, this research proposes three new best practices regarding (1) screening for prior concerning behaviors, predispositions, and technical incidents, (2) issuing sanctions for inappropriate technical acts, and (3) requiring supervisors to take a proactive role.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

The Use of Systemic-Functional Linguistics in Automated
Text Mining
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

AN ANALYSIS OF DEFENSE INFORMATION AND INFORMATION TECHNOLOGY ARTICLES: A SIXTEEN YEAR PERSPECTIVE

Over the past two decades, information and information technology (IT) have evolved significantly and have become increasingly important to our national security. Many different journals have described this evolution. The purpose of this study is to examine the evolution of information and IT through the articles of two defense journals over a sixteen-year period. It provides a review of the article subject matter, the changes in the subject matter, the contributing authors and their institutions, and predictions for the next five years.
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

ADAPTING E-MANAGEMENT TO SUPPORT
GEOGRAPHICALLY DISPERSED MILITARY TRAINING
by
Konstantinos Xynos
December 2008
Thesis Advisor: Mark Nissen
Co-Advisor: Magdi Kamel
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

DATA INTEGRATION TO EXPLORE THE DYNAMICS OF
CONFLICT: A PRELIMINARY STUDY
附件: 您需要登录才可以下载或查看附件。没有帐号?
HERE I STAND!

TOP

返回列表