Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Defense and Security Studies

Domain Restriction Zones: An Evolution Of The Military Exclusion Zone, Cole M. Mooty, Robert A. Bettinger, Mark G. Reith Jul 2023

Domain Restriction Zones: An Evolution Of The Military Exclusion Zone, Cole M. Mooty, Robert A. Bettinger, Mark G. Reith

Faculty Publications

Since the early part of the twenty-first century, US adversaries have expanded their military capabilities within and their access to new warfighting domains. When faced with the growth of adversaries’ asymmetric capabilities, the means, tactics, and strategies previously used by the US military lose their proportional effectiveness. To avoid such degradation of capability, the operational concept of the military exclusion zone (MEZ) should be revised to suit the modern battlespace while also addressing the shifts in national policy that encourage diplomacy over military force. The concept and development of domain restriction zones (DRZs) increase the relevancy of traditional MEZs in …


Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer Mar 2007

Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer

Theses and Dissertations

Stability operations are vital to establish peace in the aftermath of conflict. The United States is often called in for military support during conflict. The new American military paradigms include establishing peace through stability operations after a military conflict. Due to this new role, military decision makers face many difficulties in conducting successful stability operations. Compounding this problem is the limited number of resources pertaining to stability operations: experts, doctrine, knowledge, and technology. Two overarching challenges of stability operations facing decision makers are planning and prioritizing of stability operations and determining progress. This thesis applies a structured analytical approach to …


Modeling Network Centric Warfare (Ncw) With The System Effectiveness Analysis Simulation (Seas), Jason B. Honabarger Mar 2006

Modeling Network Centric Warfare (Ncw) With The System Effectiveness Analysis Simulation (Seas), Jason B. Honabarger

Theses and Dissertations

Significant technological advances over the past few decades have fueled the continual and rapid development of an information-based world. Network Centric Warfare (NCW) has become the buzzword of the young millennium within the Department of Defense (DoD) and is quickly becoming a popularly shared vision and rallying cry for force transformation among United States military leaders. An essential element in fully implementing this network-centric way of thinking is to develop useful measures to help gauge the effectiveness and efficiency of both our military networks and our strategic NCW doctrine. The goal of this research is first to provide a comprehensive …


A Methodology For Performing Effects-Based Assessments, Benjamin A. Thoele Mar 2006

A Methodology For Performing Effects-Based Assessments, Benjamin A. Thoele

Theses and Dissertations

In order to bring the doctrine of Effects-Based Operations (EBO) into a fully operational capability, Effects-Based Assessment (EBA) must provide relevant insight to the commander and his planning staff. Assessments of an effects-based plan and execution must include an assessment of the effects of a campaign on the enemy in addition to an assessment of the accomplishment of friendly actions taken to achieve the desired effects. Determining the effects of a campaign requires an analysis of the dynamics of the enemy systems. EBA must be able to recognize the states of the enemy's systems as the system states change over …


Strategic Airlift En Route Analysis To Support The Global War On Terrorism Using A Value Focused Thinking Approach, Marykathryn W. Tharaldson Mar 2006

Strategic Airlift En Route Analysis To Support The Global War On Terrorism Using A Value Focused Thinking Approach, Marykathryn W. Tharaldson

Theses and Dissertations

The Global War on Terrorism (GWOT) has yielded new challenges to the United States' strategic airlift infrastructure. The network of en-route airfields that serve as refueling and maintenance stops were designed primarily to service relatively static Cold War requirements. However, the GWOT has resulted in the need for an infrastructure that is responsive to a highly dynamic environment. This research uses a "value focused" methodology to identify en-route airfield locations that simultaneously maximize cargo throughput capability while possessing a high degree of adaptability to volatile cargo delivery requirements.


Modeling And Simulation Of The Military Intelligence Process, Carl R. Pawling Mar 2004

Modeling And Simulation Of The Military Intelligence Process, Carl R. Pawling

Theses and Dissertations

There is concern within U.S. space and intelligence organizations that the current Tasking, Processing, Exploitation, and Dissemination processes may be insufficient to support current and future Intelligence, Surveillance, and Reconnaissance systems. As part of a larger intelligence process, more detailed analysis becomes critical to determine what portions need to be improved. This analysis can be accomplished by simulation, which is appropriate due to the complexity of the process and the ability to compare variations in the process. We construct a high level model of a generalized military intelligence process based in part on the Intelligence Cycle outlined in Joint Publications. …


A Methodology For Evaluating Military Systems In A Counterproliferation Role, Stanley Stafira Jr. Mar 1995

A Methodology For Evaluating Military Systems In A Counterproliferation Role, Stanley Stafira Jr.

Theses and Dissertations

This thesis develops a methodology to evaluate how dissimilar military systems support the accomplishment of the United States? counterproliferation objectives. The overall scope is to develop a model of the counterproliferation decision process that enables systems to be evaluated against common criteria. By using decision analysis, an influence diagram model is developed which represents military activities in the counterproliferation process. The key questions which must be asked in evaluating counterproliferation systems are highlighted. An analysis of perfect intelligence, perfect defensive, and perfect offensive systems reveal that a perfect intelligence system provides the greatest potential to meet the United States' counterproliferation …