Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (3)
- Operations Research, Systems Engineering and Industrial Engineering (3)
- Strategic Management Policy (3)
- Social and Behavioral Sciences (2)
- Systems Engineering (2)
-
- Defense and Security Studies (1)
- Management Sciences and Quantitative Methods (1)
- Operations and Supply Chain Management (1)
- Organization Development (1)
- Organizational Behavior and Theory (1)
- Other Operations Research, Systems Engineering and Industrial Engineering (1)
- Public Affairs, Public Policy and Public Administration (1)
Articles 1 - 6 of 6
Full-Text Articles in Business
Value-Driven Enterprise Architecture Evaluation For The Joint Force Protection Advanced Security System, Craig E. Mills
Value-Driven Enterprise Architecture Evaluation For The Joint Force Protection Advanced Security System, Craig E. Mills
Theses and Dissertations
The U.S. military has placed a strong focus on the importance of operating in a joint environment, where capabilities and missions are shared between service components. Protecting U.S. forces is a major consideration in the joint environment. The Joint Force Protection Advanced Security System (JFPASS) architecture has been created to fill a critical gap in Joint Force Protection guidance for systems acquisition. The systems engineering (SE) field has made wide use of system architectures to represent complex systems. As fundamental SE principles become more widespread, analysis tools provide an objective method for the evaluation of the resulting architectural products. This …
Value-Driven Enterprise Architecture Score: Evaluation Applied To Joint Force Protection Future State Design, Larry D. Cotton, Gary A. Haase
Value-Driven Enterprise Architecture Score: Evaluation Applied To Joint Force Protection Future State Design, Larry D. Cotton, Gary A. Haase
Theses and Dissertations
This research presents a methodology to evaluate the quality of a system's architecture using principles drawn from Value-Focused Thinking (VFT) and resulting in a Value-Driven Enterprise Architecture Score (VDEA-Score). This is an overall numerical architecture quality score useful to a system's management team to identify the advantages and disadvantages of a system design and associated architecture documentation or to track its quality across discrete evaluation epochs. This effort determined which aspects of the architecture are most valuable to the stakeholder in the areas of (1) the system effectiveness values (quality of the instantiated system being represented and its ability to …
The Hybrid Counterinsurgency Strategy: System Dynamics Employed To Develop A Behavioral Model Of Joint Strategy, Ferdinand Maldonado
The Hybrid Counterinsurgency Strategy: System Dynamics Employed To Develop A Behavioral Model Of Joint Strategy, Ferdinand Maldonado
Theses and Dissertations
Since the recent focus on the Global War on Terror, both military and civilian theorists have begun to “relearn” the intricacies of counterinsurgency warfare. We face difficult challenges when confronting non-state actors that tend to attack in the time between conventional battles and the establishment of stable governments. This research compares and contrasts current counterinsurgency strategies (Hearts and Minds and Cost Benefit Theory) by applying System Dynamics to provide insight into the influences and emergent behavior patterns of counterinsurgency systems. The information gained from the development of the models and from their simulation behaviors is used to construct a System …
Forecasting Expeditionary Training For Company Grade Logistics Readiness Officers: A Delphi Study, Phillip Kirk Larson
Forecasting Expeditionary Training For Company Grade Logistics Readiness Officers: A Delphi Study, Phillip Kirk Larson
Theses and Dissertations
Since the development of the Expeditionary Airman concept and the start of combat operations in the Global War on Terrorism, the Logistics Readiness Officer’s (LRO) duty environment has expanded beyond traditional garrison-based duties. This expansion can arguably incorporate current topics of joint operations, irregular warfare, and cultural intelligence. The intent of this study is to determine what training, if any, future company grade LROs will require on these three topics. The research uses Delphi methodology, utilizing an expert panel of twelve LROs with experience in joint operations within a deployed environment, and interactions with foreign nationals. The study applies two …
Application Of The Strategic Alignment Model And Information Technology Governance Concepts To Support Network Centric Warfare, Jennifer R. Valentine
Application Of The Strategic Alignment Model And Information Technology Governance Concepts To Support Network Centric Warfare, Jennifer R. Valentine
Theses and Dissertations
This thesis analyzes the fields of E-Business and Network Centric Warfare (NCW) in order to identify gaps and overlaps within the two bodies of knowledge. Successful implementation of E-business is more than simply applying a technology to an existing business model. It is about evolving business processes and structures in order for the organization to accommodate for this new dynamic environment. This thesis proposes that while the two areas' success fundamentally resides in the implementation and exploitation of technology, it is only through sound IT Governance policies and strategic alignment practices that success can be measured. Technology has the ability …
Output Analysis And Comparison Of Deployment Models With Varying Fidelity, Matthew M. Gill
Output Analysis And Comparison Of Deployment Models With Varying Fidelity, Matthew M. Gill
Theses and Dissertations
This thesis explores the changes in insights that result from using different types of models to assess the capability of deploying the Stryker Brigade within specific timeline goals. The thesis uses as its primary base a study conducted in 2002 by USTRANSCOM to evaluate the ability of Stryker to meet stated deployment timeline goals. Specifically, the author compares the outputs from four different models as they change over three different deployment scenarios and 10 different routes. The study investigates the relationships among the outputs of spreadsheet models, spreadsheet models with elements of variability added, and low- and high-level discrete-event simulations. …